On Information Flow Forensics in Business Application Scenarios
暂无分享,去创建一个
[1] Ke Wang,et al. An access control language for web services , 2002, SACMAT '02.
[2] Butler W. Lampson,et al. A note on the confinement problem , 1973, CACM.
[3] Latanya Sweeney,et al. k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..
[4] François Pottier,et al. Information flow inference for ML , 2003, TOPL.
[5] J. Meseguer,et al. Security Policies and Security Models , 1982, 1982 IEEE Symposium on Security and Privacy.
[6] P. Samarati,et al. Access control: principle and practice , 1994, IEEE Communications Magazine.
[7] E. Stewart Lee,et al. A general theory of security properties , 1997, Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097).
[8] Andrew C. Myers,et al. Language-based information-flow security , 2003, IEEE J. Sel. Areas Commun..
[9] Reiner Hähnle,et al. A Theorem Proving Approach to Analysis of Secure Information Flow , 2005, SPC.
[10] Rafael Accorsi,et al. Detective Information Flow Analysis for Business Processes , 2009, BPSC.
[11] François Pottier. A simple view of type-secure information flow in the /spl pi/-calculus , 2002, Proceedings 15th IEEE Computer Security Foundations Workshop. CSFW-15.
[12] R. Sandhu,et al. Access control: principles and practice , 1994, IEEE Commun. Mag..
[13] K. J. Bma. Integrity considerations for secure computer systems , 1977 .
[14] Fabio Massacci,et al. An access control framework for business processes for web services , 2003, XMLSEC '03.
[15] Gary Enos. Agencies reap benefits of planning ahead HIPAA. Health Insurance Portability and Accountability Act. , 2002, Behavioral healthcare tomorrow.
[16] Torben Amtoft,et al. Verification condition generation for conditional information flow , 2007, FMSE '07.
[17] Heiko Mantel,et al. Possibilistic definitions of security-an assembly kit , 2000, Proceedings 13th IEEE Computer Security Foundations Workshop. CSFW-13.
[18] Yoshinori Sato,et al. Compliance-Monitor zur Frühwarnung vor Risiken , 2008, Wirtsch..
[19] K J Biba,et al. Integrity Considerations for Secure Computer Systems , 1977 .
[20] Isao Echizen,et al. Electronic Voting Scheme to Maintain Anonymity in Small-scale Election by Hiding the Number of Votes , 2008, 2008 Third International Conference on Availability, Reliability and Security.
[21] Dan Boneh,et al. Exposing private information by timing web applications , 2007, WWW '07.
[22] Geoffrey Smith,et al. A Sound Type System for Secure Flow Analysis , 1996, J. Comput. Secur..
[23] Claudia Eckert. On security models , 1996, SEC.
[24] David Brumley,et al. Remote timing attacks are practical , 2003, Comput. Networks.
[25] Scott F. Smith,et al. Dynamic Dependency Monitoring to Secure Information Flow , 2007, 20th IEEE Computer Security Foundations Symposium (CSF'07).
[26] Steve Zdancewic,et al. Challenges for Information-flow Security , 2004 .
[27] Gregor Snelting,et al. Information Flow Control for Java Based on Path Conditions in Dependence Graphs , 2006, ISSSE.
[28] Andrew C. Myers,et al. Jif: java information flow , 1999 .
[29] Rafael Accorsi,et al. Compliance Monitor for Early Warning Risk Determination , 2008 .
[30] Michael R. Clarkson,et al. Hyperproperties , 2008, 2008 21st IEEE Computer Security Foundations Symposium.
[31] Fred B. Schneider,et al. Enforceable security policies , 2000, TSEC.