Termination-Insensitive Noninterference Leaks More Than Just a Bit, Computer Security -ESORICS 2008, 13th European Symposium on Research in Computer Security Proceedings, pp.333-348, 2008. ,
DOI : 10.3233/JCS-1996-42-304
URL : http://www.md.chalmers.se/~andrei/esorics08.pdf
Efficient Purely-dynamic Information Flow Analysis, Proceedings of the ACM SIGPLAN Fourth Workshop on Programming Languages and Analysis for Security (PLAS '09, pp.113-124, 2009. ,
Permissive Dynamic Information Flow Analysis, Proceedings of the 5th ACM SIGPLAN Workshop on Programming Languages and Analysis for Security (PLAS '10, pp.1-3, 2010. ,
Multiple facets for dynamic information flow, Proceedings of the 39th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, POPL 2012, pp.165-178, 2012. ,
Secure information flow by self-composition, Mathematical Structures in Computer Science, vol.4, issue.06, pp.1207-1252, 2011. ,
DOI : 10.1145/5397.5399
A Taxonomy of Information Flow Monitors Held as Part of the European Joint Conferences on Theory and Practice of Software, Principles of Security and Trust -5th International Conference Proceedings, pp.46-67, 2016. ,
A Trusted Mechanised JavaScript Specification, Proceedings of the 41st ACM SIGPLAN- SIGACT Symposium on Principles of Programming Languages, pp.87-100, 2014. ,
DOI : 10.1145/2535838.2535876
URL : https://hal.archives-ouvertes.fr/hal-00910135
Pretty-Big-Step Semantics, Programming Languages and Systems -22nd European Symposium on Programming, ESOP 2013, Held as Part of the European Joint Conferences on Theory and Practice of Software, pp.41-60, 2013. ,
DOI : 10.1007/978-3-642-37036-6_3
Information Transmission in Computational Systems, Proceedings of the Sixth ACM Symposium on Operating Systems Principles (SOSP '77, pp.133-139, 1977. ,
Certification of Programs for Secure Information Flow, Commun. ACM, vol.20, issue.7, pp.504-513, 1977. ,
Noninterference through Secure Multi-execution, 2010 IEEE Symposium on Security and Privacy, pp.109-124, 2010. ,
DOI : 10.1109/SP.2010.15
Security Policies and Security Models, IEEE Symposium on Security and Privacy, pp.11-20, 1982. ,
On flow-sensitive security types, Proceedings of the 33rd ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, pp.79-90, 2006. ,
DOI : 10.1145/1111320.1111045
URL : http://www.cs.chalmers.se/~dave/papers/Hunt-Sands-POPL06.pdf
Timing- and Termination-Sensitive Secure Information Flow: Exploring a New Approach, 2011 IEEE Symposium on Security and Privacy, pp.413-428, 2011. ,
DOI : 10.1109/SP.2011.19
URL : http://www.ieee-security.org/TC/SP2011/PAPERS/2011/paper026.pdf
Confidentiality Enforcement Using Dynamic Information Flow Analyses, Ph.D. Dissertation. Kansas State University, 2007. ,
Dynamic vs. Static Flow-Sensitive Security Analysis, 2010 23rd IEEE Computer Security Foundations Symposium, pp.186-199, 2010. ,
DOI : 10.1109/CSF.2010.20
Language-based information-flow security, IEEE Journal on Selected Areas in Communications, vol.21, issue.1, pp.5-19, 2003. ,
DOI : 10.1109/JSAC.2002.806121
From Dynamic to Static and Back: Riding the Roller Coaster of Information-Flow Control Research, Perspectives of Systems Informatics, 7th International Andrei Ershov Memorial Conference, pp.352-365, 2009. ,
DOI : 10.1007/978-3-642-11486-1_30