References
-
J. Palsberg and P. Orbæk, 'Trust in the
${\lambda}-calculus$ ,' in Proc. Symposium on Static Analysis. Sept. 1995, number 983 in LNCS, pp. 314-329, Springer-Verlag - D. Volpano, G. Smith, and C. Irvine, 'A sound type system for secure flow analysis,' J. Computer Security, vol. 4, no. 3, pp. 167-187, 1996 https://doi.org/10.3233/JCS-1996-42-304
- A. C. Myers and B. Liskov, 'A decentralized model for information flow control,' in Proc. ACM Symp. on Operating System Principles, Oct. 1997, pp. 129-142
- N. Heintze and J. G. Riecke, 'The SLam calculus: programming with secrecy and integrity,' in Proc. ACM Symp. on Principles of Programming Languages, Jan. 1998, pp. 365-377
- G. Smith and D. Volpano, 'Secure information flow in a multithreaded imperative language,' in Proc. ACM Symp. on Principles of Programming Languages, Jan. 1998, pp. 355-364
- A. C. Myers, 'JFlow: Practical mostlystatic information flow control,' in Proc. ACM Symp. on Principles of Programming Languages, Jan. 1999, pp. 228-241
- G. Barthe and B. Serpette, 'Partial evaluation and non-interference for object calculi,' in Proc. FLOPS. Nov. 1999, vol. 1722 of LNCS, pp. 53-67, Springer-Verlag
- D. Volpano and G. Smith, 'Probabilistic noninterference in a concurrent language,' J. Computer Security, vol. 7, no. 2-3, pp. 231-253, Nov. 1999 https://doi.org/10.3233/JCS-1999-72-305
- J. Agat, 'Transforming out timing leaks,' in Proc. ACM Symp. on Principles of Programming Languages, Jan. 2000, pp. 40-53
- A. Sabelfeld and D. Sands, 'Probabilistic noninterference for multithreaded programs,' in Proc. IEEE Computer Security Foundations Workshop, July 2000, pp. 200-214
- S. Zdancewic and A. C. Myers, 'Secure information flow and CPS,' in Proc. European Symposium on Programming. Apr. 2001, vol. 2028 of LNCS, pp. 46-61, Springer-Verlag
- A. Banerjee and D. A. Naumann, 'Secure information flow and pointer confinement in a Java-like language,' in Proc. IEEE Computer Security Foundations Workshop, June 2002, pp. 253-267
- F. Pottier and V. Simonet, 'Information flow inference for ML,' in Proc. ACM Symp. on Principles of Programming Languages, Jan. 2002, pp. 319-330
- Andrei Sabelfeld and Andrew C. Myers. Language-based informationflow security. IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 21(1), 2003
- R. Wahbe, S. Lucco, T. Anderson, and S. Graham, 'Efficient softwarebased fault isolation,' in Proc. ACM Symp. on Operating System Principles, Dec. 1993, pp. 203-216
- G. Morrisett, D. Walker, K. Crary, and N. Glew, 'From System F to typed assembly language,' ACM TOPLAS, vol. 21, no. 3, pp. 528-569, May 1999
- D. Wagner, Static analysis and computer security: New techniques for software assurance, Ph.D. thesis, University of California at Berkeley, 2000
- G. C. Necula, 'Proof-carrying code,' in Proc. ACM Symp. on Principles of Programming Languages, Jan. 1997, pp. 106-119
- U. Erlingsson and F. B. Schneider, 'SASI enforcement of security policies: A retrospective,' in Proc. of the New Security Paradigm Workshop, Sept. 1999, pp. 87-95
- D. Evans and A. Twyman, 'Flexible policy-directed code safety,' in Proc. IEEE Symp. on Security and Privacy, May 1999, pp. 32-45
- F. B. Schneider, G. Morrisett, and R. Harper, 'A language-based approach to security,' in Informatics-10 Years Back, 10 Years Ahead, vol. 2000 of LNCS, pp. 86-101. Springer-Verlag, 2000
- Department of Defense, Department of Defense Trusted Computer System Evaluation Criteria, DOD 5200.28-STD (The Orange Book) edition, Dec. 1985
- J. H. Saltzer and M. D. Schroeder, 'The protection of information in computer systems,' Proc. of the IEEE, vol. 63, no. 9, pp. 1278-1308, Sept. 1975 https://doi.org/10.1109/PROC.1975.9939
- M. A. Sheldon and D. K. Gifford, 'Static dependent types for first class modules,' in Proc. Lisp and Functional Programming, June 1990, pp. 20-29
- H. Xi and F. Pfenning, 'Dependent types in practical programming,' in Proc. ACM Symp. on Principles of Programming Languages, Jan. 1999, pp. 214-227
- F. Nielson, H. Riis Nielson, and C. Hankin, Principles of Program Analysis, Springer-Verlag, 1999
- D. E. Denning and P. J. Denning, 'Certification of programs for secure information flow,' Comm. of the ACM, vol. 20, no. 7, pp. 504-513, July 1977 https://doi.org/10.1145/359636.359712
- M. Abadi and A. D. Gordon, 'A calculus for cryptographic protocols: The Spi calculus,' Information and Computation, vol. 148, no. 1, pp. 1-70, Jan. 1999 https://doi.org/10.1006/inco.1998.2740
- S. Zdancewic and A. C. Myers, 'Robust declassification,' in Proc. IEEE Computer Security Foundations Workshop, June 2001, pp. 15-23
- C. Bodei, P. Degano, F. Nielson, and H. Riis Nielson, 'Static analysis of processes for no read-up and no write-down,' in Proc. Foundations of Software Science and Computation Structure. Apr. 1999, number 1578 in LNCS, pp. 120-134, Springer-Verlag
- F. Nielson, H. Riis Nielson, R. R. Hansen, and J. G. Jensen, 'Validating firewalls in mobile ambients,' in Proc. CONCUR'99. 1999, number 1664 in LNCS, pp. 463-477, Springer-Verlag
- D. Volpano and G. Smith, 'Verifying secrets and relative secrecy,' in Proc. ACM Symp. on Principles of Programming Languages, Jan. 2000, pp. 268-276
- A. W. Appel, 'Foundational Proof-Carrying Code,' in 16th Annual IEEE Symposium on Logic in Computer Science (LICS '01), pp. 247-258, June 2001
- D. Clark, C. Hankin, and S. Hunt, 'Information flow for Algol-like languages,' Journal of Computer Languages, 2002