Information Technology Reference
In-Depth Information
13. Riccardo Focardi, Sabina Rossi, and Andrei Sabelfeld: Bridging language-based
and process calculi security. FoSSaCS (2005) 299-315
14. Giacobazzi, R., Mastroeni, I.: Abstract non-interference: Parameterizing non-
interference by abstract interpretation. Proc. of the 31st Annual ACM SIGPLAN-
SIGACT Symposium on Principles of Programming Languages (POPL '04). ACM-
Press, NY (2004) 186-197
15. Goguen, J.A., Meseguer, J.: Security policies and security models. Proc. IEEE
Symp. on Security and Privacy. IEEE Computer Society Press (1982) 11-20
16. Kohei Honda, Vasco Thudichum Vasconcelos, and Nobuko Yoshida: Secure infor-
mation flow as typed process behaviour. ESOP (2000) 180-199
17. Hunt, S., Mastroeni., I.: The per model of abstract non-interference. Proc. of
The 12th Internat. Static Analysis Symp. (SAS'05), Lecture Notes in Computer
Science. Springer-Verlag (2005) To appear
18. Joshi, R., Leino, K.R.M.: A semantic approach to secure information flow. Science
of Computer Programming, 37 (2000) 113-138
19. Laud, P.: Semantics and program analysis of computationally secure information
flow. In Programming Languages and Systems, 10th European Symp. On Program-
ming, ESOP, volume 2028 of Lecture Notes in Computer Science , Springer-Verlag
(2001) 77-91
20. Mantel, H., Sabelfeld, A.: A unifying approach to the security of distributed and
multi-threaded programs. Journal of Computer Security, 11(4) (2003) 615-676
21. Milner, R.:
Communication and Concurrency.
Prentice-Hall, Inc., Englewood
Cliffs, New Jersey (1989)
22. Sabelfeld, A., Myers, A.C.: Language-based information-flow security. IEEE J. on
selected ares in communications, 21(1) (2003) 5-19
23. Sabelfeld, A., Sands, D.: A PER model of secure information flow in sequential
programs. Higher-Order and Symbolic Computation, 14(1) (2001) 59-91
24. Sabelfeld, A., Sands, D.: Dimensions and principles of declassification. Proc. of
18 th IEEE Computer Security Foundations Workshop (CSFW-18). IEEE Comp.
Soc. Press (2005)
25. Skalka, C., Smith, S.: Static enforcement of security with types. ICFP'00. ACM
Press, New York (2000) 254-267
26. Volpano, D.: Safety versus secrecy. Proc. of the 6th Static Analysis Symp. (SAS'99),
volume 1694 of Lecture Notes in Computer Science. Springer-Verlag (1999) 303-311
27. Volpano, D., Smith, G., Irvine, C.: A sound type system for secure flow analysis.
Journal of Computer Security, 4(2,3) (1996) 167-187
28. Zanotti, M.: Security typings by abstract interpretation. Proc. of The 9th Inter-
nat. Static Analysis Symp. (SAS'02), volume 2477 of Lecture Notes in Computer
Science . Springer-Verlag (2002) 360-375
29. Zdancewic, S., Myers, A.C.: Robust declassification. Proc. of the IEEE Computer
Security Foundations Workshop. IEEE Computer Society Press (2001) 15-23
Search WWH ::




Custom Search