[1] FOCARDI R, GORRIERI R. A classification of security properties for process algebras [J]. Journal of Computer Security, 1995, 3(1): 533.
[2] VOLPANO D, SMITH G, IRVINE C. A sound type system for secure flow analysis [J]. Journal of Computer Security, 1996, 4(3): 167187.
[3] SABELFELD A, MYERS A C. Languagebased informationflow security [J]. IEEE Journal on Selected Areas in Communications, 2003, 21(1): 519.
[4] GOGUEN J A, MESEGUER J. Security policies and security models [C]∥ Proceedings of the 1982 IEEE Symposium on Research in Security and Privacy. Oakland: IEEE, 1982: 1120.
[5] SABELFELD A, SANDS D. Dimensions and principles of declassification [C]∥ Proceedings of the 18th IEEE Computer Security Foundations Workshop. AixenProvence: IEEE, 2005: 255269.
[6] MYERS A C, SABELFELD A, ZDANCEWIC S. Enforcing robust declassification [C]∥ Proceedings of the 17th IEEE Computer Security Foundations Workshop. Pacific Grove: IEEE, 2004: 172186.
[7] SABELFELD A, MYERS A C. A model for delimited information release [C]∥ Proceedings of the International Symposium on Software Security 2003 (ISSS’03). Berlin: SpringerVerlag, 2004: 174191.
[8] ROSCOE A W, GOLDSMITH M H. What is intransitive noninterference [C]∥ Proceedings of the 12th IEEE Computer Security Foundations Workshop. Los Alamitos: IEEE, 1999: 228238.
[9] CHONG S, MYERS A C. Security policies for downgrading[C]∥ Proceeding of 11th ACM Conference on Computer and Communications Security. Washington DC: ACM, 2004: 198209.
[10] CHONG S, MYERS A C. Languagebased information erasure[C]∥ Proceedings of the 18th IEEE Computer Security Foundations Workshop. AixenProvence: IEEE, 2005: 241254.
[11] MANTEL H, REINHARD A. Controlling the what and where of declassification in languagebased security[C]∥ Proceedings of the European Symposium on Programming 2007 (ESOP’07). Berlin: SpringerVerlag, 2007: 141156.
[12] SABELFELD A, SANDS D. Probabilistic noninterference for multithreaded programs[C]∥ Proceedings of IEEE Computer Security Foundations Workshop. Cambridge: IEEE, 2000: 200215.
[13] JOHAN A. Transforming out timing leaks [C]∥ Proceedings of the 27th ACM SIGPLANSIGACT Symposium on Principles of Programming Languages. Washington DC: ACM, 2000: 4053. |