Achieving information flow security through monadic control of effects (2009)

by William L. Harrison , James Hook
Venue:JOURNAL OF COMPUTER SECURITY
Citations:6 - 5 self

Active Bibliography

15 Achieving information flow security through precise control of effects – William L. Harrison - 2005
Interpretational Overhead in system software – Boris Feigin - 2011
76 Stack-based Access Control and Secure Information Flow – Anindya Banerjee, David A. Naumann - 2003
2 Proving noninterference by a fully complete translation to the simply typed λ-calculus – Naokata Shikuma, Atsushi Igarashi - 2006
3 Domain separation by construction – William Harrison, Mark Tullsen, James Hook - 2003
11 A logic for information flow analysis with an application to forward slicing of simple imperative programs – Torben Amtoft, Anindya Banerjee - 2004
30 Information flow analysis in logical form – Torben Amtoft, Anindya Banerjee
5 A Logic for Information Flow Analysis of Pointer Programs – Torben Amtoft, Sruthi Bandhakavi, Anindya Banerjee - 2005
DRAFT—Do not distribute Integrity Policies via a Library in Haskell – Albert Disertholf, Alejandro Russo
576 Language-Based Information-Flow Security – Andrei Sabelfeld , Andrew C. Myers - 2003
203 Secure information flow in a multi-threaded imperative language – Geoffrey Smith, Dennis Volpano - 1998
Run-time Label Propagation for Forensic Audit Data – Florian Buchholz, Eugene H. Spafford - 2006
4 PERVASIVE BINDING OF LABELS TO SYSTEM PROCESSES – Florian Buchholz - 2005
48 Observational Determinism for Concurrent Program Security – Steve Zdancewic, Andrew C. Myers - 2003
Making distributed computation secure by construction – Lantian Zheng - 2007
5 Unifying Facets of Information Integrity – Arnar Birgisson, Alejandro Russo, Andrei Sabelfeld
17 History-based Access Control and Secure Information Flow – Anindya Banerjee, David A. Naumann - 2005
9 Dynamic Security Labels and Static Information Flow Control – Lantian Zheng, Andrew C. Myers
35 Semantic Lego – David Espinosa - 1995