An Information Flow Tool for Gypsy
暂无分享,去创建一个
[1] James P Anderson,et al. Computer Security Technology Planning Study , 1972 .
[2] Gregory R. Andrews,et al. Certifying information flow properties of programs: an axiomatic approach , 1979, POPL '79.
[3] John Mchugh,et al. Towards the Generation of Efficient Code from Verified Programs , 1983 .
[4] John McHugh,et al. An Experience Using Two Covert Channel Analysis Techniques on a Real System Design , 1986, IEEE Transactions on Software Engineering.
[5] Peter J. Denning,et al. Certification of programs for secure information flow , 1977, CACM.
[6] Richard J. Feiertag. A Technique for Proving Specifications are Multilevel Secure , 1980 .
[7] D. Elliott Bell,et al. Secure Computer System: Unified Exposition and Multics Interpretation , 1976 .
[8] Butler W. Lampson,et al. A note on the confinement problem , 1973, CACM.
[9] Mark Weiser,et al. Program Slicing , 1981, IEEE Transactions on Software Engineering.
[10] Carl E. Landwehr,et al. Formal Models for Computer Security , 1981, CSUR.
[11] Lawrence Robinson,et al. Proving multilevel security of a system design , 1977, SOSP '77.
[12] N. S. Barnett,et al. Private communication , 1969 .
[13] Steven B. Lipner,et al. A comment on the confinement problem , 1975, SOSP.
[14] J DenningPeter,et al. Certification of programs for secure information flow , 1977 .
[15] John McHugh,et al. An Information Flow Tool for Gypsy , 1985, IEEE Symposium on Security and Privacy.
[16] P. S. Tasker,et al. DEPARTMENT OF DEFENSE TRUSTED COMPUTER SYSTEM EVALUATION CRITERIA , 1985 .
[17] Richard A. Kemmerer,et al. Shared resource matrix methodology: an approach to identifying storage and timing channels , 1983, TOCS.