Publisher
Springer International Publishing
Reference17 articles.
1. Almeida, J.B., Barbosa, M., Barthe, G., Dupressoir, F., Emmi, M.: Verifying constant-time implementations. In: Holz, T., Savage, S. (eds.) 25th USENIX Security Symposium, USENIX Security 2016, pp. 53–70. USENIX Association (2016)
2. Askarov, A., Sabelfeld, A.: Gradual release: unifying declassification, encryption and key release policies. In: 2007 IEEE Symposium on Security and Privacy (S &P 2007), pp. 207–221. IEEE Computer Society (2007). https://doi.org/10.1109/SP.2007.22
3. Askarov, A., Sabelfeld, A.: Localized delimited release: combining the what and where dimensions of information release. In: Hicks, M.W. (ed.) Proceedings of the 2007 Workshop on Programming Languages and Analysis for Security, PLAS 2007, pp. 53–60. ACM (2007). https://doi.org/10.1145/1255329.1255339
4. Chudnov, A., Naumann, D.A.: Assuming you know: epistemic semantics of relational annotations for expressive flow policies. In: 31st IEEE Computer Security Foundations Symposium, CSF 2018, pp. 189–203. IEEE Computer Society (2018). https://doi.org/10.1109/CSF.2018.00021
5. Goguen, J.A., Meseguer, J.: Security policies and security models. In: 1982 IEEE Symposium on Security and Privacy, pp. 11–20. IEEE Computer Society (1982). https://doi.org/10.1109/SP.1982.10014
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Assume but Verify: Deductive Verification of Leaked Information in Concurrent Applications;Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security;2023-11-15
2. A Dafny-based approach to thread-local information flow analysis;2023 IEEE/ACM 11th International Conference on Formal Methods in Software Engineering (FormaliSE);2023-05