Information Technology Reference
In-Depth Information
12. Farzan, A., Chen, F., Meseguer, J., Rosu, G.: JavaRL: The rewriting logic semantics
of Java (2007),
http://fsl.cs.uiuc.edu/index.php/Rewriting_Logic_Semantics_of_Java
13. Focardi, R., Gorrieri, R., Focardi, R., Gorrieri, R.: A classification of security prop-
erties for process algebras. Journal of Computer Security 3, 5-33 (1994)
14. Francesco, N.D., Martin, L.: Instruction-level security typing by abstract interpre-
tation. International Journal of Information Security 6(2-3), 85-106 (2007)
15. Goguen, J.A., Meseguer, J.: Security policies and security models. In: IEEE Sym-
posium on Research in Security and Privacy, pp. 11-20 (1982)
16. Hunt, S., Sands, D.: On flow-sensitive security types. In: Conference record of
the 33rd ACM SIGPLAN-SIGACT Symposium on Principles Of Programming
Languages, POPL 2006, pp. 79-90 (2006)
17. Leavens, G., Baker, A., Ruby, C.: Preliminary design of JML: A behavioral interface
specification language for Java. ACM SIGSOFT Software Engineering Notes 31(3),
1-38 (2006)
18. Meseguer, J., Rosu, G.: The rewriting logic semantics project. Theoretical Com-
puter Science 373(3), 213-237 (2007)
19. Necula, G.C.: Proof carrying code. In: Proceedings of the 24th ACM SIGPLAN-
SIGACT Annual Symposium on Principles of Programming Languages POPL
1997, Paris, France, pp. 106-119 (1997)
20. Sabelfeld, A., Myers, A.: Language-based information-flow security. IEEE Journal
on Selected Areas in Communications 21(1), 5-19 (2003)
21. Shroff, P., Smith, S., Thober, M.: Dynamic dependency monitoring to secure infor-
mation flow. In: CSF 2007: Proceedings of the 20th IEEE Computer Security Foun-
dations Symposium, pp. 203-217. IEEE Computer Society, Los Alamitos (2007)
22. Volpano, D., Smith, G., Irvine, C.: A sound type system for secure flow analysis.
Computer Security 4(4), 167-187 (1996)
23. Warnier, M.: Language Based Security for Java and JML. PhD thesis, Radboud
University Nijmegen (2005)
24. Wasserrab, D., Lohner, D., Snelting, G.: On pdg-based noninterference and its
modular proof. In: Proceedings of the ACM SIGPLAN Fourth Workshop on Pro-
gramming Languages and Analysis for Security (PLAS 2009), pp. 31-44 (2009)
25. Zanardini, D.: Analysing non-interference with respect to classes. In: Proc. 10th
italian Conference on Theoretical Computer Science (ICTCS 2007), pp. 57-69
(2007)
26. Zanotti, M.: Security typings by abstract interpretation. In: Hermenegildo, M.V.,
Puebla, G. (eds.) SAS 2002. LNCS, vol. 2477, pp. 375-2002. Springer, Heidelberg
(2002)
 
 
Search WWH ::




Custom Search