Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
119 | Todd Fine |
Defining Noninterference in the Temporal Logic of Actions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
S&P ![In: 1996 IEEE Symposium on Security and Privacy, May 6-8, 1996, Oakland, CA, USA, pp. 12-21, 1996, IEEE Computer Society, 0-8186-7417-2. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
noninterference properties, temporal logic of actions, multilevel secure systems, formal specification, formal methods, temporal logic, composition, security of data, covert channels, definitions, specification refinement |
112 | Mads Dam |
Decidability and proof systems for language-based noninterference relations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POPL ![In: Proceedings of the 33rd ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, POPL 2006, Charleston, South Carolina, USA, January 11-13, 2006, pp. 67-78, 2006, ACM, 1-59593-027-2. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
intransitive noninterference, information flow, language-based security, noninterference, multi-level security |
93 | Peng Li, Steve Zdancewic |
Downgrading policies and relaxed noninterference. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POPL ![In: Proceedings of the 32nd ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, POPL 2005, Long Beach, California, USA, January 12-14, 2005, pp. 158-170, 2005, ACM, 1-58113-830-X. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
downgrading policies, relaxed noninterference, information flow, language-based security, program equivalence |
80 | Aaron Bohannon, Benjamin C. Pierce, Vilhelm Sjöberg, Stephanie Weirich, Steve Zdancewic |
Reactive noninterference. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2009 ACM Conference on Computer and Communications Security, CCS 2009, Chicago, Illinois, USA, November 9-13, 2009, pp. 79-90, 2009, ACM, 978-1-60558-894-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
web applications, information flow, web browsers, noninterference, reactive programming |
74 | Alessandro Aldini, Marco Bernardo 0001 |
A General Framework for Nondeterministic, Probabilistic, and Stochastic Noninterference. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARSPA-WITS ![In: Foundations and Applications of Security Analysis, Joint Workshop on Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security, ARSPA-WITS 2009, York, UK, March 28-29, 2009, Revised Selected Papers, pp. 18-33, 2009, Springer, 978-3-642-03458-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
74 | Silvia Crafa, Sabina Rossi |
A Theory of Noninterference for the pi-Calculus. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TGC ![In: Trustworthy Global Computing, International Symposium, TGC 2005, Edinburgh, UK, April 7-9, 2005, Revised Selected Papers, pp. 2-18, 2005, Springer, 3-540-30007-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
74 | Michael Backes 0001, Birgit Pfitzmann |
Computational probabilistic noninterference. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Inf. Sec. ![In: Int. J. Inf. Sec. 3(1), pp. 42-60, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Security, Cryptography, Information flow, Non-interference, Simulatability |
72 | Silvia Crafa, Sabina Rossi |
P-congruences as non-interference for the pi-calculus. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FMSE ![In: Proceedings of the 2006 ACM workshop on Formal methods in security engineering, FMSE 2006, Alexandria, VA, USA, November 3, 2006, pp. 13-22, 2006, ACM, 1-59593-550-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
process calculi, noninterference, downgrading |
72 | Andrei Sabelfeld, Andrew C. Myers |
A Model for Delimited Information Release. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISSS ![In: Software Security - Theories and Systems, Second Mext-NSF-JSPS International Symposium, ISSS 2003, Tokyo, Japan, November 4-6, 2003, Revised Papers, pp. 174-191, 2003, Springer, 3-540-23635-X. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
Computer security, information flow, security policies, confidentiality, noninterference, declassification, security-type systems |
67 | Jian Huang, A. W. Roscoe 0001 |
Extending noninterference properties to the timed world. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAC ![In: Proceedings of the 2006 ACM Symposium on Applied Computing (SAC), Dijon, France, April 23-27, 2006, pp. 376-383, 2006, ACM, 1-59593-108-2. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
CSP, information flow, noninterference, discrete time |
67 | Jeffrey J. P. Tsai, Kwang-Ya Fang, Horng-Yuan Chen, Yao-Dong Bi |
A Noninterference Monitoring and Replay Mechanism for Real-Time Software Testing and Debugging. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Software Eng. ![In: IEEE Trans. Software Eng. 16(8), pp. 897-916, 1990. The full citation details ...](Pics/full.jpeg) |
1990 |
DBLP DOI BibTeX RDF |
real-time software testing, recorded execution history, noninterference monitoring architecture, program execution data, target real-time software system, replay mechanism, Motorola 68000 computer, Unix system environment, real-time software systems, real-time systems, program testing, program debugging, monitoring system, program behavior, timing errors |
61 | Aslan Askarov, Sebastian Hunt, Andrei Sabelfeld, David Sands 0001 |
Termination-Insensitive Noninterference Leaks More Than Just a Bit. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2008, 13th European Symposium on Research in Computer Security, Málaga, Spain, October 6-8, 2008. Proceedings, pp. 333-348, 2008, Springer, 978-3-540-88312-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
61 | Ron van der Meyden |
What, Indeed, Is Intransitive Noninterference? ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2007, 12th European Symposium On Research In Computer Security, Dresden, Germany, September 24-26, 2007, Proceedings, pp. 235-250, 2007, Springer, 978-3-540-74834-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
61 | Li Jiang, Lingdi Ping, Xuezeng Pan |
Combining robust declassification and intransitive noninterference. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IMSCCS ![In: Proceeding of the Second International Multi-Symposium of Computer and Computational Sciences (IMSCCS 2007), August 13-15, 2007, The University of Iowa, Iowa City, Iowa, USA, pp. 465-471, 2007, IEEE Computer Society, 0-7695-3039-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
61 | Christian Hammer 0001, Jens Krinke, Frank Nodes |
Intransitive Noninterference in Dependence Graphs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISoLA ![In: Leveraging Applications of Formal Methods, Second International Symposium, ISoLA 2006, Paphos, Cyprus, 15-19 November 2006, pp. 119-128, 2006, IEEE Computer Society, 978-0-7695-3071-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
61 | David von Oheimb |
Information Flow Control Revisited: Noninfluence = Noninterference + Nonleakage. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2004, 9th European Symposium on Research Computer Security, Sophia Antipolis, France, September 13-15, 2004, Proceedings, pp. 225-243, 2004, Springer, 3-540-22987-6. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
59 | Conghua Zhou, Li Chen, Shiguang Ju, Zhifeng Liu |
State Space Reduction for Verifying Noninterference. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SSIRI ![In: Third IEEE International Conference on Secure Software Integration and Reliability Improvement, SSIRI 2009, Shanghai, China, July 8-10, 2009, pp. 132-138, 2009, IEEE Computer Society, 978-0-7695-3758-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
intransitive noninterference, abstraction, noninterference |
59 | Boniface Hicks, Dave King 0002, Patrick D. McDaniel, Michael Hicks 0001 |
Trusted declassification: : high-level policy for a security-typed language. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PLAS ![In: Proceedings of the 2006 Workshop on Programming Languages and Analysis for Security, PLAS 2006, Ottawa, Ontario, Canada, June 10, 2006, pp. 65-74, 2006, ACM, 1-59593-374-3. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
noninterference modolo trusted methods, FJifP, Jif, security-typed languages, trusted declassification, security policy, information-flow control, declassification |
53 | Antonio Durante, Riccardo Focardi, Roberto Gorrieri |
A compiler for analyzing cryptographic protocols using noninterference. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Softw. Eng. Methodol. ![In: ACM Trans. Softw. Eng. Methodol. 9(4), pp. 488-528, 2000. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
process algebra, cryptographic protocols, automatic verification, noninterference, verification tool |
53 | Andrei Sabelfeld, David Sands 0001 |
Probabilistic Noninterference for Multi-Threaded Programs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSFW ![In: Proceedings of the 13th IEEE Computer Security Foundations Workshop, CSFW '00, Cambridge, England, UK, July 3-5, 2000, pp. 200-214, 2000, IEEE Computer Society, 0-7695-0671-2. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
probabilistic bisimulation, probabilistic scheduling, probabilistic covert channels, hook-up, type-system-based analysis, semantics, confidentiality, noninterference |
53 | Aslan Askarov, Daniel Hedin, Andrei Sabelfeld |
Cryptographically-Masked Flows. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAS ![In: Static Analysis, 13th International Symposium, SAS 2006, Seoul, Korea, August 29-31, 2006, Proceedings, pp. 353-369, 2006, Springer, 3-540-37756-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
53 | Steve Zdancewic, Andrew C. Myers |
Observational Determinism for Concurrent Program Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSFW ![In: 16th IEEE Computer Security Foundations Workshop (CSFW-16 2003), 30 June - 2 July 2003, Pacific Grove, CA, USA, pp. 29-, 2003, IEEE Computer Society, 0-7695-1927-X. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
53 | François Pottier |
A Simple View of Type-Secure Information Flow in the p-Calculus. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSFW ![In: 15th IEEE Computer Security Foundations Workshop (CSFW-15 2002), 24-26 June 2002, Cape Breton, Nova Scotia, Canada, pp. 320-330, 2002, IEEE Computer Society, 0-7695-1689-0. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
47 | Li Jiang, Lingdi Ping, Xuezeng Pan |
Extending intransitive noninterference with probabilities in information flow security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IMSCCS ![In: Proceeding of the Second International Multi-Symposium of Computer and Computational Sciences (IMSCCS 2007), August 13-15, 2007, The University of Iowa, Iowa City, Iowa, USA, pp. 337-343, 2007, IEEE Computer Society, 0-7695-3039-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
47 | Yan Sun 0008, Bruce M. McMillin, Xiaoqing Frank Liu, David A. Cape |
Verifying Noninterference in a Cyber-Physical System The Advanced Electric Power Grid. ![Search on Bibsonomy](Pics/bibsonomy.png) |
QSIC ![In: Seventh International Conference on Quality Software (QSIC 2007), 11-12 October 2007, Portland, Oregon, USA, pp. 363-369, 2007, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
47 | Naokata Shikuma, Atsushi Igarashi |
Proving Noninterference by a Fully Complete Translation to the Simply Typed lambda-Calculus. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIAN ![In: Advances in Computer Science - ASIAN 2006. Secure Software and Related Issues, 11th Asian Computing Science Conference, Tokyo, Japan, December 6-8, 2006, Revised Selected Papers, pp. 301-315, 2006, Springer, 978-3-540-77504-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
47 | Ron van der Meyden, Chenyi Zhang |
A Comparison of Semantic Models for Noninterference. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Formal Aspects in Security and Trust ![In: Formal Aspects in Security and Trust, Fourth International Workshop, FAST 2006, Hamilton, Ontario, Canada, August 26-27, 2006, Revised Selected Papers, pp. 235-249, 2006, Springer, 978-3-540-75226-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
47 | Lantian Zheng, Andrew C. Myers |
End-to-End Availability Policies and Noninterference. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSFW ![In: 18th IEEE Computer Security Foundations Workshop, (CSFW-18 2005), 20-22 June 2005, Aix-en-Provence, France, pp. 272-286, 2005, IEEE Computer Society, 0-7695-2340-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
47 | Heiko Mantel, David Sands 0001 |
Controlled Declassification Based on Intransitive Noninterference. ![Search on Bibsonomy](Pics/bibsonomy.png) |
APLAS ![In: Programming Languages and Systems: Second Asian Symposium, APLAS 2004, Taipei, Taiwan, November 4-6, 2004. Proceedings, pp. 129-145, 2004, Springer, 3-540-23724-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
47 | Calvin Ko, Timothy Redmond |
Noninterference and Intrusion Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
S&P ![In: 2002 IEEE Symposium on Security and Privacy, Berkeley, California, USA, May 12-15, 2002, pp. 177-187, 2002, IEEE Computer Society, 0-7695-1543-6. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
47 | Sylvan Pinsky, Edward Zieglar |
Noninterference Equations for Nondeterministic Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSFW ![In: 14th IEEE Computer Security Foundations Workshop (CSFW-14 2001), 11-13 June 2001, Cape Breton, Nova Scotia, Canada, pp. 3-14, 2001, IEEE Computer Society, 0-7695-1146-5. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
47 | Gérard Boudol, Ilaria Castellani |
Noninterference for Concurrent Programs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICALP ![In: Automata, Languages and Programming, 28th International Colloquium, ICALP 2001, Crete, Greece, July 8-12, 2001, Proceedings, pp. 382-395, 2001, Springer, 3-540-42287-0. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
46 | Geoffrey Smith 0001, Rafael Alpízar |
Secure information flow with random assignment and encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FMSE ![In: Proceedings of the 2006 ACM workshop on Formal methods in security engineering, FMSE 2006, Alexandria, VA, USA, November 3, 2006, pp. 33-44, 2006, ACM, 1-59593-550-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
IND-CCA, IND-CPA, encryption, type systems, reductions, noninterference, secure information flow |
42 | Andrei Popescu 0001, Johannes Hölzl, Tobias Nipkow |
Noninterfering Schedulers - When Possibilistic Noninterference Implies Probabilistic Noninterference. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CALCO ![In: Algebra and Coalgebra in Computer Science - 5th International Conference, CALCO 2013, Warsaw, Poland, September 3-6, 2013. Proceedings, pp. 236-252, 2013, Springer, 978-3-642-40205-0. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
40 | Sebastian Eggert, Ron van der Meyden, Henning Schnoor, Thomas Wilke |
The Complexity of Intransitive Noninterference. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Symposium on Security and Privacy ![In: 32nd IEEE Symposium on Security and Privacy, SP 2011, 22-25 May 2011, Berkeley, California, USA, pp. 196-211, 2011, IEEE Computer Society, 978-1-4577-0147-4. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
verification, information flow, noninterference |
40 | Dominique Devriese, Frank Piessens |
Noninterference through Secure Multi-execution. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Symposium on Security and Privacy ![In: 31st IEEE Symposium on Security and Privacy, SP 2010, 16-19 May 2010, Berleley/Oakland, California, USA, pp. 109-124, 2010, IEEE Computer Society, 978-0-7695-4035-1. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
Secure Multi-Execution, Information Flow, Noninterference |
40 | Daniel Wasserrab, Denis Lohner, Gregor Snelting |
On PDG-based noninterference and its modular proof. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PLAS ![In: Proceedings of the 2009 Workshop on Programming Languages and Analysis for Security, PLAS 2009, Dublin, Ireland, 15-21 June, 2009, pp. 31-44, 2009, ACM, 978-1-60558-645-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
modularity, program slicing, noninterference, correctness proof, program dependence graph |
40 | Dave King 0002, Boniface Hicks, Michael Hicks 0001, Trent Jaeger |
Implicit Flows: Can't Live with 'Em, Can't Live without 'Em. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security, 4th International Conference, ICISS 2008, Hyderabad, India, December 16-20, 2008. Proceedings, pp. 56-70, 2008, Springer, 978-3-540-89861-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
40 | Deepak D'Souza, Raveendra Holla, Janardhan Kulkarni, Raghavendra K. Ramesh, Barbara Sprick |
On the Decidability of Model-Checking Information Flow Properties. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security, 4th International Conference, ICISS 2008, Hyderabad, India, December 16-20, 2008. Proceedings, pp. 26-40, 2008, Springer, 978-3-540-89861-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
40 | Geoffrey Smith 0001 |
Adversaries and Information Leaks (Tutorial). ![Search on Bibsonomy](Pics/bibsonomy.png) |
TGC ![In: Trustworthy Global Computing, Third Symposium, TGC 2007, Sophia-Antipolis, France, November 5-6, 2007, Revised Selected Papers, pp. 383-400, 2007, Springer, 978-3-540-78662-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
40 | Gurvan Le Guernic |
Information Flow Testing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIAN ![In: Advances in Computer Science - ASIAN 2007. Computer and Network Security, 12th Asian Computing Science Conference, Doha, Qatar, December 9-11, 2007, Proceedings, pp. 33-47, 2007, Springer, 978-3-540-76927-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
40 | Steve Zdancewic, Andrew C. Myers |
Robust Declassification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSFW ![In: 14th IEEE Computer Security Foundations Workshop (CSFW-14 2001), 11-13 June 2001, Cape Breton, Nova Scotia, Canada, pp. 15-23, 2001, IEEE Computer Society, 0-7695-1146-5. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
40 | William R. Bevier, Richard M. Cohen, William D. Young |
Connection policies and controlled interference. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSFW ![In: The Eighth IEEE Computer Security Foundations Workshop (CSFW '95), March 13-15, 1995, Kenmare, County Kerry, Ireland, pp. 167-176, 1995, IEEE Computer Society, 0-8186-7033-9. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
communication policy, controlled interference, system agents, connection policy, state-based formulation, distributed processing, computer security, security of data |
34 | Maxwell N. Krohn, Eran Tromer |
Noninterference for a Practical DIFC-Based Operating System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SP ![In: 30th IEEE Symposium on Security and Privacy (SP 2009), 17-20 May 2009, Oakland, California, USA, pp. 61-76, 2009, IEEE Computer Society, 978-0-7695-3633-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
34 | Daniel Hedin, David Sands 0001 |
Noninterference in the Presence of Non-Opaque Pointers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSFW ![In: 19th IEEE Computer Security Foundations Workshop, (CSFW-19 2006), 5-7 July 2006, Venice, Italy, pp. 217-229, 2006, IEEE Computer Society, 0-7695-2615-2. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
34 | Nejib Ben Hadj-Alouane, Stéphane Lafrance, Feng Lin 0001, John Mullins, Mohamed Moez Yeddes |
On the verification of intransitive noninterference in multilevel security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Syst. Man Cybern. Part B ![In: IEEE Trans. Syst. Man Cybern. Part B 35(5), pp. 948-958, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
34 | Lantian Zheng, Andrew C. Myers |
Dynamic Security Labels and Noninterference (Extended Abstract). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Formal Aspects in Security and Trust ![In: Formal Aspects in Security and Trust: Second IFIP TC1 WG1.7 Workshop on Formal Aspects in Security and Trust (FAST), an event of the 18th IFIP World Computer Congress, August 22-27, 2004, Toulouse, France, pp. 27-40, 2004, Springer, 0-387-24050-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
34 | Geoffrey Smith 0001 |
Probabilistic Noninterference through Weak Probabilistic Bisimulation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSFW ![In: 16th IEEE Computer Security Foundations Workshop (CSFW-16 2003), 30 June - 2 July 2003, Pacific Grove, CA, USA, pp. 3-13, 2003, IEEE Computer Society, 0-7695-1927-X. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
34 | Alessandro Aldini, Mario Bravetti, Alessandra Di Pierro, Roberto Gorrieri, Chris Hankin, Herbert Wiklicky |
Two Formal Approaches for Approximating Noninterference Properties. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FOSAD ![In: Foundations of Security Analysis and Design II, FOSAD 2001/2002 Tutorial Lectures, pp. 1-43, 2002, Springer, 3-540-20955-7. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
34 | A. W. Roscoe 0001, M. H. Goldsmith |
What Is Intransitive Noninterference? ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSFW ![In: Proceedings of the 12th IEEE Computer Security Foundations Workshop, CSFW 1999, Mordano, Italy, June 28-30, 1999, pp. 228-238, 1999, IEEE Computer Society, 0-7695-0201-6. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
32 | Alessandro Aldini, Alessandra Di Pierro |
Estimating the maximum information leakage. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Inf. Sec. ![In: Int. J. Inf. Sec. 7(3), pp. 219-242, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Approximate noninterference, Bisimulation semantics, Process algebra, Probabilistic models, Covert channels |
32 | Marcus Völp, Claude-Joachim Hamann, Hermann Härtig |
Avoiding timing channels in fixed-priority schedulers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2008, Tokyo, Japan, March 18-20, 2008, pp. 44-55, 2008, ACM, 978-1-59593-979-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
security, real-time, information flow, fixed-priority scheduling, noninterference |
32 | Stephen Chong, Andrew C. Myers |
End-to-End Enforcement of Erasure and Declassification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: Proceedings of the 21st IEEE Computer Security Foundations Symposium, CSF 2008, Pittsburgh, Pennsylvania, USA, 23-25 June 2008, pp. 98-111, 2008, IEEE Computer Society, 978-0-7695-3182-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Erasure, Expressive security policies, Information flow, Language-based security, Noninterference, Declassification |
32 | Stephen Tse, Steve Zdancewic |
Run-time principals in information-flow type systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Program. Lang. Syst. ![In: ACM Trans. Program. Lang. Syst. 30(1), pp. 6, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Decentralized label model, dynamic principals, run-time principals, security-typed language, type systems, information-flow, soundness, noninterference |
32 | Geoffrey Smith 0001, Rafael Alpízar |
Fast probabilistic simulation, nontermination, and secure information flow. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PLAS ![In: Proceedings of the 2007 Workshop on Programming Languages and Analysis for Security, PLAS 2007, San Diego, California, USA, June 14, 2007, pp. 67-72, 2007, ACM, 978-1-59593-711-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
probabilistic noninterference, type systems |
32 | Heiko Mantel |
The framework of selective interleaving functions and the modular assembly kit. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FMSE ![In: Proceedings of the 2005 ACM workshop on Formal methods in security engineering, FMSE 2005, Fairfax, VA, USA, November 11, 2005, pp. 53-62, 2005, ACM, 1-59593-231-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
formal specification and analysis of security properties, noninterference, information flow security |
32 | Stephen Chong, Andrew C. Myers |
Security policies for downgrading. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 11th ACM Conference on Computer and Communications Security, CCS 2004, Washington, DC, USA, October 25-29, 2004, pp. 198-209, 2004, ACM, 1-58113-961-6. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
information flow, security policies, noninterference, declassification, downgrading |
32 | Matthew Hennessy, James Riely |
Information flow vs. resource access in the asynchronous pi-calculus. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Program. Lang. Syst. ![In: ACM Trans. Program. Lang. Syst. 24(5), pp. 566-591, 2002. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
Distributed process language, I/O subtyping, may testing, security types, security, information flow, pi-calculus, noninterference |
32 | Thomas F. Keefe, Wei-Tek Tsai |
A multiversion transaction scheduler for centralized multilevel secure database systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HASE ![In: 1st High-Assurance Systems Engineering Workshop (HASE '96), October 22, 1996, Niagara, Canada, Proceedings, pp. 206-213, 1996, IEEE Computer Society, 0-8186-7629-9. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
multiversion transaction scheduler, centralized multilevel secure database systems, multilevel secure database management systems, MLS/DBMSs, secure multiversion scheduling protocol, serializable schedules, MLS noninterference assertions, timestamp generation, concurrency, concurrency control, transactions, correctness, contention, failure, covert channels, data access, abstract model, concurrent execution, multiple versions |
32 | Jane E. Sinclair |
Action Systems for Security Specification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSFW ![In: Ninth IEEE Computer Security Foundations Workshop, March 10 - 12, 1996, Dromquinna Manor, Kenmare, County Kerry, Ireland, pp. 102-, 1996, IEEE Computer Society, 0-8186-7522-5. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
security development, formal methods, noninterference, Action systems |
26 | Ravi Akella, Bruce M. McMillin |
Model-Checking BNDC Properties in Cyber-Physical Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COMPSAC (1) ![In: Proceedings of the 33rd Annual IEEE International Computer Software and Applications Conference, COMPSAC 2009, Seattle, Washington, USA, July 20-24, 2009. Volume 1, pp. 660-663, 2009, IEEE Computer Society, 978-0-7695-3726-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
26 | Sebastian Hunt, David Sands 0001 |
Just Forget It - The Semantics and Enforcement of Information Erasure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESOP ![In: Programming Languages and Systems, 17th European Symposium on Programming, ESOP 2008, Held as Part of the Joint European Conferences on Theory and Practice of Software, ETAPS 2008, Budapest, Hungary, March 29-April 6, 2008. Proceedings, pp. 239-253, 2008, Springer, 978-3-540-78738-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
26 | Riccardo Focardi, Matteo Centenaro |
Information flow security of multi-threaded distributed programs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PLAS ![In: Proceedings of the 2008 Workshop on Programming Languages and Analysis for Security, PLAS 2008, Tucson, AZ, USA, June 8, 2008, pp. 113-124, 2008, ACM, 978-1-59593-936-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
symbolic cryptography, information flow, bisimulation, language-based security |
26 | Gurvan Le Guernic |
Automaton-based Confidentiality Monitoring of Concurrent Programs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: 20th IEEE Computer Security Foundations Symposium, CSF 2007, 6-8 July 2007, Venice, Italy, pp. 218-232, 2007, IEEE Computer Society, 0-7695-2819-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
26 | Li Jiang, Lingdi Ping, Xuezeng Pan |
Handling Dynamic Information Release. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2007, 10th International Conference, Seoul, Korea, November 29-30, 2007, Proceedings, pp. 64-76, 2007, Springer, 978-3-540-76787-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
languages, Computer security, information flow, security-type systems |
26 | Dachuan Yu, Nayeem Islam |
A Typed Assembly Language for Confidentiality. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESOP ![In: Programming Languages and Systems, 15th European Symposium on Programming, ESOP 2006, Held as Part of the Joint European Conferences on Theory and Practice of Software, ETAPS 2006, Vienna, Austria, March 27-28, 2006, Proceedings, pp. 162-179, 2006, Springer, 3-540-33095-X. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
26 | Stephen Chong, Andrew C. Myers |
Language-Based Information Erasure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSFW ![In: 18th IEEE Computer Security Foundations Workshop, (CSFW-18 2005), 20-22 June 2005, Aix-en-Provence, France, pp. 241-254, 2005, IEEE Computer Society, 0-7695-2340-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
26 | Andrew C. Myers, Andrei Sabelfeld, Steve Zdancewic |
Enforcing Robust Declassification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSFW ![In: 17th IEEE Computer Security Foundations Workshop, (CSFW-17 2004), 28-30 June 2004, Pacific Grove, CA, USA, pp. 172-186, 2004, IEEE Computer Society, 0-7695-2169-X. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
26 | Annalisa Bossi, Carla Piazza, Sabina Rossi |
Modelling Downgrading in Information Flow Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSFW ![In: 17th IEEE Computer Security Foundations Workshop, (CSFW-17 2004), 28-30 June 2004, Pacific Grove, CA, USA, pp. 187-, 2004, IEEE Computer Society, 0-7695-2169-X. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
26 | François Pottier, Vincent Simonet |
Information flow inference for ML. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Program. Lang. Syst. ![In: ACM Trans. Program. Lang. Syst. 25(1), pp. 117-158, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
non-interference, Constraint-based analysis |
26 | Geoffrey Smith 0001 |
A New Type System for Secure Information Flow. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSFW ![In: 14th IEEE Computer Security Foundations Workshop (CSFW-14 2001), 11-13 June 2001, Cape Breton, Nova Scotia, Canada, pp. 115-125, 2001, IEEE Computer Society, 0-7695-1146-5. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
26 | Johan Agat, David Sands |
On Confidentiality and Algorithms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
S&P ![In: 2001 IEEE Symposium on Security and Privacy, Oakland, California, USA May 14-16, 2001, pp. 64-77, 2001, IEEE Computer Society, 0-7695-1046-9. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
21 | Pasquale Noce |
Information Flow Control via Stateful Intransitive Noninterference in Language IMP. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Arch. Formal Proofs ![In: Arch. Formal Proofs 2024, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP BibTeX RDF |
|
21 | Emmanuel Hainry, Romain Péchoux |
A General Noninterference Policy for Polynomial Time. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Proc. ACM Program. Lang. ![In: Proc. ACM Program. Lang. 7(POPL), pp. 806-832, January 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
21 | Shamiek Mangipudi, Pavel Chuprikov, Patrick Eugster, Malte Viering, Savvas Savvides |
Generalized Policy-Based Noninterference for Efficient Confidentiality-Preservation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Proc. ACM Program. Lang. ![In: Proc. ACM Program. Lang. 7(PLDI), pp. 267-291, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
21 | Yu Hong, Yi Li, Haining Tan |
A noninterference trusted dual system security guarantee method based on secure memory. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Concurr. Comput. Pract. Exp. ![In: Concurr. Comput. Pract. Exp. 35(2), January 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
21 | Lucas Silver, Paul He, Ethan Cecchetti, Andrew K. Hirsch, Steve Zdancewic |
Semantics for Noninterference with Interaction Trees (Artifact). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Dagstuhl Artifacts Ser. ![In: Dagstuhl Artifacts Ser. 9(2), pp. 06:1-06:2, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
21 | Andrea Esposito 0006, Alessandro Aldini, Marco Bernardo 0001, Sabina Rossi |
Noninterference Analysis of Reversible Systems: An Approach Based on Branching Bisimilarity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2311.15670, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
21 | Lucas Silver, Paul He, Ethan Cecchetti, Andrew K. Hirsch, Steve Zdancewic |
Semantics for Noninterference with Interaction Trees. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ECOOP ![In: 37th European Conference on Object-Oriented Programming, ECOOP 2023, July 17-21, 2023, Seattle, Washington, United States, pp. 29:1-29:29, 2023, Schloss Dagstuhl - Leibniz-Zentrum für Informatik, 978-3-95977-281-5. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
21 | Andrea Esposito 0006, Alessandro Aldini, Marco Bernardo 0001 |
Branching Bisimulation Semantics Enables Noninterference Analysis of Reversible Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FORTE ![In: Formal Techniques for Distributed Objects, Components, and Systems - 43rd IFIP WG 6.1 International Conference, FORTE 2023, Held as Part of the 18th International Federated Conference on Distributed Computing Techniques, DisCoTec 2023, Lisbon, Portugal, June 19-23, 2023, Proceedings, pp. 57-74, 2023, Springer, 978-3-031-35354-3. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
21 | Wenfa Li, Zhi Yang, Jia Liu |
Automatic analysis of DIFC systems using noninterference with declassification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Neural Comput. Appl. ![In: Neural Comput. Appl. 34(12), pp. 9385-9396, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
21 | Tianyu Chen, Jeremy G. Siek |
Mechanized Noninterference for Gradual Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2211.15745, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
21 | Jonathan Sterling, Robert Harper 0001 |
Sheaf semantics of termination-insensitive noninterference. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2204.09421, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
21 | Nicholas Coughlin, Graeme Smith 0001 |
Compositional noninterference on hardware weak memory models. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Sci. Comput. Program. ![In: Sci. Comput. Program. 217, pp. 102779, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
21 | Jonathan Sterling, Robert Harper 0001 |
Sheaf Semantics of Termination-Insensitive Noninterference. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSCD ![In: 7th International Conference on Formal Structures for Computation and Deduction, FSCD 2022, August 2-5, 2022, Haifa, Israel., pp. 5:1-5:19, 2022, Schloss Dagstuhl - Leibniz-Zentrum für Informatik, 978-3-95977-233-4. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
21 | Simon Oddershede Gregersen, Johan Bay, Amin Timany, Lars Birkedal |
Mechanized logical relations for termination-insensitive noninterference. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Proc. ACM Program. Lang. ![In: Proc. ACM Program. Lang. 5(POPL), pp. 1-29, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
21 | Ziqiao Zhou, Michael K. Reiter |
Interpretable noninterference measurement and its application to processor designs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Proc. ACM Program. Lang. ![In: Proc. ACM Program. Lang. 5(OOPSLA), pp. 1-30, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
21 | Francesco Basile, Gianmaria De Tommasi, Claudio Sterle |
Noninterference Enforcement via Supervisory Control in Bounded Petri Nets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Autom. Control. ![In: IEEE Trans. Autom. Control. 66(8), pp. 3653-3666, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
21 | Farzaneh Derakhshan, Stephanie Balzer, Limin Jia 0001 |
Session Logical Relations for Noninterference. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2104.14094, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP BibTeX RDF |
|
21 | Zhanhui Yuan, Wenfa Li, Zhi Yang, Lei Sun, Xuehui Du, Hongqi Zhang |
A Noninterference Model for Mobile OS Information Flow Control and Its Policy Verification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Secur. Commun. Networks ![In: Secur. Commun. Networks 2021, pp. 2481818:1-2481818:22, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
21 | Farzaneh Derakhshan, Stephanie Balzer, Limin Jia 0001 |
Session Logical Relations for Noninterference. ![Search on Bibsonomy](Pics/bibsonomy.png) |
LICS ![In: 36th Annual ACM/IEEE Symposium on Logic in Computer Science, LICS 2021, Rome, Italy, June 29 - July 2, 2021, pp. 1-14, 2021, IEEE, 978-1-6654-4895-6. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
21 | Johan Bay, Aslan Askarov |
Reconciling progress-insensitive noninterference and declassification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2005.01977, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP BibTeX RDF |
|
21 | Luke Nelson, James Bornholt, Arvind Krishnamurthy, Emina Torlak, Xi Wang 0005 |
Noninterference specifications for secure systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM SIGOPS Oper. Syst. Rev. ![In: ACM SIGOPS Oper. Syst. Rev. 54(1), pp. 31-39, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
21 | Bernhard Beckert, Mihai Herda, Michael Kirsten, Shmuel S. Tyszberowicz |
Integration of Static and Dynamic Analysis Techniques for Checking Noninterference. ![Search on Bibsonomy](Pics/bibsonomy.png) |
20 Years of KeY ![In: Deductive Software Verification: Future Perspectives - Reflections on the Occasion of 20 Years of KeY, pp. 287-312, 2020, Springer, 978-3-030-64353-9. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
21 | Nicholas Coughlin, Graeme Smith 0001 |
Rely/Guarantee Reasoning for Noninterference in Non-Blocking Algorithms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: 33rd IEEE Computer Security Foundations Symposium, CSF 2020, Boston, MA, USA, June 22-26, 2020, pp. 380-394, 2020, IEEE, 978-1-7281-6572-1. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
21 | Johan Bay, Aslan Askarov |
Reconciling progress-insensitive noninterference and declassification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: 33rd IEEE Computer Security Foundations Symposium, CSF 2020, Boston, MA, USA, June 22-26, 2020, pp. 95-106, 2020, IEEE, 978-1-7281-6572-1. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
21 | Arthur Azevedo de Amorim, Matt Fredrikson, Limin Jia 0001 |
Reconciling noninterference and gradual typing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
LICS ![In: LICS '20: 35th Annual ACM/IEEE Symposium on Logic in Computer Science, Saarbrücken, Germany, July 8-11, 2020., pp. 116-129, 2020, ACM, 978-1-4503-7104-9. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
21 | Alexander Christian Müller |
Proving Noninterference in Multi-Agent Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2020 |
RDF |
|
21 | Maximilian Algehed, Jean-Philippe Bernardy |
Simple noninterference from parametricity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Proc. ACM Program. Lang. ![In: Proc. ACM Program. Lang. 3(ICFP), pp. 89:1-89:22, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
21 | Raimil Cruz, Éric Tanter |
Polymorphic Relaxed Noninterference. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1906.04830, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP BibTeX RDF |
|