JFlow: Practical Mostly-Static Information Flow Control (1999)

Cached

Download Links

by Andrew C. Myers
Venue:In Proc. 26th ACM Symp. on Principles of Programming Languages (POPL
Citations:452 - 28 self

Active Bibliography

55 Mostly-Static Decentralized Information Flow Control – Andrew C. Myers - 1999
582 Language-Based Information-Flow Security – Andrei Sabelfeld , Andrew C. Myers - 2003
76 Complete, Safe Information Flow with Decentralized Labels – Andrew C. Myers, Barbara Liskov - 1998
212 Protecting privacy using the decentralized label model – Andrew C. Myers, Barbara Liskov - 2000
66 A Model for Delimited Information Release – Andrei Sabelfeld, Andrew C. Myers - 2004
93 A Per Model of Secure Information Flow in Sequential Programs – Andrei Sabelfeld , David Sands - 1998
8 Static Analysis for the pi-calculus with Applications to Security – Chiara Bodei, Pierpaolo Degano, Flemming Nielson, Hanne Riis Nielson - 2001
4 Embedding Verifiable Information Flow Analysis – Dorina Ghindici, Gilles Grimaud, Isabelle Simplot-Ryl - 2006
142 Robust Declassification – Steve Zdancewic, Andrew C. Myers - 2001
Making distributed computation secure by construction – Lantian Zheng - 2007
8 Security Analysis using Flow Logics – Chiara Bodei, Pierpaolo Degano, Flemming Nielson, Hanne Riis Nelson - 2000
236 The slam calculus: programming with secrecy and integrity – Nevin Heintze, Jon G. Riecke - 1998
52 Secure Information Flow as Typed Process Behaviour – Kohei Honda, Vasco Vasconcelos, Nobuko Yoshida - 2000
200 Secure information flow in a multi-threaded imperative language – Geoffrey Smith, Dennis Volpano - 1998
57 Untrusted Hosts and Confidentiality: Secure Program Partitioning – Steve Zdancewic, Lantian Zheng, Nathaniel Nystrom, Andrew C. Myers - 2001
68 Secure Program Partitioning – Steve Zdancewic, Lantian Zheng, Nathaniel Nystrom, Andrew C. Myers - 2001
32 Enforcing robust declassification and qualified robustness – Andrew C. Myers, Andrei Sabelfeld, Steve Zdancewic - 2006
Modular Reasoning about . . . – Sruthi Bandhakavi - 2005
9 Owned Policies for Information Security – Hubie Chen Stephen Chong - 2004