A Per Model of Secure Information Flow in Sequential Programs (1998)

by Andrei Sabelfeld , David Sands
Venue:HIGHER-ORDER AND SYMBOLIC COMPUTATION
Citations:89 - 18 self

Documents Related by Co-Citation

414 A SOUND TYPE SYSTEM FOR SECURE FLOW ANALYSIS – Dennis Volpano, Geoffrey Smith, Cynthia Irvine - 1996
235 The slam calculus: programming with secrecy and integrity – Nevin Heintze, Jon G. Riecke - 1998
399 Certification of programs for secure information flow – D E Denning, P J Denning - 1977
721 Security policies and security models – J A Goguen, J Meseguer - 1982
203 Secure information flow in a multi-threaded imperative language – Geoffrey Smith, Dennis Volpano - 1998
449 JFlow: Practical Mostly-Static Information Flow Control – Andrew C. Myers - 1999
126 Probabilistic Noninterference for Multi-threaded Programs – Andrei Sabelfeld , David Sands - 1999
228 A Core Calculus of Dependency – Martín Abadi , Anindya Banerjee, Nevin Heintze, Jon G. Riecke - 1999
73 A Semantic Approach to Secure Information Flow – K. Rustan M. Leino, Rajeev Joshi - 1997
553 A Lattice Model of Secure Information Flow – Dorothy E. Denning - 1976
221 Information flow inference for ML – François Pottier, Vincent Simonet
52 Verifying secrets and rela-tive secrecy – Dennis Volpano, Geoffrey Smith - 2000
576 Language-Based Information-Flow Security – Andrei Sabelfeld , Andrew C. Myers - 2003
101 Secure Information Flow and Pointer Confinement in a Java-like Language – Anindya Banerjee, David A. Naumann - 2002
68 Information Flow Inference For Free – Franois Pottier, Sylvain Conchon - 2000
503 Cryptography and Data Security – Dorothy E. Denning, Peter, J. Denning - 1982
51 Quantitative Analysis of the Leakage of Confidential Data – David Clark, Sebastian Hunt , Pasquale Malacaria - 2001
68 Information Transmission in Sequential Programs – E S Cohen - 1978
155 Transforming out Timing Leaks – Johan Agat - 2000