Documents Related by Co-Citation

99 Access Control based on Execution History – Martin Abadi, Cedric Fournet - 2003
721 Security policies and security models – J A Goguen, J Meseguer - 1982
142 IRM Enforcement of Java Stack Inspection – Ulfar Erlingsson, Fred B. Schneider - 2000
467 Enforceable Security Policies – Fred B. Schneider
449 JFlow: Practical Mostly-Static Information Flow Control – Andrew C. Myers - 1999
235 The slam calculus: programming with secrecy and integrity – Nevin Heintze, Jon G. Riecke - 1998
414 A SOUND TYPE SYSTEM FOR SECURE FLOW ANALYSIS – Dennis Volpano, Geoffrey Smith, Cynthia Irvine - 1996
69 A Systematic Approach to Static Access Control – François Pottier, Christian Skalka, Scott Smith - 2001
228 A Core Calculus of Dependency – Martín Abadi , Anindya Banerjee, Nevin Heintze, Jon G. Riecke - 1999
576 Language-Based Information-Flow Security – Andrei Sabelfeld , Andrew C. Myers - 2003
106 Understanding Java Stack Inspection – Dan S. Wallach, Edward W. Felten - 1998
82 Inside Java 2 Platform Security – L Gong - 1999
53 SAFKASI: A Security Mechanism for Language-Based Systems – Dan S. Wallach, Andrew W. Appel, Edward W. Felten - 2000
23 The security architecture formerly known as stack inspection: A security mechanism for language-based systems – D S Wallach, E W Felten, A W Appel - 2000
101 Secure Information Flow and Pointer Confinement in a Java-like Language – Anindya Banerjee, David A. Naumann - 2002
399 Certification of programs for secure information flow – D E Denning, P J Denning - 1977
199 Detecting Format String Vulnerabilities with Type – Qualifiers Umesh Shankar, Umesh Shankar, Kunal Talwar, Jeffrey S. Foster, David Wagner - 2001
211 Protecting privacy using the decentralized label model – Andrew C. Myers, Barbara Liskov - 2000
221 Information flow inference for ML – François Pottier, Vincent Simonet