Specification and verification of the UCLA Unix security kernel
Communications of the ACM
A lattice model of secure information flow
Communications of the ACM
Security Kernel validation in practice
Communications of the ACM
A note on the confinement problem
Communications of the ACM
A comment on the confinement problem
SOSP '75 Proceedings of the fifth ACM symposium on Operating systems principles
Program confinement in KVM/370
ACM '77 Proceedings of the 1977 annual conference
On the Identification of Covert Storage Channels in Secure Systems
IEEE Transactions on Software Engineering
A Model for Multilevel Security in Computer Networks
IEEE Transactions on Software Engineering
Approximate Reasoning About the Semantic Effects of Program Changes
IEEE Transactions on Software Engineering
Covert Flow Trees: A Visual Approach to Analyzing Covert Storage Channels
IEEE Transactions on Software Engineering
A graduate course in computing security technology
SIGCSE '93 Proceedings of the twenty-fourth SIGCSE technical symposium on Computer science education
Report on the computer security foundations workshop VI
ACM SIGSAC Review
Access Control: Policies, Models, and Mechanisms
FOSAD '00 Revised versions of lectures given during the IFIP WG 1.7 International School on Foundations of Security Analysis and Design on Foundations of Security Analysis and Design: Tutorial Lectures
Proceedings of the 25th International Conference on Software Engineering
Applying Composable Security Properties to Assessment of Information Systems
COMPSAC '96 Proceedings of the 20th Conference on Computer Software and Applications
A review of information security issues and respective research contributions
ACM SIGMIS Database
Designing secure systems on reconfigurable hardware
ACM Transactions on Design Automation of Electronic Systems (TODAES)
A security domain model to assess software for exploitable covert channels
Proceedings of the third ACM SIGPLAN workshop on Programming languages and analysis for security
ACM Transactions on Information and System Security (TISSEC)
Putting Trojans on the Horns of a Dilemma: Redundancy for Information Theft Detection
Transactions on Computational Science IV
Information-Theoretic Modeling and Analysis of Interrupt-Related Covert Channels
Formal Aspects in Security and Trust
Automatic identification of covert channels inside Linux kernel based on source codes
Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human
Execution leases: a hardware-supported mechanism for enforcing strong non-interference
Proceedings of the 42nd Annual IEEE/ACM International Symposium on Microarchitecture
Scenarios and Covert Channels: Another Game...
Electronic Notes in Theoretical Computer Science (ENTCS)
Security Primitives for Reconfigurable Hardware-Based Systems
ACM Transactions on Reconfigurable Technology and Systems (TRETS)
Protecting confidential data on personal computers with storage capsules
SSYM'09 Proceedings of the 18th conference on USENIX security symposium
Determinating timing channels in compute clouds
Proceedings of the 2010 ACM workshop on Cloud computing security workshop
Practical overview of a Xen covert channel
Journal in Computer Virology
Idle port scanning and non-interference analysis of network protocol stacks using model checking
USENIX Security'10 Proceedings of the 19th USENIX conference on Security
Covert channels in multiple access protocols
Proceedings of the ACM SIGCOMM 2011 conference
Low-attention forwarding for mobile network covert channels
CMS'11 Proceedings of the 12th IFIP TC 6/TC 11 international conference on Communications and multimedia security
Covert channel identification founded on information flow analysis
CIS'05 Proceedings of the 2005 international conference on Computational Intelligence and Security - Volume Part II
Finding covert channels in protocols with message sequence charts: the case of RMTP2
SAM'04 Proceedings of the 4th international SDL and MSC conference on System Analysis and Modeling
New constructive approach to covert channel modeling and channel capacity estimation
ISC'05 Proceedings of the 8th international conference on Information Security
Information flow graph: an approach to identifying covert storage channels
INTRUST'10 Proceedings of the Second international conference on Trusted Systems
The dilemma of covert channels searching
ICISC'05 Proceedings of the 8th international conference on Information Security and Cryptology
Plugging side-channel leaks with timing information flow control
HotCloud'12 Proceedings of the 4th USENIX conference on Hot Topics in Cloud Ccomputing
Students who don't understand information flow should be eaten: an experience paper
CSET'12 Proceedings of the 5th USENIX conference on Cyber Security Experimentation and Test
A practical testing framework for isolating hardware timing channels
Proceedings of the Conference on Design, Automation and Test in Europe
Quantifying and Classifying Covert Communications on Android
Mobile Networks and Applications
Hi-index | 0.01 |