Information Technology Reference
In-Depth Information
Acknowledgments. This work benefits from the authors' visits to the In-
des Team at INRIA Sophia Antipolis and the Language Based Security Group
at Chalmers University of Technology, partially supported by the Portuguese
Foundation for Science and Technology. Thanks are due to Jose Santos for in-
sightful feedback.
References
1. Sabelfeld, A., Myers, A.C.: Language-based information-flow security. IEEE Jour-
nal on Selected Areas in Communications 21(1), 5-19 (2003)
2. Goguen, J.A., Meseguer, J.: Security policies and security models. In: 1982 IEEE
Symp. on Security and Privacy, pp. 11-20. IEEE Computer Society (1982)
3. Sabelfeld, A., Sands, D.: Dimensions and principles of declassification. In: 18th
IEEE Computer Security Foundations Workshop, pp. 255-269. IEEE Computer
Society (2005)
4. Boudol, G.: A generic membrane model (Note). In: Priami, C., Quaglia, P. (eds.)
GC 2004. LNCS, vol. 3267, pp. 208-222. Springer, Heidelberg (2005)
5. Martins, F., Vasconcelos, V.T.: History-based access control for distributed pro-
cesses. In: De Nicola, R., Sangiorgi, D. (eds.) TGC 2005. LNCS, vol. 3705,
pp. 98-115. Springer, Heidelberg (2005)
6. Almeida Matos, A.: Flow policy awareness for distributed mobile code. In: Bravetti,
M., Zavattaro, G. (eds.) CONCUR 2009. LNCS, vol. 5710, pp. 53-68. Springer,
Heidelberg (2009)
7. Denning, D.E.: A lattice model of secure information flow. Communications of the
ACM 19(5), 236-243 (1976)
8. Matosand, A.A., Santos, J.F.: Typing illegal information flows as program effects.
In: Proceedings of the 7th Workshop on Programming Languages and Analysis for
Security, PLAS 2012, pp. 1:1-1:12. ACM (2012)
9. Matos, A.A., Boudol, G.: On declassification and the non-disclosure policy. Journal
of Computer Security 17(5), 549-597 (2009)
10. Lucassen, J.M., Gifford, D.K.: Polymorphic effect systems. In: 15th ACM Symp.
on Principles of Programming Languages, pp. 47-57. ACM Press (1988)
11. Mairson, H.G.: Deciding ml typability is complete for deterministic exponential
time. In: Proceedings of the 17th ACM SIGPLAN-SIGACT Symposium on Prin-
ciples of Programming Languages, POPL 1990, pp. 382-401. ACM (1990)
12. Sabelfeld, A., Sands, D.: Declassification: Dimensions and principles. J. Comput.
Secur. 17, 517-548 (2009)
13. Boudol, G., Kolundzija, M.: Access Control and Declassification. In: Gorodetsky,
V., Kotenko, I., Skormin, V.A. (eds.) MMM-ACNS 2007. CCIS, vol. 1, pp. 85-98.
Springer, Heidelberg (2007)
14. Hennessy, M., Merro, M., Rathke, J.: Towards a behavioural theory of access and
mobility control in distributed systems. In: Gordon, A.D. (ed.) FOSSACS 2003.
LNCS, vol. 2620, pp. 282-298. Springer, Heidelberg (2003)
15. Levi, F., Sangiorgi, D.: Controlling interference in ambients. In: POPL 2000: Pro-
ceedings of the 27th ACM SIGPLAN-SIGACT Symposium on Principles of Pro-
gramming Languages, pp. 352-364. ACM, New York (2000)
Search WWH ::




Custom Search