Unwinding Conditions for Security in Imperative Languages
暂无分享,去创建一个
[1] Heiko Mantel,et al. Securing Communication in a Concurrent Language , 2002, SAS.
[2] Roberto Gorrieri,et al. Classification of Security Properties (Part I: Information Flow) , 2000, FOSAD.
[3] Johan Agat,et al. Transforming out timing leaks , 2000, POPL '00.
[4] Andrew C. Myers,et al. Robust declassification , 2001, Proceedings. 14th IEEE Computer Security Foundations Workshop, 2001..
[5] José Meseguer,et al. Unwinding and Inference Control , 1984, 1984 IEEE Symposium on Security and Privacy.
[6] Andrew C. Myers,et al. Language-based information-flow security , 2003, IEEE J. Sel. Areas Commun..
[7] Robin Milner,et al. Communication and concurrency , 1989, PHI Series in computer science.
[8] J. Meseguer,et al. Security Policies and Security Models , 1982, 1982 IEEE Symposium on Security and Privacy.
[9] Roberto Gorrieri,et al. A Classification of Security Properties , 1993 .
[10] Chris Hankin,et al. Approximate non-interference , 2004 .
[11] David Sands,et al. A Per Model of Secure Information Flow in Sequential Programs , 1999, High. Order Symb. Comput..
[12] Glynn Winskel,et al. The formal semantics of programming languages - an introduction , 1993, Foundation of computing series.
[13] Peter Y. A. Ryan,et al. A CSP formulation of non-interference and unwinding , 1991 .
[14] Geoffrey Smith,et al. A Type-Based Approach to Program Security , 1997, TAPSOFT.
[15] Pedro R. D'Argenio,et al. Secure information flow by self-composition , 2004, Proceedings. 17th IEEE Computer Security Foundations Workshop, 2004..
[16] Heiko Mantel,et al. Unwinding Possibilistic Security Properties , 2000, ESORICS.
[17] Riccardo Focardi,et al. Verifying persistent security properties , 2004, Comput. Lang. Syst. Struct..
[18] Peter Y. A. Ryan,et al. Process algebra and non-interference , 2001 .
[19] Geoffrey Smith,et al. Secure information flow in a multi-threaded imperative language , 1998, POPL '98.
[20] Frédéric Cuppens,et al. Computer Security - ESORICS 2000 , 2000, Lecture Notes in Computer Science.
[21] Chris Hankin,et al. Approximate non-interference , 2002, Proceedings 15th IEEE Computer Security Foundations Workshop. CSFW-15.
[22] K. Rustan M. Leino,et al. A semantic approach to secure information flow , 2000, Sci. Comput. Program..
[23] Torben Amtoft,et al. Information Flow Analysis in Logical Form , 2004, SAS.
[24] Roberto Giacobazzi,et al. Abstract non-interference: parameterizing non-interference by abstract interpretation , 2004, POPL.
[25] Heiko Mantel,et al. Static Confidentiality Enforcement for Distributed Programs , 2002 .