A Per Model of Secure Information Flow in Sequential Programs (1998)

by Andrei Sabelfeld , David Sands
Venue:HIGHER-ORDER AND SYMBOLIC COMPUTATION
Citations:93 - 19 self

Documents Related by Co-Citation

417 A SOUND TYPE SYSTEM FOR SECURE FLOW ANALYSIS – Dennis Volpano, Geoffrey Smith, Cynthia Irvine - 1996
723 Security policies and security models – J A Goguen, J Meseguer - 1982
402 Certification of programs for secure information flow – D E Denning, P J Denning - 1977
235 The slam calculus: programming with secrecy and integrity – Nevin Heintze, Jon G. Riecke - 1998
449 JFlow: Practical Mostly-Static Information Flow Control – Andrew C. Myers - 1999
125 Probabilistic Noninterference for Multi-threaded Programs – Andrei Sabelfeld , David Sands - 1999
221 A Core Calculus of Dependency – Martín Abadi , Anindya Banerjee, Nevin Heintze, Jon G. Riecke - 1999
200 Secure information flow in a multi-threaded imperative language – Geoffrey Smith, Dennis Volpano - 1998
554 A Lattice Model of Secure Information Flow – Dorothy E. Denning - 1976
74 A Semantic Approach to Secure Information Flow – K. Rustan M. Leino, Rajeev Joshi - 1997
50 Verifying secrets and rela-tive secrecy – Dennis Volpano, Geoffrey Smith - 2000
576 Language-Based Information-Flow Security – Andrei Sabelfeld , Andrew C. Myers - 2003
217 Information flow inference for ML – François Pottier, Vincent Simonet
68 Information Flow Inference For Free – Franois Pottier, Sylvain Conchon - 2000
52 Quantitative Analysis of the Leakage of Confidential Data – David Clark, Sebastian Hunt , Pasquale Malacaria - 2001
70 E.S.: Information transmission in sequential programs – Cohen - 1978
101 Secure Information Flow and Pointer Confinement in a Java-like Language – Anindya Banerjee, David A. Naumann - 2002
114 Jif: Java information flow. Software release. Located at http://www.cs.cornell.edu/jif – A C Myers, L Zheng, S Zdancewic, S Chong, N Nystrom
141 Robust Declassification – Steve Zdancewic, Andrew C. Myers - 2001