Compile-Time Detection of Information Flow in Sequential Programs
暂无分享,去创建一个
[1] Dorothy E. Denning,et al. Secure information flow in computer systems. , 1975 .
[2] Barbara G. Ryder,et al. Pointer-induced aliasing: a problem classification , 1991, POPL '91.
[3] Peter J. Denning,et al. Certification of programs for secure information flow , 1977, CACM.
[4] Butler W. Lampson,et al. A note on the confinement problem , 1973, CACM.
[5] Chris Hankin,et al. Deriving algorithms from type inference systems: application to strictness analysis , 1994, POPL '94.
[6] Chris Hankin,et al. Abstract Interpretation of Declarative Languages , 1987 .
[7] Alfred V. Aho,et al. Compilers: Principles, Techniques, and Tools , 1986, Addison-Wesley series in computer science / World student series edition.
[8] C. A. R. Hoare,et al. Communicating sequential processes , 1978, CACM.
[9] Mark N. Wegman,et al. Efficiently computing static single assignment form and the control dependence graph , 1991, TOPL.
[10] Ellis S. Cohen. Information transmission in computational systems , 1977, SOSP '77.
[11] Ellis Choen,et al. Information transmission in computational systems , 1977, SOSP 1977.
[12] Gregory R. Andrews,et al. An Axiomatic Approach to Information Flow in Programs , 1980, TOPL.
[13] John McLean,et al. A Formal Method for the Abstract Specification of Software , 1984, JACM.
[14] Richard J. Lipton,et al. The enforcement of security policies for computation , 1975, J. Comput. Syst. Sci..
[15] John McLean,et al. Proving Noninterference and Functional Correctness Using Traces , 1992, J. Comput. Secur..
[16] J. Banâtre,et al. A Security Proof System for Networks of Communicating Processes , 1993 .