Eliminating Covert Flows with Minimum Typings (1997)

by Dennis Volpano , Geoffrey Smith
Venue:In Proc. 10th IEEE Computer Security Foundations Workshop
Citations:67 - 6 self

Documents Related by Co-Citation

414 A SOUND TYPE SYSTEM FOR SECURE FLOW ANALYSIS – Dennis Volpano, Geoffrey Smith, Cynthia Irvine - 1996
399 Certification of programs for secure information flow – D E Denning, P J Denning - 1977
721 Security policies and security models – J A Goguen, J Meseguer - 1982
203 Secure information flow in a multi-threaded imperative language – Geoffrey Smith, Dennis Volpano - 1998
576 Language-Based Information-Flow Security – Andrei Sabelfeld , Andrew C. Myers - 2003
553 A Lattice Model of Secure Information Flow – Dorothy E. Denning - 1976
114 Jif: Java + information flow. Software release. Located at http://www.cs.cornell.edu/jif – A C MYERS, N NYSTROM, L ZHENG, S ZDANCEWIC - 2001
449 JFlow: Practical Mostly-Static Information Flow Control – Andrew C. Myers - 1999
77 Memoryless subsystems – J S Fenton - 1974
90 A Per Model of Secure Information Flow in Sequential Programs – Andrei Sabelfeld , David Sands - 1998
73 A Semantic Approach to Secure Information Flow – K. Rustan M. Leino, Rajeev Joshi - 1997
396 A Note on the Confinement Problem – Butler W. Lampson - 1973
43 Automata-based Confidentiality Monitoring – Gurvan Le Guernic, Anindya Banerjee, Thomas Jensen, David A. Schmidt - 2006
30 The FlowCaml system. Software release. Located at http://cristal.inria.fr/˜simonet/ soft/flowcaml – V Simonet - 2003
235 The slam calculus: programming with secrecy and integrity – Nevin Heintze, Jon G. Riecke - 1998
31 Compile-Time Detection of Information Flow in Sequential Programs – Jean-pierre Banâtre, Ciarán Bryce, Daniel Le Métayer - 1994
134 A type-based approach to pro-gram security – Dennis Volpano, Geoffrey Smith - 1997
92 Probabilistic noninterference in a concurrent language – Dennis Volpano, Geoffrey Smith - 1998
66 Reitman and. “An Axiomatic Approach to Information Flow in Programs – G R Andrews, R P - 1980