Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
123 | Yûta Kaneko, Naoki Kobayashi 0001 |
Linear Declassification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESOP ![In: Programming Languages and Systems, 17th European Symposium on Programming, ESOP 2008, Held as Part of the Joint European Conferences on Theory and Practice of Software, ETAPS 2008, Budapest, Hungary, March 29-April 6, 2008. Proceedings, pp. 224-238, 2008, Springer, 978-3-540-78738-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
117 | Boniface Hicks, Dave King 0002, Patrick D. McDaniel, Michael Hicks 0001 |
Trusted declassification: : high-level policy for a security-typed language. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PLAS ![In: Proceedings of the 2006 Workshop on Programming Languages and Analysis for Security, PLAS 2006, Ottawa, Ontario, Canada, June 10, 2006, pp. 65-74, 2006, ACM, 1-59593-374-3. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
noninterference modolo trusted methods, FJifP, Jif, security-typed languages, trusted declassification, security policy, information-flow control, declassification |
112 | Gilles Barthe, Salvador Cavadini, Tamara Rezk |
Tractable Enforcement of Declassification Policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: Proceedings of the 21st IEEE Computer Security Foundations Symposium, CSF 2008, Pittsburgh, Pennsylvania, USA, 23-25 June 2008, pp. 83-97, 2008, IEEE Computer Society, 978-0-7695-3182-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
type systems, declassification, information flow security |
112 | Roberto Giacobazzi, Isabella Mastroeni |
Adjoining Declassification and Attack Models by Abstract Interpretation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESOP ![In: Programming Languages and Systems, 14th European Symposium on Programming, ESOP 2005, Held as Part of the Joint European Conferences on Theory and Practice of Software, ETAPS 2005, Edinburgh, UK, April 4-8, 2005, Proceedings, pp. 295-310, 2005, Springer, 3-540-25435-8. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
abstract non-interference, Abstract interpretation, completeness, language-based security, declassification, adjunction, attack models |
96 | Stephen Chong, Andrew C. Myers |
End-to-End Enforcement of Erasure and Declassification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: Proceedings of the 21st IEEE Computer Security Foundations Symposium, CSF 2008, Pittsburgh, Pennsylvania, USA, 23-25 June 2008, pp. 98-111, 2008, IEEE Computer Society, 978-0-7695-3182-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Erasure, Expressive security policies, Information flow, Language-based security, Noninterference, Declassification |
90 | Anindya Banerjee 0001, David A. Naumann, Stan Rosenberg |
Towards a logical account of declassification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PLAS ![In: Proceedings of the 2007 Workshop on Programming Languages and Analysis for Security, PLAS 2007, San Diego, California, USA, June 14, 2007, pp. 61-66, 2007, ACM, 978-1-59593-711-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
information flow, confidentiality, aliasing |
90 | Aslan Askarov, Andrei Sabelfeld |
Gradual Release: Unifying Declassification, Encryption and Key Release Policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
S&P ![In: 2007 IEEE Symposium on Security and Privacy (S&P 2007), 20-23 May 2007, Oakland, California, USA, pp. 207-221, 2007, IEEE Computer Society, 0-7695-2848-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
87 | Andrei Sabelfeld, Andrew C. Myers |
A Model for Delimited Information Release. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISSS ![In: Software Security - Theories and Systems, Second Mext-NSF-JSPS International Symposium, ISSS 2003, Tokyo, Japan, November 4-6, 2003, Revised Papers, pp. 174-191, 2003, Springer, 3-540-23635-X. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
Computer security, information flow, security policies, confidentiality, noninterference, declassification, security-type systems |
79 | Anindya Banerjee 0001, David A. Naumann, Stan Rosenberg |
Expressive Declassification Policies and Modular Static Enforcement. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SP ![In: 2008 IEEE Symposium on Security and Privacy (SP 2008), 18-21 May 2008, Oakland, California, USA, pp. 339-353, 2008, IEEE Computer Society, 978-0-7695-3168-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
verification, information flow, declassification, downgrading |
74 | Heiko Mantel, Alexander Reinhard |
Controlling the What and Where of Declassification in Language-Based Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESOP ![In: Programming Languages and Systems, 16th European Symposium on Programming, ESOP 2007, Held as Part of the Joint European Conferences on Theory and Practics of Software, ETAPS 2007, Braga, Portugal, March 24 - April 1, 2007, Proceedings, pp. 141-156, 2007, Springer, 978-3-540-71314-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
74 | Ana Almeida Matos, Gérard Boudol |
On Declassification and the Non-Disclosure Policy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSFW ![In: 18th IEEE Computer Security Foundations Workshop, (CSFW-18 2005), 20-22 June 2005, Aix-en-Provence, France, pp. 226-240, 2005, IEEE Computer Society, 0-7695-2340-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
74 | Bernadette Power, Geoff W. Hamilton |
Declassification: Transforming Java Programs to Remove Intermediate Classes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: 5th IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2005), 30 September - 1 October 2005, Budapest, Hungary, pp. 183-192, 2005, IEEE Computer Society, 0-7695-2290-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
74 | Steve Zdancewic, Andrew C. Myers |
Robust Declassification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSFW ![In: 14th IEEE Computer Security Foundations Workshop (CSFW-14 2001), 11-13 June 2001, Cape Breton, Nova Scotia, Canada, pp. 15-23, 2001, IEEE Computer Society, 0-7695-1146-5. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
71 | Isabella Mastroeni |
On the Rôle of Abstract Non-interference in Language-Based Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
APLAS ![In: Programming Languages and Systems, Third Asian Symposium, APLAS 2005, Tsukuba, Japan, November 2-5, 2005, Proceedings, pp. 418-433, 2005, Springer, 3-540-29735-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Language-based Security, Non-Interference, Declassification |
66 | Alexander Lux, Heiko Mantel |
Who Can Declassify?. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Formal Aspects in Security and Trust ![In: Formal Aspects in Security and Trust, 5th International Workshop, FAST 2008, Malaga, Spain, October 9-10, 2008, Revised Selected Papers, pp. 35-49, 2008, Springer. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
57 | Andrei Sabelfeld, David Sands 0001 |
Dimensions and Principles of Declassification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSFW ![In: 18th IEEE Computer Security Foundations Workshop, (CSFW-18 2005), 20-22 June 2005, Aix-en-Provence, France, pp. 255-269, 2005, IEEE Computer Society, 0-7695-2340-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
57 | Stephen Tse, Steve Zdancewic |
A Design for a Security-Typed Language with Certificate-Based Declassification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESOP ![In: Programming Languages and Systems, 14th European Symposium on Programming, ESOP 2005, Held as Part of the Joint European Conferences on Theory and Practice of Software, ETAPS 2005, Edinburgh, UK, April 4-8, 2005, Proceedings, pp. 279-294, 2005, Springer, 3-540-25435-8. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
57 | Andrew C. Myers, Andrei Sabelfeld, Steve Zdancewic |
Enforcing Robust Declassification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSFW ![In: 17th IEEE Computer Security Foundations Workshop, (CSFW-17 2004), 28-30 June 2004, Pacific Grove, CA, USA, pp. 172-186, 2004, IEEE Computer Society, 0-7695-2169-X. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
54 | Sruthi Bandhakavi, Charles C. Zhang, Marianne Winslett |
Super-sticky and declassifiable release policies for flexible information dissemination control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WPES ![In: Proceedings of the 2006 ACM Workshop on Privacy in the Electronic Society, WPES 2006, Alexandria, VA, USA, October 30, 2006, pp. 51-58, 2006, ACM, 1-59593-556-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
release policies, privacy, declassification, sticky policies |
54 | Stephen Chong, Andrew C. Myers |
Security policies for downgrading. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 11th ACM Conference on Computer and Communications Security, CCS 2004, Washington, DC, USA, October 25-29, 2004, pp. 198-209, 2004, ACM, 1-58113-961-6. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
information flow, security policies, noninterference, declassification, downgrading |
46 | Jeffrey A. Vaughan, Stephen Chong |
Inference of Expressive Declassification Policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Symposium on Security and Privacy ![In: 32nd IEEE Symposium on Security and Privacy, SP 2011, 22-25 May 2011, Berkeley, California, USA, pp. 180-195, 2011, IEEE Computer Society, 978-1-4577-0147-4. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
declassification policies, inference of security policies, information flow, language-based security |
41 | Andrei Sabelfeld |
Dimensions of Declassification in Theory and Practice. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIAN ![In: Advances in Computer Science - ASIAN 2007. Computer and Network Security, 12th Asian Computing Science Conference, Doha, Qatar, December 9-11, 2007, Proceedings, pp. 1, 2007, Springer, 978-3-540-76927-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
41 | Li Jiang, Lingdi Ping, Xuezeng Pan |
Combining robust declassification and intransitive noninterference. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IMSCCS ![In: Proceeding of the Second International Multi-Symposium of Computer and Computational Sciences (IMSCCS 2007), August 13-15, 2007, The University of Iowa, Iowa City, Iowa, USA, pp. 465-471, 2007, IEEE Computer Society, 0-7695-3039-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
38 | Jonas Magazinius, Aslan Askarov, Andrei Sabelfeld |
A lattice-based approach to mashup security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, ASIACCS 2010, Beijing, China, April 13-16, 2010, pp. 15-23, 2010, ACM, 978-1-60558-936-7. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
web mashups, information flow, security policies, lattices, noninterference, declassification |
38 | Limin Jia 0001, Steve Zdancewic |
Encoding information flow in Aura. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PLAS ![In: Proceedings of the 2009 Workshop on Programming Languages and Analysis for Security, PLAS 2009, Dublin, Ireland, 15-21 June, 2009, pp. 17-29, 2009, ACM, 978-1-60558-645-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
access control, information flow control, declassification, security type system, authorization logic |
38 | Niklas Broberg, David Sands 0001 |
Flow-sensitive semantics for dynamic information flow policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PLAS ![In: Proceedings of the 2009 Workshop on Programming Languages and Analysis for Security, PLAS 2009, Dublin, Ireland, 15-21 June, 2009, pp. 101-112, 2009, ACM, 978-1-60558-645-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
information flow control, declassification, security type system |
38 | Alejandro Russo, Koen Claessen, John Hughes 0001 |
A library for light-weight information-flow security in haskell. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Haskell ![In: Proceedings of the 1st ACM SIGPLAN Symposium on Haskell, Haskell 2008, Victoria, BC, Canada, 25 September 2008, pp. 13-24, 2008, ACM, 978-1-60558-064-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
information-flow, library, monad, declassification |
38 | Scott F. Smith 0001, Mark Thober |
Refactoring programs to secure information flows. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PLAS ![In: Proceedings of the 2006 Workshop on Programming Languages and Analysis for Security, PLAS 2006, Ottawa, Ontario, Canada, June 10, 2006, pp. 75-84, 2006, ACM, 1-59593-374-3. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
refactoring, information flow, slicing, declassification |
33 | Yi Lu 0003, John Potter, Jingling Xue |
Ownership Downgrading for Ownership Types. ![Search on Bibsonomy](Pics/bibsonomy.png) |
APLAS ![In: Programming Languages and Systems, 7th Asian Symposium, APLAS 2009, Seoul, Korea, December 14-16, 2009. Proceedings, pp. 144-160, 2009, Springer, 978-3-642-10671-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
33 | Niklas Broberg, David Sands 0001 |
Improving the Semantics of Imperfect Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARSPA-WITS ![In: Foundations and Applications of Security Analysis, Joint Workshop on Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security, ARSPA-WITS 2009, York, UK, March 28-29, 2009, Revised Selected Papers, pp. 88-91, 2009, Springer, 978-3-642-03458-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
33 | Aslan Askarov, Andrei Sabelfeld |
Localized delimited release: combining the what and where dimensions of information release. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PLAS ![In: Proceedings of the 2007 Workshop on Programming Languages and Analysis for Security, PLAS 2007, San Diego, California, USA, June 14, 2007, pp. 53-60, 2007, ACM, 978-1-59593-711-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
de-classification, information flow, security policies, noninterference, downgrading |
33 | Stephen Chong, Andrew C. Myers |
Language-Based Information Erasure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSFW ![In: 18th IEEE Computer Security Foundations Workshop, (CSFW-18 2005), 20-22 June 2005, Aix-en-Provence, France, pp. 241-254, 2005, IEEE Computer Society, 0-7695-2340-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
33 | Tom Chothia, Dominic Duggan, Jan Vitek |
Type-Based Distributed Access Control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSFW ![In: 16th IEEE Computer Security Foundations Workshop (CSFW-16 2003), 30 June - 2 July 2003, Pacific Grove, CA, USA, pp. 170-, 2003, IEEE Computer Society, 0-7695-1927-X. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
25 | Emmanuel Hainry, Bruce M. Kapron, Jean-Yves Marion, Romain Péchoux |
Declassification Policy for Program Complexity Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2401.14957, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
25 | Jan Menz, Andrew K. Hirsch, Peixuan Li, Deepak Garg 0001 |
Compositional Security Definitions for Higher-Order Where Declassification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Proc. ACM Program. Lang. ![In: Proc. ACM Program. Lang. 7(OOPSLA1), pp. 406-433, April 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
25 | Wenfa Li, Zhi Yang, Jia Liu |
Automatic analysis of DIFC systems using noninterference with declassification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Neural Comput. Appl. ![In: Neural Comput. Appl. 34(12), pp. 9385-9396, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
25 | Sankha Narayan Guria, Niki Vazou, Marco Guarnieri, James Parker |
ANOSY: Approximated Knowledge Synthesis with Refinement Types for Declassification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2203.12069, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
25 | Graeme Smith 0001 |
Declassification Predicates for Controlled Information Release. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICFEM ![In: Formal Methods and Software Engineering - 23rd International Conference on Formal Engineering Methods, ICFEM 2022, Madrid, Spain, October 24-27, 2022, Proceedings, pp. 298-315, 2022, Springer, 978-3-031-17243-4. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
25 | Zhenheng Dong, Yongxin Zhao, Qiang Wang |
An Information Flow Security Logic for Permission-Based Declassification Strategy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEKE ![In: The 34th International Conference on Software Engineering and Knowledge Engineering, SEKE 2022, KSIR Virtual Conference Center, USA, July 1 - July 10, 2022., pp. 519-524, 2022, KSI Research Inc., 1-891706-54-3. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
25 | Yuxuan Wang, Haowen Yan, Liming Zhang |
A New Declassification Method for Vector Geographic Data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSW ![In: Proceedings of the 2022 International Conference on Cyber Security, CSW 2022, Hangzhou, China, December 16-18, 2022, pp. 58-62, 2022, ACM. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
25 | Sankha Narayan Guria, Niki Vazou, Marco Guarnieri, James Parker |
ANOSY: approximated knowledge synthesis with refinement types for declassification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PLDI ![In: PLDI '22: 43rd ACM SIGPLAN International Conference on Programming Language Design and Implementation, San Diego, CA, USA, June 13 - 17, 2022, pp. 15-30, 2022, ACM, 978-1-4503-9265-5. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
25 | Johan Bay, Aslan Askarov |
Reconciling progress-insensitive noninterference and declassification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2005.01977, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP BibTeX RDF |
|
25 | Minh Ngo, David A. Naumann, Tamara Rezk |
Type-Based Declassification for Free. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICFEM ![In: Formal Methods and Software Engineering - 22nd International Conference on Formal Engineering Methods, ICFEM 2020, Singapore, Singapore, March 1-3, 2021, Proceedings, pp. 181-197, 2020, Springer, 978-3-030-63405-6. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
25 | Johan Bay, Aslan Askarov |
Reconciling progress-insensitive noninterference and declassification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: 33rd IEEE Computer Security Foundations Symposium, CSF 2020, Boston, MA, USA, June 22-26, 2020, pp. 95-106, 2020, IEEE, 978-1-7281-6572-1. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
25 | Wen Luo, Dongshuang Li, Zhaoyuan Yu, Yun Wang, Zhengjun Yan, Linwang Yuan |
Geometric Algebra-Based Multilevel Declassification Method for Geographical Field Data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CGI ![In: Advances in Computer Graphics - 37th Computer Graphics International Conference, CGI 2020, Geneva, Switzerland, October 20-23, 2020, Proceedings, pp. 501-512, 2020, Springer, 978-3-030-61863-6. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
25 | Matteo Busi 0001, Pierpaolo Degano, Letterio Galletta |
Robust Declassification by Incremental Typing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Foundations of Security, Protocols, and Equational Reasoning ![In: Foundations of Security, Protocols, and Equational Reasoning - Essays Dedicated to Catherine A. Meadows, pp. 54-69, 2019, Springer, 978-3-030-19051-4. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
25 | Thomas Bauereiß |
Composition and Declassification in Possibilistic Information Flow Security. (PDF / PS) ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2019 |
RDF |
|
25 | Hao Zhu, Jianping Chen |
软件系统的可信降密述评 (Review of Trust Declassification for Software System). ![Search on Bibsonomy](Pics/bibsonomy.png) |
计算机科学 ![In: 计算机科学 45(6A), pp. 36-40, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP BibTeX RDF |
|
25 | Ning Xi 0002, Di Lu, Cong Sun 0001, Jianfeng Ma 0001, Yulong Shen |
Distributed Secure Service Composition with Declassification in Mobile Clouds. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Mob. Inf. Syst. ![In: Mob. Inf. Syst. 2017, pp. 7469342:1-7469342:13, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
25 | Willard Rafnsson, Andrei Sabelfeld |
Secure multi-execution: Fine-grained, declassification-aware, and transparent. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Secur. ![In: J. Comput. Secur. 24(1), pp. 39-90, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
25 | Kurt Stenzel, Kuzman Katkalov, Marian Borek, Wolfgang Reif |
Declassification of Information with Complex Filter Functions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISSP ![In: Proceedings of the 2nd International Conference on Information Systems Security and Privacy, ICISSP 2016, Rome, Italy, February 19-21, 2016., pp. 490-497, 2016, SciTePress, 978-989-758-167-0. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
25 | Iulia Bolosteanu, Deepak Garg 0001 |
Asymmetric Secure Multi-execution with Declassification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POST ![In: Principles of Security and Trust - 5th International Conference, POST 2016, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2016, Eindhoven, The Netherlands, April 2-8, 2016, Proceedings, pp. 24-45, 2016, Springer, 978-3-662-49634-3. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
25 | Simon Greiner, Daniel Grahl |
Non-interference with What-Declassification in Component-Based Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: IEEE 29th Computer Security Foundations Symposium, CSF 2016, Lisbon, Portugal, June 27 - July 1, 2016, pp. 253-267, 2016, IEEE Computer Society, 978-1-5090-2607-4. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
25 | Ning Xi 0002, Cong Sun 0001, Jianfeng Ma 0001, Yulong Shen, Di Lu |
Distributed Secure Service Composition with Declassification in Mobile Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NaNA ![In: International Conference on Networking and Network Applications, NaNA 2016, Hakodate City, Hokkaido, Japan, July 23-25, 2016, pp. 254-259, 2016, IEEE Computer Society, 978-1-4673-9803-9. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
25 | Bart van Delft, Richard Bubel |
Dependency-Based Information Flow Analysis with Declassification in a Program Logic. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1509.04153, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP BibTeX RDF |
|
25 | Kristopher K. Micinski, Jonathan Fetter-Degges, Jinseong Jeon, Jeffrey S. Foster, Michael R. Clarkson |
Checking Interaction-Based Declassification Policies for Android Using Symbolic Execution. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1504.03711, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP BibTeX RDF |
|
25 | Li Jin, Hao Zhu |
多线程环境中的二维降密策略 (Two-dimension Declassification Policy in Multithreaded Environments). ![Search on Bibsonomy](Pics/bibsonomy.png) |
计算机科学 ![In: 计算机科学 42(12), pp. 243-246, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP BibTeX RDF |
|
25 | Li Jin, Hao Zhu |
基于自动机监控的二维降密策略 (Declassification Policy Based on Automaton Monitoring). ![Search on Bibsonomy](Pics/bibsonomy.png) |
计算机科学 ![In: 计算机科学 42(7), pp. 194-199, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
25 | Kristopher K. Micinski, Jonathan Fetter-Degges, Jinseong Jeon, Jeffrey S. Foster, Michael R. Clarkson |
Checking Interaction-Based Declassification Policies for Android Using Symbolic Execution. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS (2) ![In: Computer Security - ESORICS 2015 - 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part II, pp. 520-538, 2015, Springer, 978-3-319-24176-0. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
25 | Sylvia Grewe, Alexander Lux, Heiko Mantel, Jens Sauer |
A Formalization of Declassification with WHAT-and-WHERE-Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Arch. Formal Proofs ![In: Arch. Formal Proofs 2014, 2014. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP BibTeX RDF |
|
25 | Mathy Vanhoef, Willem De Groef, Dominique Devriese, Frank Piessens, Tamara Rezk |
Stateful Declassification Policies for Event-Driven Programs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: IEEE 27th Computer Security Foundations Symposium, CSF 2014, Vienna, Austria, 19-22 July, 2014, pp. 293-307, 2014, IEEE Computer Society, 978-1-4799-4290-9. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
25 | Bruno P. S. Rocha, Mauro Conti, Sandro Etalle, Bruno Crispo |
Hybrid Static-Runtime Information Flow and Declassification Enforcement. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Inf. Forensics Secur. ![In: IEEE Trans. Inf. Forensics Secur. 8(8), pp. 1294-1305, 2013. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
25 | Willard Rafnsson, Andrei Sabelfeld |
Secure Multi-execution: Fine-Grained, Declassification-Aware, and Transparent. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: 2013 IEEE 26th Computer Security Foundations Symposium, New Orleans, LA, USA, June 26-28, 2013, pp. 33-48, 2013, IEEE Computer Society, 978-0-7695-5031-2. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
25 | Hao Zhu, Yi Zhuang 0002 |
Flow-Sensitive Automaton-Based Monitoring of a Declassification Policy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Softw. ![In: J. Softw. 7(11), pp. 2478-2487, 2012. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
25 | Alexander Lux, Heiko Mantel, Matthias Perner |
Scheduler-Independent Declassification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MPC ![In: Mathematics of Program Construction - 11th International Conference, MPC 2012, Madrid, Spain, June 25-27, 2012. Proceedings, pp. 25-47, 2012, Springer, 978-3-642-31112-3. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
25 | Eike Best, Philippe Darondeau |
Deciding Selective Declassification of Petri Nets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POST ![In: Principles of Security and Trust - First International Conference, POST 2012, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2012, Tallinn, Estonia, March 24 - April 1, 2012, Proceedings, pp. 290-308, 2012, Springer, 978-3-642-28640-7. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
25 | Cong Sun 0001, Sheng Gao 0002, Jianfeng Ma 0001 |
Verifying Location-Based Services with Declassification Enforcement. ![Search on Bibsonomy](Pics/bibsonomy.png) |
APWeb ![In: Web Technologies and Applications - 14th Asia-Pacific Web Conference, APWeb 2012, Kunming, China, April 11-13, 2012. Proceedings, pp. 695-702, 2012, Springer, 978-3-642-29252-1. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
25 | Harold C. Relyea |
Declassification review of congressional records. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Gov. Inf. Q. ![In: Gov. Inf. Q. 28(1), pp. 1-2, 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
25 | Isabella Mastroeni, Anindya Banerjee 0001 |
Modelling declassification policies using abstract domain completeness. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Math. Struct. Comput. Sci. ![In: Math. Struct. Comput. Sci. 21(6), pp. 1253-1299, 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
25 | Cong Sun 0001, Liyong Tang, Zhong Chen 0001 |
A New Enforcement on Declassification with Reachability Analysis ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1108.4172, 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP BibTeX RDF |
|
25 | Julien A. Thomas, Nora Cuppens-Boulahia, Frédéric Cuppens |
Declassification Policy Management in Dynamic Information Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Sixth International Conference on Availability, Reliability and Security, ARES 2011, Vienna, Austria, August 22-26, 2011, pp. 143-152, 2011, IEEE Computer Society, 978-1-4577-0979-1. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
25 | Daniel Abril, Guillermo Navarro-Arribas, Vicenç Torra |
On the Declassification of Confidential Documents. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MDAI ![In: Modeling Decision for Artificial Intelligence - 8th International Conference, MDAI 2011, Changsha, Hunan, China, July 28-30, 2011, Proceedings, pp. 235-246, 2011, Springer, 978-3-642-22588-8. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
25 | Julien A. Thomas, Frédéric Cuppens, Nora Cuppens-Boulahia |
Consistency Policies for Dynamic Information Systems with Declassification Flows. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security - 7th International Conference, ICISS 2011, Kolkata, India, December 15-19, 2011, Procedings, pp. 87-101, 2011, Springer, 978-3-642-25559-5. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
25 | Vikki Gordon |
National Security Directive declassification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Gov. Inf. Q. ![In: Gov. Inf. Q. 27(4), pp. 322-328, 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
25 | Aslan Askarov, Andrew C. Myers |
A Semantic Framework for Declassification and Endorsement. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESOP ![In: Programming Languages and Systems, 19th European Symposium on Programming, ESOP 2010, Held as Part of the Joint European Conferences on Theory and Practice of Software, ETAPS 2010, Paphos, Cyprus, March 20-28, 2010. Proceedings, pp. 64-84, 2010, Springer, 978-3-642-11956-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
25 | Bruno P. S. Rocha, Sruthi Bandhakavi, Jerry den Hartog, William H. Winsborough, Sandro Etalle |
Towards Static Flow-Based Declassification for Legacy and Untrusted Programs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Symposium on Security and Privacy ![In: 31st IEEE Symposium on Security and Privacy, SP 2010, 16-19 May 2010, Berleley/Oakland, California, USA, pp. 93-108, 2010, IEEE Computer Society, 978-0-7695-4035-1. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
25 | Josef Svenningsson, David Sands 0001 |
Specification and Verification of Side Channel Declassification ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/0912.2952, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP BibTeX RDF |
|
25 | Andrei Sabelfeld, David Sands 0001 |
Declassification: Dimensions and principles. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Secur. ![In: J. Comput. Secur. 17(5), pp. 517-548, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
25 | Ana Almeida Matos, Gérard Boudol |
On declassification and the non-disclosure policy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Secur. ![In: J. Comput. Secur. 17(5), pp. 549-597, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
25 | Thomas Demongeot, Julien Mallet, Yves Le Traon |
Runtime verification of declassification for imperative programs: Formal foundations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRiSIS ![In: CRiSIS 2009, Post-Proceedings of the Fourth International Conference on Risks and Security of Internet and Systems, Toulouse, France, October 19-22, 2009, pp. 43-50, 2009, IEEE, 978-1-4244-4498-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
25 | Alexander Lux, Heiko Mantel |
Declassification with Explicit Reference Points. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2009, 14th European Symposium on Research in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings, pp. 69-85, 2009, Springer, 978-3-642-04443-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
25 | Josef Svenningsson, David Sands 0001 |
Specification and Verification of Side Channel Declassification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Formal Aspects in Security and Trust ![In: Formal Aspects in Security and Trust, 6th International Workshop, FAST 2009, Eindhoven, The Netherlands, November 5-6, 2009, Revised Selected Papers, pp. 111-125, 2009, Springer, 978-3-642-12458-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
25 | Anindya Banerjee 0001, Roberto Giacobazzi, Isabella Mastroeni |
What You Lose is What You Leak: Information Leakage in Declassification Policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MFPS ![In: Proceedings of the 23rd Conference on the Mathematical Foundations of Programming Semantics, MFPS 2007, New Orleans, LA, USA, April 11-14, 2007, pp. 47-66, 2007, Elsevier. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
25 | Andrew C. Myers, Andrei Sabelfeld, Steve Zdancewic |
Enforcing Robust Declassification and Qualified Robustness. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Secur. ![In: J. Comput. Secur. 14(2), pp. 157-196, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
25 | Heiko Mantel, David Sands 0001 |
Controlled Declassification Based on Intransitive Noninterference. ![Search on Bibsonomy](Pics/bibsonomy.png) |
APLAS ![In: Programming Languages and Systems: Second Asian Symposium, APLAS 2004, Taipei, Taiwan, November 4-6, 2004. Proceedings, pp. 129-145, 2004, Springer, 3-540-23724-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
25 | Steve Zdancewic |
A Type System for Robust Declassification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MFPS ![In: Proceedings of 19th Conference on the Mathematical Foundations of Programming Semantics, MFPS 2003, Université de Montréal, QC, Canada, March 19-22, 2003, pp. 263-277, 2003, Elsevier. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
22 | Musard Balliu, Isabella Mastroeni |
A weakest precondition approach to active attacks analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PLAS ![In: Proceedings of the 2009 Workshop on Programming Languages and Analysis for Security, PLAS 2009, Dublin, Ireland, 15-21 June, 2009, pp. 59-71, 2009, ACM, 978-1-60558-645-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
robustness, non-interference, declassification, program semantics, active attackers |
22 | Avraham Shinnar, Marco Pistoia, Anindya Banerjee 0001 |
A language for information flow: dynamic tracking in multiple interdependent dimensions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PLAS ![In: Proceedings of the 2009 Workshop on Programming Languages and Analysis for Security, PLAS 2009, Dublin, Ireland, 15-21 June, 2009, pp. 125-131, 2009, ACM, 978-1-60558-645-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
information flow control, declassification, security type system |
22 | Nikhil Swamy, Michael Hicks 0001 |
Verified enforcement of stateful information release policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM SIGPLAN Notices ![In: ACM SIGPLAN Notices 43(12), pp. 21-31, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
affine types, certified evaluation, state modifying policies, dependent types, declassification, singleton types |
22 | Nikhil Swamy, Michael Hicks 0001 |
Verified enforcement of stateful information release policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PLAS ![In: Proceedings of the 2008 Workshop on Programming Languages and Analysis for Security, PLAS 2008, Tucson, AZ, USA, June 8, 2008, pp. 21-32, 2008, ACM, 978-1-59593-936-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
certified evaluation, state modifying, dependent, declassification, affine, singleton types |
22 | Scott F. Smith 0001, Mark Thober |
Improving usability of information flow security in java. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PLAS ![In: Proceedings of the 2007 Workshop on Programming Languages and Analysis for Security, PLAS 2007, San Diego, California, USA, June 14, 2007, pp. 11-20, 2007, ACM, 978-1-59593-711-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
java, security policies, type inference, declassification, information flow security |
22 | Steve Zdancewic, Lantian Zheng, Nathaniel Nystrom, Andrew C. Myers |
Secure program partitioning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Comput. Syst. ![In: ACM Trans. Comput. Syst. 20(3), pp. 283-328, 2002. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
mutual distrust, distributed systems, integrity, type systems, security policies, Confidentiality, secrecy, declassification, downgrading |
22 | Andrew C. Myers, Barbara Liskov |
Protecting privacy using the decentralized label model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Softw. Eng. Methodol. ![In: ACM Trans. Softw. Eng. Methodol. 9(4), pp. 410-442, 2000. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
principals, integrity, policies, lattice, confidentiality, roles, type checking, information flow controls, declassification, end-to-end, downgrading |
16 | Adedayo Adetoye, Atta Badii |
A Policy Model for Secure Information Flow. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARSPA-WITS ![In: Foundations and Applications of Security Analysis, Joint Workshop on Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security, ARSPA-WITS 2009, York, UK, March 28-29, 2009, Revised Selected Papers, pp. 1-17, 2009, Springer, 978-3-642-03458-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
16 | Cédric Fournet, Tamara Rezk |
Cryptographically sound implementations for typed information-flow security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POPL ![In: Proceedings of the 35th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, POPL 2008, San Francisco, California, USA, January 7-12, 2008, pp. 323-335, 2008, ACM, 978-1-59593-689-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
probabilistic programs, cryptography, compilers, integrity, type systems, computational model, confidentiality, non-interference, secure information flow |
16 | Stephen Tse, Steve Zdancewic |
Run-time principals in information-flow type systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Program. Lang. Syst. ![In: ACM Trans. Program. Lang. Syst. 30(1), pp. 6, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Decentralized label model, dynamic principals, run-time principals, security-typed language, type systems, information-flow, soundness, noninterference |
16 | Jeffrey A. Vaughan, Steve Zdancewic |
A Cryptographic Decentralized Label Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
S&P ![In: 2007 IEEE Symposium on Security and Privacy (S&P 2007), 20-23 May 2007, Oakland, California, USA, pp. 192-206, 2007, IEEE Computer Society, 0-7695-2848-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
16 | Ariel Futoransky, Emiliano Kargieman, Carlos Sarraute, Ariel Waissbein |
Foundations and applications for secure triggers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Inf. Syst. Secur. ![In: ACM Trans. Inf. Syst. Secur. 9(1), pp. 94-112, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Malicious host problem, secure triggers, obfuscation, universally composable security, mobile code security |
16 | Silvia Crafa, Sabina Rossi |
P-congruences as non-interference for the pi-calculus. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FMSE ![In: Proceedings of the 2006 ACM workshop on Formal methods in security engineering, FMSE 2006, Alexandria, VA, USA, November 3, 2006, pp. 13-22, 2006, ACM, 1-59593-550-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
process calculi, noninterference, downgrading |
16 | Christian Hammer 0001, Jens Krinke, Frank Nodes |
Intransitive Noninterference in Dependence Graphs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISoLA ![In: Leveraging Applications of Formal Methods, Second International Symposium, ISoLA 2006, Paphos, Cyprus, 15-19 November 2006, pp. 119-128, 2006, IEEE Computer Society, 978-0-7695-3071-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|