The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for noninterference with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1987-1992 (15) 1993-1999 (16) 2000-2002 (23) 2003-2004 (26) 2005-2006 (37) 2007 (24) 2008 (16) 2009 (16) 2010-2011 (16) 2012-2013 (23) 2014-2015 (19) 2016-2017 (18) 2018-2020 (17) 2021-2023 (18) 2024 (1)
Publication types (Num. hits)
article(89) incollection(2) inproceedings(191) phdthesis(3)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 260 occurrences of 146 keywords

Results
Found 285 publication records. Showing 285 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
21Ira S. Moskowitz, Oliver Costich A classical Automata Approach to Noninterference Type Problems. Search on Bibsonomy CSFW The full citation details ... 1992 DBLP  DOI  BibTeX  RDF
21Todd Fine Constructively Using Noninterference to Analyze Systems. Search on Bibsonomy S&P The full citation details ... 1990 DBLP  DOI  BibTeX  RDF
21Todd Fine, J. Thomas Haigh, Richard C. O'Brien, Dana L. Toups Noninterference and the Unwinding for LOCK. Search on Bibsonomy CSFW The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
21Jeffrey J. P. Tsai, Kwang-Ya Fang, Horng-Yuan Chen A knowledge-based debugger for real-time software systems based on a noninterference testing architecture. Search on Bibsonomy COMPSAC The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
21Daryl McCullough Noninterference and the composability of security properties. Search on Bibsonomy S&P The full citation details ... 1988 DBLP  DOI  BibTeX  RDF
21J. Thomas Haigh, William D. Young Extending the Noninterference Version of MLS for SAT. Search on Bibsonomy IEEE Trans. Software Eng. The full citation details ... 1987 DBLP  DOI  BibTeX  RDF
19Mohit Tiwari, Xun Li 0001, Hassan M. G. Wassel, Bita Mazloom, Shashidhar Mysore, Frederic T. Chong, Timothy Sherwood Gate-Level Information-Flow Tracking for Secure Architectures. Search on Bibsonomy IEEE Micro The full citation details ... 2010 DBLP  DOI  BibTeX  RDF covert channels, noninterference, high-assurance systems, timing channels, information-flow tracking
19Jonas Magazinius, Aslan Askarov, Andrei Sabelfeld A lattice-based approach to mashup security. Search on Bibsonomy AsiaCCS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF web mashups, information flow, security policies, lattices, noninterference, declassification
19Ron van der Meyden, Chenyi Zhang Information Flow in Systems with Schedulers. Search on Bibsonomy CSF The full citation details ... 2008 DBLP  DOI  BibTeX  RDF scheduler, information flow, noninterference
19Aslan Askarov, Andrei Sabelfeld Localized delimited release: combining the what and where dimensions of information release. Search on Bibsonomy PLAS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF de-classification, information flow, security policies, noninterference, downgrading
19Daniel S. Dantas, David Walker 0001 Harmless advice. Search on Bibsonomy POPL The full citation details ... 2006 DBLP  DOI  BibTeX  RDF harmless advice, aspects, aspect-oriented, noninterference
19Gilles Barthe, Leonor Prensa Nieto Formally verifying information flow type systems for concurrent and thread systems. Search on Bibsonomy FMSE The full citation details ... 2004 DBLP  DOI  BibTeX  RDF machine-checked proofs, concurrency, noninterference
19Yao-Wen Huang, Fang Yu 0001, Christian Hang, Chung-Hung Tsai, Der-Tsai Lee, Sy-Yen Kuo Securing web application code by static analysis and runtime protection. Search on Bibsonomy WWW The full citation details ... 2004 DBLP  DOI  BibTeX  RDF program security, verification, type systems, information flow, noninterference, web application security, security vulnerabilities
19Stephen Tse, Steve Zdancewic Translating dependency into parametricity. Search on Bibsonomy ICFP The full citation details ... 2004 DBLP  DOI  BibTeX  RDF DCC, protection contexts, security, dependency, Haskell, information flow, translation, polymorphism, lambda calculus, monads, parametricity, noninterference, logical relations
19Rachid Echahed, Frédéric Prost, Wendelin Serwe Statically assuring secrecy for dynamic concurrent processes. Search on Bibsonomy PPDP The full citation details ... 2003 DBLP  DOI  BibTeX  RDF abstract interpretation, safety, noninterference
19Heiko Mantel On the Composition of Secure Systems. Search on Bibsonomy S&P The full citation details ... 2002 DBLP  DOI  BibTeX  RDF composition, information flow, compositionality, noninterference, emergent properties
19Riccardo Focardi Comparing Two Information Flow Security Properties. Search on Bibsonomy CSFW The full citation details ... 1996 DBLP  DOI  BibTeX  RDF nondeducibility, security checker, software tool, automatic verification, noninterference, multilevel security
19Aris Zakinthinos, E. Stewart Lee How and why feedback composition fails [secure systems]. Search on Bibsonomy CSFW The full citation details ... 1996 DBLP  DOI  BibTeX  RDF feedback composition, generalized noninterference, secure components, n-forward correctability, system designer, security of data, composability, necessary and sufficient conditions, restrictiveness
19A. W. Roscoe 0001, Lars Wulf Composing and decomposing systems under security properties. Search on Bibsonomy CSFW The full citation details ... 1995 DBLP  DOI  BibTeX  RDF separability of processes, noninterference properties, disjoint components, security of data, separability, security properties
19Aris Zakinthinos, E. Stewart Lee The composability of non-interference [system security]. Search on Bibsonomy CSFW The full citation details ... 1995 DBLP  DOI  BibTeX  RDF McCullough's conjecture, noninterference composability, feedback, security of data, system security
19Sang Hyuk Son, Ashok K. Agrawala Distributed Checkpointing for Globally Consistent States of Databases. Search on Bibsonomy IEEE Trans. Software Eng. The full citation details ... 1989 DBLP  DOI  BibTeX  RDF distributed database, consistency, Availability, transaction, checkpoint, recovery, noninterference
13Annabelle McIver The Secret Art of Computer Programming. Search on Bibsonomy ICTAC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF compositional security, refinement of ignorance, program semantics, Proofs of security
13Geoffrey Smith 0001 On the Foundations of Quantitative Information Flow. Search on Bibsonomy FoSSaCS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
13Delphine Demange, David Sands 0001 All Secrets Great and Small. Search on Bibsonomy ESOP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
13Limin Jia 0001, Steve Zdancewic Encoding information flow in Aura. Search on Bibsonomy PLAS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF access control, information flow control, declassification, security type system, authorization logic
13Aslan Askarov, Andrei Sabelfeld Catch me if you can: permissive yet secure error handling. Search on Bibsonomy PLAS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF exception handling, security type system
13Tayfun Elmas, Ali Sezgin, Serdar Tasiran, Shaz Qadeer An annotation assistant for interactive debugging of programs with common synchronization idioms. Search on Bibsonomy PADTAD The full citation details ... 2009 DBLP  DOI  BibTeX  RDF synchronization idioms, concurrent programs, atomicity
13Alexander Lux, Heiko Mantel Declassification with Explicit Reference Points. Search on Bibsonomy ESORICS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
13Jordi Diaz, Osvaldo Simeone, Yeheskel Bar-Ness Asymptotic Analysis of Reduced-Feedback Strategies for MIMO Gaussian Broadcast Channels. Search on Bibsonomy IEEE Trans. Inf. Theory The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
13Francisco Bavera, Eduardo Bonelli Type-based information flow analysis for bytecode languages with variable object field policies. Search on Bibsonomy SAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
13Sruthi Bandhakavi, William H. Winsborough, Marianne Winslett A Trust Management Approach for Flexible Policy Management in Security-Typed Languages. Search on Bibsonomy CSF The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Lanugage Based Security, Information Flow, Trust Management
13Alessandro Aldini, Marco Bernardo 0001 Weak Behavioral Equivalences for Verifying Secure and Performance-Aware Component-Based Systems. Search on Bibsonomy WADS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
13Alexander Lux, Heiko Mantel Who Can Declassify?. Search on Bibsonomy Formal Aspects in Security and Trust The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
13Lantian Zheng, Andrew C. Myers Dynamic security labels and static information flow control. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
13Kohei Honda 0001, Nobuko Yoshida A uniform type structure for secure information flow. Search on Bibsonomy ACM Trans. Program. Lang. Syst. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF The ?-calculus, type-based program analysis, typing system, secure information flow
13Torben Amtoft, Anindya Banerjee 0001 Verification condition generation for conditional information flow. Search on Bibsonomy FMSE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF conditional information flow analysis, object invariants, verification condition generation
13Takaaki Tateishi, Naoshi Tabuchi Secure Behavior of Web Browsers to Prevent Information Leakages. Search on Bibsonomy APSEC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
13Lennart Beringer, Martin Hofmann 0001 Secure information flow and program logics. Search on Bibsonomy CSF The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
13Paritosh Shroff, Scott F. Smith 0001, Mark Thober Dynamic Dependency Monitoring to Secure Information Flow. Search on Bibsonomy CSF The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
13Alwyn Goodloe, Carl A. Gunter Reasoning about Concurrency for Security Tunnels. Search on Bibsonomy CSF The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
13Dachuan Yu More Typed Assembly Languages for Confidentiality. Search on Bibsonomy APLAS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
13Anindya Banerjee 0001, David A. Naumann, Stan Rosenberg Towards a logical account of declassification. Search on Bibsonomy PLAS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF information flow, confidentiality, aliasing
13Scott F. Smith 0001, Mark Thober Improving usability of information flow security in java. Search on Bibsonomy PLAS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF java, security policies, type inference, declassification, information flow security
13Jeffrey A. Vaughan, Steve Zdancewic A Cryptographic Decentralized Label Model. Search on Bibsonomy S&P The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
13Alejandro Russo, Andrei Sabelfeld Securing Interaction between Threads and the Scheduler. Search on Bibsonomy CSFW The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
13Kevin R. O'Neill, Michael R. Clarkson, Stephen Chong Information-Flow Security for Interactive Programs. Search on Bibsonomy CSFW The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
13Torben Amtoft, Sruthi Bandhakavi, Anindya Banerjee 0001 A logic for information flow in object-oriented programs. Search on Bibsonomy POPL The full citation details ... 2006 DBLP  DOI  BibTeX  RDF information flow, confidentiality, aliasing
13Niklas Broberg, David Sands 0001 Flow Locks: Towards a Core Calculus for Dynamic Flow Policies. Search on Bibsonomy ESOP The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
13Kai Chen 0009, Fan Jiang 0005, Zongyao Tang A New Media Access Control Protocol for Ad-Hoc Wireless Sensor Networks. Search on Bibsonomy MSN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Quality of Service, sensor networks, ad-hoc networks, energy efficiency, Media Access Control
13Zhao Li, Baohua Zhao, Yugui Qu, Kai Chen 0009 An Adaptive and Distributed STDMA Scheme for Ad Hoc and Sensor Networks. Search on Bibsonomy ICN/ICONS/MCL The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
13Jacob Zimmermann, George M. Mohay Distributed intrusion detection in clusters based on non-interference. Search on Bibsonomy ACSW The full citation details ... 2006 DBLP  BibTeX  RDF clusters, intrusion detection, MPI
13David A. Naumann From Coupling Relations to Mated Invariants for Checking Information Flow. Search on Bibsonomy ESORICS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
13Cormac Flanagan, Stephen N. Freund, Shaz Qadeer Exploiting Purity for Atomicity. Search on Bibsonomy IEEE Trans. Software Eng. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF purity, concurrent programs, reduction, Atomicity
13David A. Naumann Verifying a Secure Information Flow Analyzer. Search on Bibsonomy TPHOLs The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
13Peng Li, Steve Zdancewic Practical Information-flow Control in Web-Based Information Systems. Search on Bibsonomy CSFW The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
13Andrew C. Myers Programming with Explicit Security Policies. Search on Bibsonomy ESOP The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
13Stephen Tse, Steve Zdancewic A Design for a Security-Typed Language with Certificate-Based Declassification. Search on Bibsonomy ESOP The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
13Andrew D. Gordon 0001 From Typed Process Calculi to Source-Based Security. Search on Bibsonomy SAS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
13Nalini Venkatasubramanian, Carolyn L. Talcott, Gul Agha A formal model for reasoning about adaptive QoS-enabled middleware. Search on Bibsonomy ACM Trans. Softw. Eng. Methodol. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF meta-object models, quality-of-service, multimedia, reflection, actors, theoretical foundations, Middleware services
13Andrea Acquaviva, Alessandro Aldini, Marco Bernardo 0001, Alessandro Bogliolo, Edoardo Bontà, Emanuele Lattanzi Assessing the Impact of Dynamic Power Management on the Functionality and the Performance of Battery-Powered Appliances. Search on Bibsonomy DSN The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
13Zhenyue Deng, Geoffrey Smith 0001 Lenient Array Operations for Practical Secure Information Flow. Search on Bibsonomy CSFW The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
13Nobuko Yoshida Channel dependent types for higher-order mobile processes. Search on Bibsonomy POPL The full citation details ... 2004 DBLP  DOI  BibTeX  RDF the higher-order ?-calculus, access control, types, secrecy, mobile processes
13Stephen Tse, Steve Zdancewic Run-time Principals in Information-flow Type Systems. Search on Bibsonomy S&P The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
13Anindya Banerjee 0001, David A. Naumann History-Based Access Control and Secure Information Flow. Search on Bibsonomy CASSIS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
13Anindya Banerjee 0001, David A. Naumann Using Access Control for Secure Information Flow in a Java-like Language. Search on Bibsonomy CSFW The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
13Alessandro Aldini, Roberto Gorrieri A Study about Trade-Off between Performance and Security in an Internet Audio Mechanism. Search on Bibsonomy Global Computing The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
13Anindya Banerjee 0001, David A. Naumann Secure Information Flow and Pointer Confinement in a Java-like Language. Search on Bibsonomy CSFW The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
13Kohei Honda 0001, Nobuko Yoshida A uniform type structure for secure information flow. Search on Bibsonomy POPL The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
13O. Sami Saydjari LOCK : An Historical Perspective. Search on Bibsonomy ACSAC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
13Peeter Laud Semantics and Program Analysis of Computationally Secure Information Flow. Search on Bibsonomy ESOP The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
13Andrew C. Myers Security-Typed Languages and Distributed Computation. Search on Bibsonomy SAS The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
13Alessandro Aldini Probabilistic Information Flow in a Process Algebra. Search on Bibsonomy CONCUR The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
13Mads Dam, Pablo Giambiagi Confidentiality for Mobile Code: The Case of a Simple Payment Protocol. Search on Bibsonomy CSFW The full citation details ... 2000 DBLP  DOI  BibTeX  RDF information flow, confidentiality, Mobile code
13Dennis M. Volpano, Geoffrey Smith 0001 Verifying Secrets and Relative Secrecy. Search on Bibsonomy POPL The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
13Jan Jürjens Secure Information Flow for Concurrent Processes. Search on Bibsonomy CONCUR The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
13Gerhard Schellhorn, Wolfgang Reif, Axel Schairer, Paul A. Karger, Vernon Austel, David C. Toll Verification of a Formal Security Model for Multiapplicative Smart Cards. Search on Bibsonomy ESORICS The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
13Dennis M. Volpano Safety versus Secrecy. Search on Bibsonomy SAS The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
13Riccardo Focardi, Roberto Gorrieri The Compositional Security Checker: A Tool for the Verification of Information Flow Security Properties. Search on Bibsonomy IEEE Trans. Software Eng. The full citation details ... 1997 DBLP  DOI  BibTeX  RDF Tools and techniques, network protocol verification, access controls, program verification, information flow controls
13Dennis M. Volpano, Geoffrey Smith 0001 A Type-Based Approach to Program Security. Search on Bibsonomy TAPSOFT The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
13Qi Shi 0001, Ning Zhang Applying Composable Security Properties to Assessment of Information Systems. Search on Bibsonomy COMPSAC The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
13Barry Richards, Yuejun Jiang, H. Choi On Interval-based Temporal Planning: An IQ Strategy. Search on Bibsonomy ISMIS The full citation details ... 1991 DBLP  DOI  BibTeX  RDF Qualification Problem, Interval Principle, Collapsing and Stretching/Clipping, Temporal Logics, Planning, Constraint Satisfaction, Points, Actions, Intervals, Maximal, Frame Problem
13Paul Smith, Richard Keighley The Formal Development of a Secure Transaction Mechanism. Search on Bibsonomy VDM Europe (1) The full citation details ... 1991 DBLP  DOI  BibTeX  RDF
13Guy L. Steele Jr. Making Asynchronous Parallelism Safe for the World. Search on Bibsonomy POPL The full citation details ... 1990 DBLP  DOI  BibTeX  RDF
13A. Udaya Shankar Verified Data Transfer Protocols with Variable Flow Control. Search on Bibsonomy ACM Trans. Comput. Syst. The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
13Dale M. Johnson, F. Javier Thayer Stating Security Requirements with Tolerable Sets. Search on Bibsonomy ACM Trans. Comput. Syst. The full citation details ... 1988 DBLP  DOI  BibTeX  RDF
Displaying result #201 - #285 of 285 (100 per page; Change: )
Pages: [<<][1][2][3]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license