Controlled Declassification Based on Intransitive Noninterference
暂无分享,去创建一个
[1] Dorothy E. Denning,et al. A lattice model of secure information flow , 1976, CACM.
[2] Andrew C. Myers,et al. Enforcing robust declassification , 2004, Proceedings. 17th IEEE Computer Security Foundations Workshop, 2004..
[3] John Rushby,et al. Noninterference, Transitivity, and Channel-Control Security Policies 1 , 2005 .
[4] Carla Piazza,et al. Modelling downgrading in information flow security , 2004, Proceedings. 17th IEEE Computer Security Foundations Workshop, 2004..
[5] Birgit Pfitzmann,et al. Computational probabilistic noninterference , 2002, International Journal of Information Security.
[6] Andrew C. Myers,et al. Robust declassification , 2001, Proceedings. 14th IEEE Computer Security Foundations Workshop, 2001..
[7] Paul C. Kocher,et al. Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems , 1996, CRYPTO.
[8] David Clark,et al. Quantitative Analysis of the Leakage of Confidential Data , 2002, QAPL.
[9] Sylvan Pinsky,et al. Absorbing covers and intransitive non-interference , 1995, Proceedings 1995 IEEE Symposium on Security and Privacy.
[10] Akinori Yonezawa,et al. Software Security — Theories and Systems , 2003, Lecture Notes in Computer Science.
[11] A. W. Roscoe,et al. What is intransitive noninterference? , 1999, Proceedings of the 12th IEEE Computer Security Foundations Workshop.
[12] Neal Koblitz,et al. Advances in Cryptology — CRYPTO ’96 , 2001, Lecture Notes in Computer Science.
[13] Chris Hankin,et al. Approximate non-interference , 2002, Proceedings 15th IEEE Computer Security Foundations Workshop. CSFW-15.
[14] Dieter Gollmann,et al. Computer Security – ESORICS 2004 , 2004, Lecture Notes in Computer Science.
[15] Peeter Laud,et al. Handling Encryption in an Analysis for Secure Information Flow , 2003, ESOP.
[16] Dieter Gollmann,et al. Computer Security — ESORICS 2002 , 2002, Lecture Notes in Computer Science.
[17] David von Oheimb. Information Flow Control Revisited: Noninfluence = Noninterference + Nonleakage , 2004, ESORICS.
[18] Geoffrey Smith,et al. Eliminating covert flows with minimum typings , 1997, Proceedings 10th Computer Security Foundations Workshop.
[19] David Sands,et al. A Per Model of Secure Information Flow in Sequential Programs , 1999, High. Order Symb. Comput..
[20] David Sands,et al. Probabilistic noninterference for multi-threaded programs , 2000, Proceedings 13th IEEE Computer Security Foundations Workshop. CSFW-13.
[21] Heiko Mantel,et al. Information Flow Control and Applications - Bridging a Gap , 2001, FME.
[22] Andrew C. Myers,et al. A Model for Delimited Information Release , 2003, ISSS.
[23] Gavin Lowe,et al. Quantifying information flow , 2002, Proceedings 15th IEEE Computer Security Foundations Workshop. CSFW-15.
[24] D. Elliott Bell,et al. Secure Computer System: Unified Exposition and Multics Interpretation , 1976 .
[25] José Nuno Oliveira,et al. FME 2001: Formal Methods for Increasing Software Productivity , 2001, Lecture Notes in Computer Science.
[26] Steve Zdancewic,et al. A Type System for Robust Declassification , 2003, MFPS.
[27] Richard J. Lipton,et al. Foundations of Secure Computation , 1978 .
[28] Geoffrey Smith,et al. Verifying secrets and relative secrecy , 2000, POPL '00.
[29] John C. Mitchell,et al. A Probabilistic Polynomial-time Calculus For Analysis of Cryptographic Protocols (Preliminary Report) , 2001, MFPS.
[30] Johan Agat,et al. Transforming out timing leaks , 2000, POPL '00.
[31] Andrew C. Myers,et al. Language-based information-flow security , 2003, IEEE J. Sel. Areas Commun..