Abstractions for Usable Information Flow Control in Aeolus
暂无分享,去创建一个
Winnie Cheng | Liuba Shrira | Dan R. K. Ports | Barbara Liskov | Dorothy Curtis | Victoria Popic | James A. Cowling | Aaron Blankstein | David A. Schultz | B. Liskov | L. Shrira | Aaron Blankstein | David A. Schultz | Victoria Popic | D. Curtis | Winnie Cheng
[1] Andrew C. Myers,et al. JFlow: practical mostly-static information flow control , 1999, POPL '99.
[2] Eddie Kohler,et al. Making information flow explicit in HiStar , 2006, OSDI '06.
[3] Andrew C. Myers,et al. SIF: Enforcing Confidentiality and Integrity in Web Applications , 2007, USENIX Security Symposium.
[4] Silas Boyd-Wickizer,et al. Securing Distributed Systems with Information Flow Control , 2008, NSDI.
[5] David M. Eyers,et al. DEFCON: High-Performance Event Processing with Information Security , 2010, USENIX Annual Technical Conference.
[6] Donald E. Porter,et al. Laminar: practical fine-grained decentralized information flow control , 2009, PLDI '09.
[7] Eddie Kohler,et al. Manageable fine-grained information flow , 2008, Eurosys '08.
[8] The Sarbanes-Oxley Act: Implications for large-scale IT outsourcing , 2007 .
[9] Xi Wang,et al. Improving application security with data flow assertions , 2009, SOSP '09.
[10] Dorothy E. Denning,et al. A lattice model of secure information flow , 1976, CACM.
[11] Rebecca T. Mercuri. The HIPAA-potamus in health care data security , 2004, CACM.
[12] James R. Larus,et al. Language support for fast and reliable message-based communication in singularity OS , 2006, EuroSys.
[13] Andrew C. Myers,et al. A decentralized model for information flow control , 1997, SOSP.
[14] Steven B. Lipner,et al. Trusted Computer System Evaluation Criteria ( Orange Book ) December , 2001 .
[15] John M. Boone,et al. INTEGRITY-ORIENTED CONTROL OBJECTIVES: PROPOSED REVISIONS TO THE TRUSTED COMPUTER SYSTEM EVALUATION CRITERIA (TCSEC), DoD 5200.28-STD , 1991 .
[16] Grzegorz Czajkowski,et al. Application isolation in the Java Virtual Machine , 2000, OOPSLA '00.
[17] Xin Qi,et al. Fabric: a platform for secure distributed computation and storage , 2009, SOSP '09.
[18] Andrew C. Myers,et al. Language-based information-flow security , 2003, IEEE J. Sel. Areas Commun..
[19] Michael Hicks,et al. Managing policy updates in security-typed languages , 2006, 19th IEEE Computer Security Foundations Workshop (CSFW'06).
[20] Jerome H. Saltzer,et al. The protection of information in computer systems , 1975, Proc. IEEE.
[21] Eddie Kohler,et al. Information flow control for standard OS abstractions , 2007, SOSP.
[22] Steve Zdancewic,et al. Run-time principals in information-flow type systems , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.