Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
21 | Ira S. Moskowitz, Oliver Costich |
A classical Automata Approach to Noninterference Type Problems. |
CSFW |
1992 |
DBLP DOI BibTeX RDF |
|
21 | Todd Fine |
Constructively Using Noninterference to Analyze Systems. |
S&P |
1990 |
DBLP DOI BibTeX RDF |
|
21 | Todd Fine, J. Thomas Haigh, Richard C. O'Brien, Dana L. Toups |
Noninterference and the Unwinding for LOCK. |
CSFW |
1989 |
DBLP DOI BibTeX RDF |
|
21 | Jeffrey J. P. Tsai, Kwang-Ya Fang, Horng-Yuan Chen |
A knowledge-based debugger for real-time software systems based on a noninterference testing architecture. |
COMPSAC |
1989 |
DBLP DOI BibTeX RDF |
|
21 | Daryl McCullough |
Noninterference and the composability of security properties. |
S&P |
1988 |
DBLP DOI BibTeX RDF |
|
21 | J. Thomas Haigh, William D. Young |
Extending the Noninterference Version of MLS for SAT. |
IEEE Trans. Software Eng. |
1987 |
DBLP DOI BibTeX RDF |
|
19 | Mohit Tiwari, Xun Li 0001, Hassan M. G. Wassel, Bita Mazloom, Shashidhar Mysore, Frederic T. Chong, Timothy Sherwood |
Gate-Level Information-Flow Tracking for Secure Architectures. |
IEEE Micro |
2010 |
DBLP DOI BibTeX RDF |
covert channels, noninterference, high-assurance systems, timing channels, information-flow tracking |
19 | Jonas Magazinius, Aslan Askarov, Andrei Sabelfeld |
A lattice-based approach to mashup security. |
AsiaCCS |
2010 |
DBLP DOI BibTeX RDF |
web mashups, information flow, security policies, lattices, noninterference, declassification |
19 | Ron van der Meyden, Chenyi Zhang |
Information Flow in Systems with Schedulers. |
CSF |
2008 |
DBLP DOI BibTeX RDF |
scheduler, information flow, noninterference |
19 | Aslan Askarov, Andrei Sabelfeld |
Localized delimited release: combining the what and where dimensions of information release. |
PLAS |
2007 |
DBLP DOI BibTeX RDF |
de-classification, information flow, security policies, noninterference, downgrading |
19 | Daniel S. Dantas, David Walker 0001 |
Harmless advice. |
POPL |
2006 |
DBLP DOI BibTeX RDF |
harmless advice, aspects, aspect-oriented, noninterference |
19 | Gilles Barthe, Leonor Prensa Nieto |
Formally verifying information flow type systems for concurrent and thread systems. |
FMSE |
2004 |
DBLP DOI BibTeX RDF |
machine-checked proofs, concurrency, noninterference |
19 | Yao-Wen Huang, Fang Yu 0001, Christian Hang, Chung-Hung Tsai, Der-Tsai Lee, Sy-Yen Kuo |
Securing web application code by static analysis and runtime protection. |
WWW |
2004 |
DBLP DOI BibTeX RDF |
program security, verification, type systems, information flow, noninterference, web application security, security vulnerabilities |
19 | Stephen Tse, Steve Zdancewic |
Translating dependency into parametricity. |
ICFP |
2004 |
DBLP DOI BibTeX RDF |
DCC, protection contexts, security, dependency, Haskell, information flow, translation, polymorphism, lambda calculus, monads, parametricity, noninterference, logical relations |
19 | Rachid Echahed, Frédéric Prost, Wendelin Serwe |
Statically assuring secrecy for dynamic concurrent processes. |
PPDP |
2003 |
DBLP DOI BibTeX RDF |
abstract interpretation, safety, noninterference |
19 | Heiko Mantel |
On the Composition of Secure Systems. |
S&P |
2002 |
DBLP DOI BibTeX RDF |
composition, information flow, compositionality, noninterference, emergent properties |
19 | Riccardo Focardi |
Comparing Two Information Flow Security Properties. |
CSFW |
1996 |
DBLP DOI BibTeX RDF |
nondeducibility, security checker, software tool, automatic verification, noninterference, multilevel security |
19 | Aris Zakinthinos, E. Stewart Lee |
How and why feedback composition fails [secure systems]. |
CSFW |
1996 |
DBLP DOI BibTeX RDF |
feedback composition, generalized noninterference, secure components, n-forward correctability, system designer, security of data, composability, necessary and sufficient conditions, restrictiveness |
19 | A. W. Roscoe 0001, Lars Wulf |
Composing and decomposing systems under security properties. |
CSFW |
1995 |
DBLP DOI BibTeX RDF |
separability of processes, noninterference properties, disjoint components, security of data, separability, security properties |
19 | Aris Zakinthinos, E. Stewart Lee |
The composability of non-interference [system security]. |
CSFW |
1995 |
DBLP DOI BibTeX RDF |
McCullough's conjecture, noninterference composability, feedback, security of data, system security |
19 | Sang Hyuk Son, Ashok K. Agrawala |
Distributed Checkpointing for Globally Consistent States of Databases. |
IEEE Trans. Software Eng. |
1989 |
DBLP DOI BibTeX RDF |
distributed database, consistency, Availability, transaction, checkpoint, recovery, noninterference |
13 | Annabelle McIver |
The Secret Art of Computer Programming. |
ICTAC |
2009 |
DBLP DOI BibTeX RDF |
compositional security, refinement of ignorance, program semantics, Proofs of security |
13 | Geoffrey Smith 0001 |
On the Foundations of Quantitative Information Flow. |
FoSSaCS |
2009 |
DBLP DOI BibTeX RDF |
|
13 | Delphine Demange, David Sands 0001 |
All Secrets Great and Small. |
ESOP |
2009 |
DBLP DOI BibTeX RDF |
|
13 | Limin Jia 0001, Steve Zdancewic |
Encoding information flow in Aura. |
PLAS |
2009 |
DBLP DOI BibTeX RDF |
access control, information flow control, declassification, security type system, authorization logic |
13 | Aslan Askarov, Andrei Sabelfeld |
Catch me if you can: permissive yet secure error handling. |
PLAS |
2009 |
DBLP DOI BibTeX RDF |
exception handling, security type system |
13 | Tayfun Elmas, Ali Sezgin, Serdar Tasiran, Shaz Qadeer |
An annotation assistant for interactive debugging of programs with common synchronization idioms. |
PADTAD |
2009 |
DBLP DOI BibTeX RDF |
synchronization idioms, concurrent programs, atomicity |
13 | Alexander Lux, Heiko Mantel |
Declassification with Explicit Reference Points. |
ESORICS |
2009 |
DBLP DOI BibTeX RDF |
|
13 | Jordi Diaz, Osvaldo Simeone, Yeheskel Bar-Ness |
Asymptotic Analysis of Reduced-Feedback Strategies for MIMO Gaussian Broadcast Channels. |
IEEE Trans. Inf. Theory |
2008 |
DBLP DOI BibTeX RDF |
|
13 | Francisco Bavera, Eduardo Bonelli |
Type-based information flow analysis for bytecode languages with variable object field policies. |
SAC |
2008 |
DBLP DOI BibTeX RDF |
|
13 | Sruthi Bandhakavi, William H. Winsborough, Marianne Winslett |
A Trust Management Approach for Flexible Policy Management in Security-Typed Languages. |
CSF |
2008 |
DBLP DOI BibTeX RDF |
Lanugage Based Security, Information Flow, Trust Management |
13 | Alessandro Aldini, Marco Bernardo 0001 |
Weak Behavioral Equivalences for Verifying Secure and Performance-Aware Component-Based Systems. |
WADS |
2008 |
DBLP DOI BibTeX RDF |
|
13 | Alexander Lux, Heiko Mantel |
Who Can Declassify?. |
Formal Aspects in Security and Trust |
2008 |
DBLP DOI BibTeX RDF |
|
13 | Lantian Zheng, Andrew C. Myers |
Dynamic security labels and static information flow control. |
Int. J. Inf. Sec. |
2007 |
DBLP DOI BibTeX RDF |
|
13 | Kohei Honda 0001, Nobuko Yoshida |
A uniform type structure for secure information flow. |
ACM Trans. Program. Lang. Syst. |
2007 |
DBLP DOI BibTeX RDF |
The ?-calculus, type-based program analysis, typing system, secure information flow |
13 | Torben Amtoft, Anindya Banerjee 0001 |
Verification condition generation for conditional information flow. |
FMSE |
2007 |
DBLP DOI BibTeX RDF |
conditional information flow analysis, object invariants, verification condition generation |
13 | Takaaki Tateishi, Naoshi Tabuchi |
Secure Behavior of Web Browsers to Prevent Information Leakages. |
APSEC |
2007 |
DBLP DOI BibTeX RDF |
|
13 | Lennart Beringer, Martin Hofmann 0001 |
Secure information flow and program logics. |
CSF |
2007 |
DBLP DOI BibTeX RDF |
|
13 | Paritosh Shroff, Scott F. Smith 0001, Mark Thober |
Dynamic Dependency Monitoring to Secure Information Flow. |
CSF |
2007 |
DBLP DOI BibTeX RDF |
|
13 | Alwyn Goodloe, Carl A. Gunter |
Reasoning about Concurrency for Security Tunnels. |
CSF |
2007 |
DBLP DOI BibTeX RDF |
|
13 | Dachuan Yu |
More Typed Assembly Languages for Confidentiality. |
APLAS |
2007 |
DBLP DOI BibTeX RDF |
|
13 | Anindya Banerjee 0001, David A. Naumann, Stan Rosenberg |
Towards a logical account of declassification. |
PLAS |
2007 |
DBLP DOI BibTeX RDF |
information flow, confidentiality, aliasing |
13 | Scott F. Smith 0001, Mark Thober |
Improving usability of information flow security in java. |
PLAS |
2007 |
DBLP DOI BibTeX RDF |
java, security policies, type inference, declassification, information flow security |
13 | Jeffrey A. Vaughan, Steve Zdancewic |
A Cryptographic Decentralized Label Model. |
S&P |
2007 |
DBLP DOI BibTeX RDF |
|
13 | Alejandro Russo, Andrei Sabelfeld |
Securing Interaction between Threads and the Scheduler. |
CSFW |
2006 |
DBLP DOI BibTeX RDF |
|
13 | Kevin R. O'Neill, Michael R. Clarkson, Stephen Chong |
Information-Flow Security for Interactive Programs. |
CSFW |
2006 |
DBLP DOI BibTeX RDF |
|
13 | Torben Amtoft, Sruthi Bandhakavi, Anindya Banerjee 0001 |
A logic for information flow in object-oriented programs. |
POPL |
2006 |
DBLP DOI BibTeX RDF |
information flow, confidentiality, aliasing |
13 | Niklas Broberg, David Sands 0001 |
Flow Locks: Towards a Core Calculus for Dynamic Flow Policies. |
ESOP |
2006 |
DBLP DOI BibTeX RDF |
|
13 | Kai Chen 0009, Fan Jiang 0005, Zongyao Tang |
A New Media Access Control Protocol for Ad-Hoc Wireless Sensor Networks. |
MSN |
2006 |
DBLP DOI BibTeX RDF |
Quality of Service, sensor networks, ad-hoc networks, energy efficiency, Media Access Control |
13 | Zhao Li, Baohua Zhao, Yugui Qu, Kai Chen 0009 |
An Adaptive and Distributed STDMA Scheme for Ad Hoc and Sensor Networks. |
ICN/ICONS/MCL |
2006 |
DBLP DOI BibTeX RDF |
|
13 | Jacob Zimmermann, George M. Mohay |
Distributed intrusion detection in clusters based on non-interference. |
ACSW |
2006 |
DBLP BibTeX RDF |
clusters, intrusion detection, MPI |
13 | David A. Naumann |
From Coupling Relations to Mated Invariants for Checking Information Flow. |
ESORICS |
2006 |
DBLP DOI BibTeX RDF |
|
13 | Cormac Flanagan, Stephen N. Freund, Shaz Qadeer |
Exploiting Purity for Atomicity. |
IEEE Trans. Software Eng. |
2005 |
DBLP DOI BibTeX RDF |
purity, concurrent programs, reduction, Atomicity |
13 | David A. Naumann |
Verifying a Secure Information Flow Analyzer. |
TPHOLs |
2005 |
DBLP DOI BibTeX RDF |
|
13 | Peng Li, Steve Zdancewic |
Practical Information-flow Control in Web-Based Information Systems. |
CSFW |
2005 |
DBLP DOI BibTeX RDF |
|
13 | Andrew C. Myers |
Programming with Explicit Security Policies. |
ESOP |
2005 |
DBLP DOI BibTeX RDF |
|
13 | Stephen Tse, Steve Zdancewic |
A Design for a Security-Typed Language with Certificate-Based Declassification. |
ESOP |
2005 |
DBLP DOI BibTeX RDF |
|
13 | Andrew D. Gordon 0001 |
From Typed Process Calculi to Source-Based Security. |
SAS |
2005 |
DBLP DOI BibTeX RDF |
|
13 | Nalini Venkatasubramanian, Carolyn L. Talcott, Gul Agha |
A formal model for reasoning about adaptive QoS-enabled middleware. |
ACM Trans. Softw. Eng. Methodol. |
2004 |
DBLP DOI BibTeX RDF |
meta-object models, quality-of-service, multimedia, reflection, actors, theoretical foundations, Middleware services |
13 | Andrea Acquaviva, Alessandro Aldini, Marco Bernardo 0001, Alessandro Bogliolo, Edoardo Bontà, Emanuele Lattanzi |
Assessing the Impact of Dynamic Power Management on the Functionality and the Performance of Battery-Powered Appliances. |
DSN |
2004 |
DBLP DOI BibTeX RDF |
|
13 | Zhenyue Deng, Geoffrey Smith 0001 |
Lenient Array Operations for Practical Secure Information Flow. |
CSFW |
2004 |
DBLP DOI BibTeX RDF |
|
13 | Nobuko Yoshida |
Channel dependent types for higher-order mobile processes. |
POPL |
2004 |
DBLP DOI BibTeX RDF |
the higher-order ?-calculus, access control, types, secrecy, mobile processes |
13 | Stephen Tse, Steve Zdancewic |
Run-time Principals in Information-flow Type Systems. |
S&P |
2004 |
DBLP DOI BibTeX RDF |
|
13 | Anindya Banerjee 0001, David A. Naumann |
History-Based Access Control and Secure Information Flow. |
CASSIS |
2004 |
DBLP DOI BibTeX RDF |
|
13 | Anindya Banerjee 0001, David A. Naumann |
Using Access Control for Secure Information Flow in a Java-like Language. |
CSFW |
2003 |
DBLP DOI BibTeX RDF |
|
13 | Alessandro Aldini, Roberto Gorrieri |
A Study about Trade-Off between Performance and Security in an Internet Audio Mechanism. |
Global Computing |
2003 |
DBLP DOI BibTeX RDF |
|
13 | Anindya Banerjee 0001, David A. Naumann |
Secure Information Flow and Pointer Confinement in a Java-like Language. |
CSFW |
2002 |
DBLP DOI BibTeX RDF |
|
13 | Kohei Honda 0001, Nobuko Yoshida |
A uniform type structure for secure information flow. |
POPL |
2002 |
DBLP DOI BibTeX RDF |
|
13 | O. Sami Saydjari |
LOCK : An Historical Perspective. |
ACSAC |
2002 |
DBLP DOI BibTeX RDF |
|
13 | Peeter Laud |
Semantics and Program Analysis of Computationally Secure Information Flow. |
ESOP |
2001 |
DBLP DOI BibTeX RDF |
|
13 | Andrew C. Myers |
Security-Typed Languages and Distributed Computation. |
SAS |
2001 |
DBLP DOI BibTeX RDF |
|
13 | Alessandro Aldini |
Probabilistic Information Flow in a Process Algebra. |
CONCUR |
2001 |
DBLP DOI BibTeX RDF |
|
13 | Mads Dam, Pablo Giambiagi |
Confidentiality for Mobile Code: The Case of a Simple Payment Protocol. |
CSFW |
2000 |
DBLP DOI BibTeX RDF |
information flow, confidentiality, Mobile code |
13 | Dennis M. Volpano, Geoffrey Smith 0001 |
Verifying Secrets and Relative Secrecy. |
POPL |
2000 |
DBLP DOI BibTeX RDF |
|
13 | Jan Jürjens |
Secure Information Flow for Concurrent Processes. |
CONCUR |
2000 |
DBLP DOI BibTeX RDF |
|
13 | Gerhard Schellhorn, Wolfgang Reif, Axel Schairer, Paul A. Karger, Vernon Austel, David C. Toll |
Verification of a Formal Security Model for Multiapplicative Smart Cards. |
ESORICS |
2000 |
DBLP DOI BibTeX RDF |
|
13 | Dennis M. Volpano |
Safety versus Secrecy. |
SAS |
1999 |
DBLP DOI BibTeX RDF |
|
13 | Riccardo Focardi, Roberto Gorrieri |
The Compositional Security Checker: A Tool for the Verification of Information Flow Security Properties. |
IEEE Trans. Software Eng. |
1997 |
DBLP DOI BibTeX RDF |
Tools and techniques, network protocol verification, access controls, program verification, information flow controls |
13 | Dennis M. Volpano, Geoffrey Smith 0001 |
A Type-Based Approach to Program Security. |
TAPSOFT |
1997 |
DBLP DOI BibTeX RDF |
|
13 | Qi Shi 0001, Ning Zhang |
Applying Composable Security Properties to Assessment of Information Systems. |
COMPSAC |
1996 |
DBLP DOI BibTeX RDF |
|
13 | Barry Richards, Yuejun Jiang, H. Choi |
On Interval-based Temporal Planning: An IQ Strategy. |
ISMIS |
1991 |
DBLP DOI BibTeX RDF |
Qualification Problem, Interval Principle, Collapsing and Stretching/Clipping, Temporal Logics, Planning, Constraint Satisfaction, Points, Actions, Intervals, Maximal, Frame Problem |
13 | Paul Smith, Richard Keighley |
The Formal Development of a Secure Transaction Mechanism. |
VDM Europe (1) |
1991 |
DBLP DOI BibTeX RDF |
|
13 | Guy L. Steele Jr. |
Making Asynchronous Parallelism Safe for the World. |
POPL |
1990 |
DBLP DOI BibTeX RDF |
|
13 | A. Udaya Shankar |
Verified Data Transfer Protocols with Variable Flow Control. |
ACM Trans. Comput. Syst. |
1989 |
DBLP DOI BibTeX RDF |
|
13 | Dale M. Johnson, F. Javier Thayer |
Stating Security Requirements with Tolerable Sets. |
ACM Trans. Comput. Syst. |
1988 |
DBLP DOI BibTeX RDF |
|