Verified enforcement of stateful information release policies
Proceedings of the third ACM SIGPLAN workshop on Programming languages and analysis for security
AURA: a programming language for authorization and audit
Proceedings of the 13th ACM SIGPLAN international conference on Functional programming
Secure compilation of a multi-tier web language
Proceedings of the 4th international workshop on Types in language design and implementation
Verifying compliance of trusted programs
SS'08 Proceedings of the 17th conference on Security symposium
Verified enforcement of stateful information release policies
ACM SIGPLAN Notices
A decision support system for secure information sharing
Proceedings of the 14th ACM symposium on Access control models and technologies
A language for information flow: dynamic tracking in multiple interdependent dimensions
Proceedings of the ACM SIGPLAN Fourth Workshop on Programming Languages and Analysis for Security
Cross-tier, label-based security enforcement for web applications
Proceedings of the 2009 ACM SIGMOD International Conference on Management of data
A theory of typed coercions and its applications
Proceedings of the 14th ACM SIGPLAN international conference on Functional programming
Improving application security with data flow assertions
Proceedings of the ACM SIGOPS 22nd symposium on Operating systems principles
Paralocks: role-based information flow control and beyond
Proceedings of the 37th annual ACM SIGPLAN-SIGACT symposium on Principles of programming languages
Distributed programming with distributed authorization
Proceedings of the 5th ACM SIGPLAN workshop on Types in language design and implementation
Proceedings of the 2010 ACM SIGMOD International Conference on Management of data
Tracking information flow in dynamic tree structures
ESORICS'09 Proceedings of the 14th European conference on Research in computer security
Security-typed programming within dependently typed programming
Proceedings of the 15th ACM SIGPLAN international conference on Functional programming
DIFC programs by automatic instrumentation
Proceedings of the 17th ACM conference on Computer and communications security
Refinement types for secure implementations
ACM Transactions on Programming Languages and Systems (TOPLAS)
A type system for access control views in object-oriented languages
ARSPA-WITS'10 Proceedings of the 2010 joint conference on Automated reasoning for security protocol analysis and issues in the theory of security
Type-based access control in data-centric systems
ESOP'11/ETAPS'11 Proceedings of the 20th European conference on Programming languages and systems: part of the joint European conferences on theory and practice of software
Secure distributed programming with value-dependent types
Proceedings of the 16th ACM SIGPLAN international conference on Functional programming
A systematic analysis of XSS sanitization in web application frameworks
ESORICS'11 Proceedings of the 16th European conference on Research in computer security
Efficient incremental information flow control with nested control regions
Proceedings of the 1st ACM SIGPLAN international workshop on Programming language and systems technologies for internet clients
Self-certification: bootstrapping certified typecheckers in F* with Coq
POPL '12 Proceedings of the 39th annual ACM SIGPLAN-SIGACT symposium on Principles of programming languages
Provenance as dependency analysis
Mathematical Structures in Computer Science - Programming Language Interference and Dependence
Enforcing stateful authorization and information flow policies in fine
ESOP'10 Proceedings of the 19th European conference on Programming Languages and Systems
A core calculus for provenance
POST'12 Proceedings of the First international conference on Principles of Security and Trust
Functional programs that explain their work
Proceedings of the 17th ACM SIGPLAN international conference on Functional programming
Practical information flow for legacy web applications
Proceedings of the 8th Workshop on Implementation, Compilation, Optimization of Object-Oriented Languages, Programs and Systems
Dependent Type Theory for Verification of Information Flow and Access Control Policies
ACM Transactions on Programming Languages and Systems (TOPLAS)
Noninterference in a predicative polymorphic calculus for access control
Computer Languages, Systems and Structures
A survey on server-side approaches to securing web applications
ACM Computing Surveys (CSUR)
A core calculus for provenance
Journal of Computer Security - Security and Trust Principles
Hi-index | 0.00 |
The problem of security against timing based traffic analysis in multihop networks is considered in this work. In particular, the relationship between the level of anonymity provided and the quality of service, as measured by network latency, is analyzed ...