최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기情報保護學會誌 = KIISC review, v.16 no.5, 2006년, pp.35 - 44
* AI 자동 식별 결과로 적합하지 않은 문장이 있을 수 있으니, 이용에 유의하시기 바랍니다.
J. Palsberg and P. Orbæk, 'Trust in the ${\lambda}-calculus$ ,' in Proc. Symposium on Static Analysis. Sept. 1995, number 983 in LNCS, pp. 314-329, Springer-Verlag
D. Volpano, G. Smith, and C. Irvine, 'A sound type system for secure flow analysis,' J. Computer Security, vol. 4, no. 3, pp. 167-187, 1996
A. C. Myers and B. Liskov, 'A decentralized model for information flow control,' in Proc. ACM Symp. on Operating System Principles, Oct. 1997, pp. 129-142
N. Heintze and J. G. Riecke, 'The SLam calculus: programming with secrecy and integrity,' in Proc. ACM Symp. on Principles of Programming Languages, Jan. 1998, pp. 365-377
G. Smith and D. Volpano, 'Secure information flow in a multithreaded imperative language,' in Proc. ACM Symp. on Principles of Programming Languages, Jan. 1998, pp. 355-364
A. C. Myers, 'JFlow: Practical mostlystatic information flow control,' in Proc. ACM Symp. on Principles of Programming Languages, Jan. 1999, pp. 228-241
G. Barthe and B. Serpette, 'Partial evaluation and non-interference for object calculi,' in Proc. FLOPS. Nov. 1999, vol. 1722 of LNCS, pp. 53-67, Springer-Verlag
D. Volpano and G. Smith, 'Probabilistic noninterference in a concurrent language,' J. Computer Security, vol. 7, no. 2-3, pp. 231-253, Nov. 1999
J. Agat, 'Transforming out timing leaks,' in Proc. ACM Symp. on Principles of Programming Languages, Jan. 2000, pp. 40-53
A. Sabelfeld and D. Sands, 'Probabilistic noninterference for multithreaded programs,' in Proc. IEEE Computer Security Foundations Workshop, July 2000, pp. 200-214
S. Zdancewic and A. C. Myers, 'Secure information flow and CPS,' in Proc. European Symposium on Programming. Apr. 2001, vol. 2028 of LNCS, pp. 46-61, Springer-Verlag
A. Banerjee and D. A. Naumann, 'Secure information flow and pointer confinement in a Java-like language,' in Proc. IEEE Computer Security Foundations Workshop, June 2002, pp. 253-267
F. Pottier and V. Simonet, 'Information flow inference for ML,' in Proc. ACM Symp. on Principles of Programming Languages, Jan. 2002, pp. 319-330
Andrei Sabelfeld and Andrew C. Myers. Language-based informationflow security. IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 21(1), 2003
R. Wahbe, S. Lucco, T. Anderson, and S. Graham, 'Efficient softwarebased fault isolation,' in Proc. ACM Symp. on Operating System Principles, Dec. 1993, pp. 203-216
G. Morrisett, D. Walker, K. Crary, and N. Glew, 'From System F to typed assembly language,' ACM TOPLAS, vol. 21, no. 3, pp. 528-569, May 1999
D. Wagner, Static analysis and computer security: New techniques for software assurance, Ph.D. thesis, University of California at Berkeley, 2000
G. C. Necula, 'Proof-carrying code,' in Proc. ACM Symp. on Principles of Programming Languages, Jan. 1997, pp. 106-119
U. Erlingsson and F. B. Schneider, 'SASI enforcement of security policies: A retrospective,' in Proc. of the New Security Paradigm Workshop, Sept. 1999, pp. 87-95
D. Evans and A. Twyman, 'Flexible policy-directed code safety,' in Proc. IEEE Symp. on Security and Privacy, May 1999, pp. 32-45
F. B. Schneider, G. Morrisett, and R. Harper, 'A language-based approach to security,' in Informatics-10 Years Back, 10 Years Ahead, vol. 2000 of LNCS, pp. 86-101. Springer-Verlag, 2000
Department of Defense, Department of Defense Trusted Computer System Evaluation Criteria, DOD 5200.28-STD (The Orange Book) edition, Dec. 1985
J. H. Saltzer and M. D. Schroeder, 'The protection of information in computer systems,' Proc. of the IEEE, vol. 63, no. 9, pp. 1278-1308, Sept. 1975
M. A. Sheldon and D. K. Gifford, 'Static dependent types for first class modules,' in Proc. Lisp and Functional Programming, June 1990, pp. 20-29
H. Xi and F. Pfenning, 'Dependent types in practical programming,' in Proc. ACM Symp. on Principles of Programming Languages, Jan. 1999, pp. 214-227
F. Nielson, H. Riis Nielson, and C. Hankin, Principles of Program Analysis, Springer-Verlag, 1999
D. E. Denning and P. J. Denning, 'Certification of programs for secure information flow,' Comm. of the ACM, vol. 20, no. 7, pp. 504-513, July 1977
M. Abadi and A. D. Gordon, 'A calculus for cryptographic protocols: The Spi calculus,' Information and Computation, vol. 148, no. 1, pp. 1-70, Jan. 1999
S. Zdancewic and A. C. Myers, 'Robust declassification,' in Proc. IEEE Computer Security Foundations Workshop, June 2001, pp. 15-23
C. Bodei, P. Degano, F. Nielson, and H. Riis Nielson, 'Static analysis of processes for no read-up and no write-down,' in Proc. Foundations of Software Science and Computation Structure. Apr. 1999, number 1578 in LNCS, pp. 120-134, Springer-Verlag
F. Nielson, H. Riis Nielson, R. R. Hansen, and J. G. Jensen, 'Validating firewalls in mobile ambients,' in Proc. CONCUR'99. 1999, number 1664 in LNCS, pp. 463-477, Springer-Verlag
D. Volpano and G. Smith, 'Verifying secrets and relative secrecy,' in Proc. ACM Symp. on Principles of Programming Languages, Jan. 2000, pp. 268-276
A. W. Appel, 'Foundational Proof-Carrying Code,' in 16th Annual IEEE Symposium on Logic in Computer Science (LICS '01), pp. 247-258, June 2001
D. Clark, C. Hankin, and S. Hunt, 'Information flow for Algol-like languages,' Journal of Computer Languages, 2002
*원문 PDF 파일 및 링크정보가 존재하지 않을 경우 KISTI DDS 시스템에서 제공하는 원문복사서비스를 사용할 수 있습니다.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.