Noninterference for a Practical DIFC-Based Operating System
暂无分享,去创建一个
[1] Peter Y. A. Ryan,et al. The modelling and analysis of security protocols: the csp approach , 2000 .
[2] Timothy Fraser,et al. LOMAC: Low Water-Mark integrity protection for COTS environments , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.
[3] Hugo Krawczyk,et al. Keying Hash Functions for Message Authentication , 1996, CRYPTO.
[4] C. A. R. Hoare,et al. Communicating sequential processes , 1978, CACM.
[5] Andrew C. Myers,et al. A decentralized model for information flow control , 1997, SOSP.
[6] J. Jacob,et al. On the derivation of secure components , 1989, Proceedings. 1989 IEEE Symposium on Security and Privacy.
[7] Andrea C. Arpaci-Dusseau,et al. Transforming policies into mechanisms with infokernel , 2003, SOSP '03.
[8] Gavin Lowe,et al. On Information Flow and Refinement−Closure , 2007 .
[9] Peter Y. A. Ryan,et al. Process algebra and non-interference , 1999, Proceedings of the 12th IEEE Computer Security Foundations Workshop.
[10] Andrew C. Myers,et al. Dynamic Security Labels and Noninterference , 2004 .
[11] Steve Zdancewic,et al. Run-time principals in information-flow type systems , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.
[12] Gavin Lowe,et al. Some new attacks upon security protocols , 1996, Proceedings 9th IEEE Computer Security Foundations Workshop.
[13] Andrew William Roscoe,et al. The Theory and Practice of Concurrency , 1997 .
[14] Joëel Ouaknine. A framework for model-checking timed CSP , 1999 .
[15] Stephen McCamant,et al. Quantitative information flow as network flow capacity , 2008, PLDI '08.
[16] L.,et al. SECURE COMPUTER SYSTEMS : MATHEMATICAL FOUNDATIONS , 2022 .
[17] Dawson R. Engler,et al. Exokernel: an operating system architecture for application-level resource management , 1995, SOSP.
[18] Heiko Mantel,et al. Preserving information flow properties under refinement , 2001, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.
[19] Eddie Kohler,et al. Making information flow explicit in HiStar , 2006, OSDI '06.
[20] A. W. Roscoe,et al. What is intransitive noninterference? , 1999, Proceedings of the 12th IEEE Computer Security Foundations Workshop.
[21] D. Elliott Bell,et al. Secure Computer System: Unified Exposition and Multics Interpretation , 1976 .
[22] K. J. Bma. Integrity considerations for secure computer systems , 1977 .
[23] Eddie Kohler,et al. Information flow control for standard OS abstractions , 2007, SOSP.
[24] Steve Vandebogart,et al. Labels and event processes in the Asbestos operating system , 2005, TOCS.
[25] James A. Reeds,et al. Multilevel security in the UNIX tradition , 1992, Softw. Pract. Exp..
[26] Carla Piazza,et al. Modelling downgrading in information flow security , 2004, Proceedings. 17th IEEE Computer Security Foundations Workshop, 2004..
[27] J. Meseguer,et al. Security Policies and Security Models , 1982, 1982 IEEE Symposium on Security and Privacy.
[28] Steve A. Schneider,et al. Concurrent and Real-time Systems: The CSP Approach , 1999 .
[29] James Newsome,et al. Dynamic Taint Analysis for Automatic Detection, Analysis, and SignatureGeneration of Exploits on Commodity Software , 2005, NDSS.
[30] Jens Palsberg,et al. Trust in the λ-calculus , 1995, Journal of Functional Programming.
[31] Stephen Smalley,et al. Integrating Flexible Support for Security Policies into the Linux Operating System , 2001, USENIX Annual Technical Conference, FREENIX Track.
[32] Geoffrey Smith,et al. A Sound Type System for Secure Flow Analysis , 1996, J. Comput. Secur..
[33] Dorothy E. Denning,et al. A lattice model of secure information flow , 1976, CACM.