llsec.bib

Zdancewic2002Secure-Informat
Secure Information Flow via Linear Continuations
Zdancewic, S. and Myers, A. C.
  Higher-Order and Symbolic Computation  15  209-234  (2002)
http://www.cis.upenn.edu/~stevez/papers/ZM02.pdf
Zdancewic2002Secure-program-
Secure program partitioning
Zdancewic, S. and Zheng, L. and Nystrom, N. and Myers, A. C.
  ACM Trans. Comput. Syst.  20  283-328  (2002)
http://doi.acm.org/10.1145/566340.566343
Hayati2004Language-Based-
Language-Based Enforcement of Privacy Policies
Hayati, K. and Abadi, M.
Privacy Enhancing Technologies      302-313  (2004)
http://dx.doi.org/10.1007/11423409_19
Crary2005A-monadic-analy
A monadic analysis of information flow security with mutable state
Crary, K. and Kliger, A. and Pfenning, F.
  J. Funct. Program.  15  249-291  (2005)
http://dx.doi.org/10.1017/S0956796804005441
Clarkson2005Belief-in-Infor
Belief in Information Flow
Clarkson, M. R. and Myers, A. C. and Schneider, F. B.
CSFW      31-45  (2005)
http://dx.doi.org/10.1109/CSFW.2005.10
Zheng2005End-to-End-Avai
End-to-End Availability Policies and Noninterference
Zheng, L. and Myers, A. C.
CSFW      272-286  (2005)
http://dx.doi.org/10.1109/CSFW.2005.16
Chong2005Language-Based-
Language-Based Information Erasure
Chong, S. and Myers, A. C.
CSFW      241-254  (2005)
http://dx.doi.org/10.1109/CSFW.2005.19
Boudol2005On-Typing-Infor
On Typing Information Flow
Boudol, G.
ICTAC      366-380  (2005)
ftp://ftp-sop.inria.fr/mimosa/personnel/gbo/otif.pdf
Clark2005Quantitative-In
Quantitative Information Flow, Relations and Polymorphic Types
Clark, D. and Hunt, S. and Malacaria, P.
  J. Log. Comput.  15  181-199  (2005)
http://logcom.oxfordjournals.org/cgi/reprint/15/2/181?ijkey=56At7mt7JtZw6&keytype=ref
Garg2006A-Linear-Logic-
A Linear Logic of Authorization and Knowledge
Garg, D. and Pfenning, F.
Proceedings of the 11th European Symposium on Computer Security ({ESORICS})        (2006)
http://dx.doi.org/10.1007/11863908_19
Chong2006Decentralized-R
Decentralized Robustness
Chong, S. and Myers, A. C.
CSFW      242-256  (2006)
http://www.cs.cornell.edu/andru/papers/robdlm.pdf
Myers2006Enforcing-Robus
Enforcing Robust Declassification and Qualified Robustness
Myers, A. C. and Sabelfeld, A. and Zdancewic, S.
  Journal of Computer Security  14  157-196  (2006)
http://www.cis.upenn.edu/~stevez/papers/MSZ06.pdf
Tse2006Run-Time-Princi
Run-Time Principals in Information-Flow Type Systems
Tse, S. and Zdancewic, S.
  ACM Trans. Program. Lang. Syst.      (2006)
http://www.cis.upenn.edu/~stevez/papers/TZ06.pdf
Vaughan2007A-Cryptographic
A Cryptographic Decentralized Label Model
Vaughan, J. A. and Zdancewic, S.
IEEE Symposium on Security and Privacy      192-206  (2007)
http://dx.doi.org/10.1109/SP.2007.5
Malacaria2007Assessing-secur
Assessing security threats of looping constructs
Malacaria, P.
POPL      225-235  (2007)
http://portal.acm.org/ft_gateway.cfm?id=1190251&type=pdf&coll=GUIDE&dl=GUIDE&CFID=42022665&CFTOKEN=81946341
Boudol2007Access-Control-
Access Control and Declassification
Boudol, G. and Kolundzija, M.
        (2007)
ftp://ftp-sop.inria.fr/mimosa/personnel/gbo/acad.pdf