Information Technology Reference
In-Depth Information
3. Clark, D., Hunt, S., Malacaria P.: Quantified interference for a while language.
Electronic Notes Theoretical Computer Science, 112 (2005) 149-166
4. Giacobazzi, R., Mastroeni, I.: Abstract non-interference: parameterizing non-
interference by abstract interpretation. Proceedings of the 31st ACM SIGPLAN-
SIGACT Symposium on Principles of Programming Languages. ACM (2004) 186-
197
5. Goguen, J.A., Meseguer, J.: Security policies and security models. Proc. IEEE
Symp. on Security and Privacy (April 1982) 11-20
6. James W. Gray III: Toward a mathematical foundation for information flow se-
curity. Proc. 1991 IEEE Symposium on Security and Privacy. IEEE Computer
Society Press (1991) 21-35
7. J.W. Gray III: Probabilistic interference. Proc. IEEE Symp. on Security and Pri-
vacy (May 1990) 170-179
8. Halpern, J.Y., O'Neill, K.R.: Secrecy in multiagent systems. Proc. IEEE Computer
Security Foundations Workshop (2002)
9. Lowe, G.: Quantifying information flow. Proc. IEEE Computer Security Founda-
tions Workshop (June 2002) 18-31
10. Mantel, H.: Possibilistic definitions of security - An assembly kit.
Proc. IEEE
Computer Security Foundations Workshop (July 2000) 185-199
11. McCullough, D.: Specifications for multi-level security and hook-up property. Proc.
IEEE Symp. on Security and Privacy (April 1987) 161-166
12. McLean, J.: Security models and information flow. Proc. IEEE Symp. on Security
and Privacy (May 1990) 180-187
13. McLean, J.: A general theory of composition for trace sets closed under selective
interleaving functions. Proc. IEEE Symp. on Security and Privacy (May 1994)
79-93
14. O'Halloran, C.: A calculus of information flow. Proc. of the European Symposium
on Research in Security and Privacy (ESoRiCS'90) (1990) 180-187
15. Di Pierro, A., Hankin, C., Wiklicky, H.: Approximate non-interference. Journal of
Computer Security, 12 (2004) 37-82
16. Sabelfeld, A., Sands, D.: Probabilistic noninterference for multi-threaded programs.
Proc. IEEE Computer Security Foundations Workshop (July 2000) 200-214
17. Slissenko, A.: On probabilistic modeling of information flow. Talk at a working
seminar of LACL (2004)
18. Zakinthinos, A., Lee, E.S.: A general theory of security properties. Proc. IEEE
Symp. on Security and Privacy. IEEE Computer Society Press (1997) 74-102
Search WWH ::




Custom Search