A hardware architecture for implementing protection rings
Communications of the ACM
Integrating security in a large distributed system
ACM Transactions on Computer Systems (TOCS)
On the Identification of Covert Storage Channels in Secure Systems
IEEE Transactions on Software Engineering
Abuses in cryptography and how to fight them
CRYPTO '88 Proceedings on Advances in cryptology
Concurrency control in multilevel-secure databases based on replicated architecture
SIGMOD '90 Proceedings of the 1990 ACM SIGMOD international conference on Management of data
Toward a multilevel secure relational data model
SIGMOD '91 Proceedings of the 1991 ACM SIGMOD international conference on Management of data
A Retrospective on the VAX VMM Security Kernel
IEEE Transactions on Software Engineering
Covert Flow Trees: A Visual Approach to Analyzing Covert Storage Channels
IEEE Transactions on Software Engineering
Communications of the ACM
Fine grained object protection in UNIX
ACM SIGOPS Operating Systems Review
Small computers and security: an oxymoron?
ACM SIGICE Bulletin
Inferential security in individual computing environments
ACM SIGICE Bulletin
A taxonomy of computer program security flaws
ACM Computing Surveys (CSUR)
An Analysis of the Intel 80×86 Security Architecture and Implementations
IEEE Transactions on Software Engineering
IEEE Transactions on Software Engineering
Several secure store and forward devices
CCS '96 Proceedings of the 3rd ACM conference on Computer and communications security
Secure transaction processing in firm real-time database systems
SIGMOD '97 Proceedings of the 1997 ACM SIGMOD international conference on Management of data
Extensible security architectures for Java
Proceedings of the sixteenth ACM symposium on Operating systems principles
A decentralized model for information flow control
Proceedings of the sixteenth ACM symposium on Operating systems principles
Secure information flow in a multi-threaded imperative language
POPL '98 Proceedings of the 25th ACM SIGPLAN-SIGACT symposium on Principles of programming languages
JFlow: practical mostly-static information flow control
Proceedings of the 26th ACM SIGPLAN-SIGACT symposium on Principles of programming languages
A new security policy for distributed resource management and access control
NSPW '96 Proceedings of the 1996 workshop on New security paradigms
Meta objects for access control: a formal model for role-based principals
Proceedings of the 1998 workshop on New security paradigms
Discussion topic: what is the old security paradigm?
Proceedings of the 1998 workshop on New security paradigms
EROS: a fast capability system
Proceedings of the seventeenth ACM symposium on Operating systems principles
Secure transaction management and query processing in multilevel secure database systems
SAC '94 Proceedings of the 1994 ACM symposium on Applied computing
Application of security tot he computing science classroom
Proceedings of the thirty-first SIGCSE technical symposium on Computer science education
Secure Concurrency Control in Firm Real-Time Database Systems
Distributed and Parallel Databases - Security of data and transaction processing
Information flow inference for free
ICFP '00 Proceedings of the fifth ACM SIGPLAN international conference on Functional programming
An approach to safe object sharing
OOPSLA '00 Proceedings of the 15th ACM SIGPLAN conference on Object-oriented programming, systems, languages, and applications
Fault Tolerant Operating Systems
ACM Computing Surveys (CSUR)
Operating System Structures to Support Security and Reliable Software
ACM Computing Surveys (CSUR)
ACM Computing Surveys (CSUR)
Encryption and Secure Computer Networks
ACM Computing Surveys (CSUR)
Formal Models for Computer Security
ACM Computing Surveys (CSUR)
ACM Computing Surveys (CSUR)
An Axiomatic Approach to Information Flow in Programs
ACM Transactions on Programming Languages and Systems (TOPLAS)
Shared resource matrix methodology: an approach to identifying storage and timing channels
ACM Transactions on Computer Systems (TOCS)
Specification and verification of the UCLA Unix security kernel
Communications of the ACM
Synchronization with eventcounts and sequencers
Communications of the ACM
Secure personal computing in an insecure network
Communications of the ACM
Certification of programs for secure information flow
Communications of the ACM
Intentional resolution of privacy protection in database systems
Communications of the ACM
A lattice model of secure information flow
Communications of the ACM
Security Kernel validation in practice
Communications of the ACM
Protection in operating systems
Communications of the ACM
Letters to the editor: A protection model and its implementation in a dataflow system
Communications of the ACM
Real-Time Database Systems in the New Millenium
Real-Time Systems
Secure Internet programming
Improving timeliness in real-time secure database systems
ACM SIGMOD Record
Report on the computer security foundations workshop VI
ACM SIGSAC Review
Cost profile of a highly assured, secure operating system
ACM Transactions on Information and System Security (TISSEC)
Information and control in gray-box systems
SOSP '01 Proceedings of the eighteenth ACM symposium on Operating systems principles
Information leakage from optical emanations
ACM Transactions on Information and System Security (TISSEC)
Multiprocessing and portability for PDAs
EW 9 Proceedings of the 9th workshop on ACM SIGOPS European workshop: beyond the PC: new challenges for the operating system
Abstract interpretation of operational semantics for secure information flow
Information Processing Letters
Maintaining security and timeliness in real-time database system
Journal of Systems and Software
The JavaSeal Mobile Agent Kernel
Autonomous Agents and Multi-Agent Systems
Mathematics, Technology, and Trust: Formal Verification, Computer Security, and the U.S. Military
IEEE Annals of the History of Computing
Lattice-Based Access Control Models
Computer
Advanced Transaction Processing in Multilevel Secure File Stores
IEEE Transactions on Knowledge and Data Engineering
Integrating Security and Real-Time Requirements Using Covert Channel Capacity
IEEE Transactions on Knowledge and Data Engineering
Secure Buffering in Firm Real-Time Database Systems
VLDB '98 Proceedings of the 24rd International Conference on Very Large Data Bases
Entity Modeling in the MLS Relational Model
VLDB '92 Proceedings of the 18th International Conference on Very Large Data Bases
VMCAI '02 Revised Papers from the Third International Workshop on Verification, Model Checking, and Abstract Interpretation
Securing Communication in a Concurrent Language
SAS '02 Proceedings of the 9th International Symposium on Static Analysis
Infranet: Circumventing Web Censorship and Surveillance
Proceedings of the 11th USENIX Security Symposium
Language Issues in Mobile Program Security
Mobile Agents and Security
Mobile Agents and Security
Information Flow Control among Objects in Role-Based Access Control Model
DEXA '01 Proceedings of the 12th International Conference on Database and Expert Systems Applications
Secure buffering in firm real-time database systems
The VLDB Journal — The International Journal on Very Large Data Bases
Bidirectional mobile code trust management using tamper resistant hardware
Mobile Networks and Applications - Security in mobile computing environments
A proposal for certain process management and intercommunication primitives
ACM SIGOPS Operating Systems Review
Proceedings of the 25th International Conference on Software Engineering
Secure Composition of Insecure Components
CSFW '99 Proceedings of the 12th IEEE workshop on Computer Security Foundations
An extensible file system for hydra
ICSE '78 Proceedings of the 3rd international conference on Software engineering
The Lattice Security Model In A Public Computing Network
ACM '78 Proceedings of the 1978 annual conference
Possibility theory: As a means for modeling computer security and protection
MVL '78 Proceedings of the eighth international symposium on Multiple-valued logic
Full protection specifications in the semantic model for database protection languages
ACM '76 Proceedings of the 1976 annual conference
On protection in operating systems
SOSP '75 Proceedings of the fifth ACM symposium on Operating systems principles
Engineering a security kernel for Multics
SOSP '75 Proceedings of the fifth ACM symposium on Operating systems principles
Policy/mechanism separation in Hydra
SOSP '75 Proceedings of the fifth ACM symposium on Operating systems principles
Protection in the Hydra Operating System
SOSP '75 Proceedings of the fifth ACM symposium on Operating systems principles
A comment on the confinement problem
SOSP '75 Proceedings of the fifth ACM symposium on Operating systems principles
The enforcement of security policies for computation
SOSP '75 Proceedings of the fifth ACM symposium on Operating systems principles
The Multics kernel design project
SOSP '77 Proceedings of the sixth ACM symposium on Operating systems principles
Proving multilevel security of a system design
SOSP '77 Proceedings of the sixth ACM symposium on Operating systems principles
Information transmission in computational systems
SOSP '77 Proceedings of the sixth ACM symposium on Operating systems principles
The transfer of information and authority in a protection system
SOSP '79 Proceedings of the seventh ACM symposium on Operating systems principles
A mechanism for information control in parallel systems
SOSP '79 Proceedings of the seventh ACM symposium on Operating systems principles
Design and verification of secure systems
SOSP '81 Proceedings of the eighth ACM symposium on Operating systems principles
Reflections on the verification of the security of an operating system kernel
SOSP '83 Proceedings of the ninth ACM symposium on Operating systems principles
On attaining reliable software for a secure operating system
Proceedings of the international conference on Reliable software
Partitions and principles for secure operating systems
ACM '75 Proceedings of the 1975 annual conference
Resolving covert channels within a B2 class secure system
ACM SIGOPS Operating Systems Review
On security in capability-based systems
ACM SIGOPS Operating Systems Review
Model-carrying code: a practical approach for safe execution of untrusted applications
SOSP '03 Proceedings of the nineteenth ACM symposium on Operating systems principles
SOSP '03 Proceedings of the nineteenth ACM symposium on Operating systems principles
Access for sale: a new class of worm
Proceedings of the 2003 ACM workshop on Rapid malcode
Saving the world from bad beans: deployment-time confinement checking
OOPSLA '03 Proceedings of the 18th annual ACM SIGPLAN conference on Object-oriented programing, systems, languages, and applications
In defense of program testing or correctness proofs considered harmful
ACM SIGPLAN Notices
Protecting network users in mobile code systems
Journal of Parallel and Distributed Computing
New covert channels in HTTP: adding unwitting Web browsers to anonymity sets
Proceedings of the 2003 ACM workshop on Privacy in the electronic society
Real-Time Databases and Data Services
Real-Time Systems
Computer Networks: The International Journal of Computer and Telecommunications Networking
RIFLE: An Architectural Framework for User-Centric Information-Flow Security
Proceedings of the 37th annual IEEE/ACM International Symposium on Microarchitecture
Secure one snapshot protocol for concurrency control in real-time stock trading systems
Journal of Systems and Software
ACM Transactions on Computer Systems (TOCS)
Building an information security education program
Proceedings of the 1st annual conference on Information security curriculum development
A logical approach to multilevel security of probabilistic systems
Distributed Computing
A distributed content-based search engine based on mobile code
Proceedings of the 2005 ACM symposium on Applied computing
Towards an architectural treatment of software security: a connector-centric approach
SESS '05 Proceedings of the 2005 workshop on Software engineering for secure systems—building trustworthy applications
Using dynamic information flow analysis to detect attacks against applications
SESS '05 Proceedings of the 2005 workshop on Software engineering for secure systems—building trustworthy applications
A database security course on a shoestring
Proceedings of the 37th SIGCSE technical symposium on Computer science education
Program confinement in KVM/370
ACM '77 Proceedings of the 1977 annual conference
VM/370 security retrofit program
ACM '77 Proceedings of the 1977 annual conference
Application security support in the operating system kernel
ASIACCS '06 Proceedings of the 2006 ACM Symposium on Information, computer and communications security
An empirical study of the strength of information flows in programs
Proceedings of the 2006 international workshop on Dynamic systems analysis
Principles-driven forensic analysis
NSPW '05 Proceedings of the 2005 workshop on New security paradigms
Timing channels, anonymity, mixes, and spikes
ACST'06 Proceedings of the 2nd IASTED international conference on Advances in computer science and technology
Hot or not: revealing hidden services by their clock skew
Proceedings of the 13th ACM conference on Computer and communications security
Measuring the confinement of probabilistic systems
Theoretical Computer Science - Theoretical foundations of security analysis and design II
Performance and security lessons learned from virtualizing the alpha processor
Proceedings of the 34th annual international symposium on Computer architecture
Design of the EROS trusted window system
SSYM'04 Proceedings of the 13th conference on USENIX Security Symposium - Volume 13
Mapping internet sensors with probe response attacks
SSYM'05 Proceedings of the 14th conference on USENIX Security Symposium - Volume 14
Person-level routing in the mobile people architecture
USITS'99 Proceedings of the 2nd conference on USENIX Symposium on Internet Technologies and Systems - Volume 2
Managing the risk of covert information flows in virtual machine systems
Proceedings of the 12th ACM symposium on Access control models and technologies
Chinese-wall process confinement for practical distributed coalitions
Proceedings of the 12th ACM symposium on Access control models and technologies
USENIX-SS'06 Proceedings of the 15th conference on USENIX Security Symposium - Volume 15
Expanding and extending the security features of java
SSYM'98 Proceedings of the 7th conference on USENIX Security Symposium - Volume 7
ATEC '98 Proceedings of the annual conference on USENIX Annual Technical Conference
Trusted hardware: can it be trustworthy?
Proceedings of the 44th annual Design Automation Conference
Proceedings of the 44th annual Design Automation Conference
A layered approach to simplified access control in virtualized systems
ACM SIGOPS Operating Systems Review
A Kernel design for a secure data base management system
VLDB '77 Proceedings of the third international conference on Very large data bases - Volume 3
A uniform type structure for secure information flow
ACM Transactions on Programming Languages and Systems (TOPLAS)
Analysis of three multilevel security architectures
Proceedings of the 2007 ACM workshop on Computer security architecture
A novel covert channel based on the IP header record route option
International Journal of Advanced Media and Communication
Processor hardware counter statistics as a first-class system resource
HOTOS'07 Proceedings of the 11th USENIX workshop on Hot topics in operating systems
Secure slices of insecure programs
Proceedings of the 2008 ACM symposium on Information, computer and communications security
A security domain model to assess software for exploitable covert channels
Proceedings of the third ACM SIGPLAN workshop on Programming languages and analysis for security
Extensible Web Browser Security
DIMVA '07 Proceedings of the 4th international conference on Detection of Intrusions and Malware, and Vulnerability Assessment
Model-Based Covert Timing Channels: Automated Modeling and Evasion
RAID '08 Proceedings of the 11th international symposium on Recent Advances in Intrusion Detection
Non-delegatable authorities in capability systems
Journal of Computer Security
Algorithms and tool support for dynamic information flow analysis
Information and Software Technology
JSYS traps: a TENEX mechanism for encapsulation of user processes
AFIPS '75 Proceedings of the May 19-22, 1975, national computer conference and exposition
AFIPS '75 Proceedings of the May 19-22, 1975, national computer conference and exposition
The advent of trusted computer operating systems
AFIPS '80 Proceedings of the May 19-22, 1980, national computer conference
Privacy-preserving browser-side scripting with BFlow
Proceedings of the 4th ACM European conference on Computer systems
Putting Trojans on the Horns of a Dilemma: Redundancy for Information Theft Detection
Transactions on Computational Science IV
Information-Theoretic Modeling and Analysis of Interrupt-Related Covert Channels
Formal Aspects in Security and Trust
Laminar: practical fine-grained decentralized information flow control
Proceedings of the 2009 ACM SIGPLAN conference on Programming language design and implementation
Measuring the strength of information flows in programs
ACM Transactions on Software Engineering and Methodology (TOSEM)
On Adversarial Games in Dynamic Spectrum Access Networking based Covert Timing Channels?
ACM SIGMOBILE Mobile Computing and Communications Review
Covert channels in ad-hoc wireless networks
Ad Hoc Networks
MYSEA: the monterey security architecture
Proceedings of the 2009 ACM workshop on Scalable trusted computing
On declassification and the non-disclosure policy
Journal of Computer Security - 18th IEEE Computer Security Foundations Symposium (CSF 18)
Achieving information flow security through monadic control of effects
Journal of Computer Security - 18th IEEE Computer Security Foundations Symposium (CSF 18)
Execution leases: a hardware-supported mechanism for enforcing strong non-interference
Proceedings of the 42nd Annual IEEE/ACM International Symposium on Microarchitecture
Didactic Games for Teaching Information Theory
ISSEP '10 Proceedings of the 4th International Conference on Informatics in Secondary Schools - Evolution and Perspectives: Teaching Fundamentals Concepts of Informatics
Scenarios and Covert Channels: Another Game...
Electronic Notes in Theoretical Computer Science (ENTCS)
Timing Aware Information Flow Security for a JavaCard-like Bytecode
Electronic Notes in Theoretical Computer Science (ENTCS)
Preventing Timing Leaks Through Transactional Branching Instructions
Electronic Notes in Theoretical Computer Science (ENTCS)
GIIS'09 Proceedings of the Second international conference on Global Information Infrastructure Symposium
Anonymity services for multi-agent systems
Web Intelligence and Agent Systems
Advances on access-driven cache attacks on AES
SAC'06 Proceedings of the 13th international conference on Selected areas in cryptography
Noisy timing channels with binary inputs and outputs
IH'06 Proceedings of the 8th international conference on Information hiding
Load-based covert channels between Xen virtual machines
Proceedings of the 2010 ACM Symposium on Applied Computing
Hiding information in multi level security systems
FAST'06 Proceedings of the 4th international conference on Formal aspects in security and trust
A performance analysis of authentication using covert timing channels
NETWORKING'08 Proceedings of the 7th international IFIP-TC6 networking conference on AdHoc and sensor networks, wireless networks, next generation internet
Transactions on data hiding and multimedia security III
Embedding a covert channel in active network connections
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
Authentication in 802.11 LANs using a covert side channel
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
An attack-defense game theoretic analysis of multi-band wireless covert timing networks
INFOCOM'10 Proceedings of the 29th conference on Information communications
Airavat: security and privacy for MapReduce
NSDI'10 Proceedings of the 7th USENIX conference on Networked systems design and implementation
Predictive black-box mitigation of timing channels
Proceedings of the 17th ACM conference on Computer and communications security
Security policies in distributed CSCW and workflow systems
IEEE Transactions on Systems, Man, and Cybernetics, Part A: Systems and Humans
Unifying theories of confidentiality
UTP'10 Proceedings of the Third international conference on Unifying theories of programming
The challenge of data and application security and privacy (DASPY): are we up to it
Proceedings of the first ACM conference on Data and application security and privacy
Proceedings of the first ACM conference on Data and application security and privacy
Cryptovirology: extortion-based security threats and countermeasures
SP'96 Proceedings of the 1996 IEEE conference on Security and privacy
SP'96 Proceedings of the 1996 IEEE conference on Security and privacy
Security framework for integrated networks
MILCOM'03 Proceedings of the 2003 IEEE conference on Military communications - Volume II
Designing and Implementing the OP and OP2 Web Browsers
ACM Transactions on the Web (TWEB)
Application-level reconnaissance: timing channel attacks against antivirus software
LEET'11 Proceedings of the 4th USENIX conference on Large-scale exploits and emergent threats
Strong non-leak guarantees for workflow models
Proceedings of the 2011 ACM Symposium on Applied Computing
An algorithm for capturing variables dependences in test suites
Journal of Systems and Software
Integrating business process modelling and ERP role engineering
International Journal of Business Information Systems
Evaluating the transmission rate of covert timing channels in a network
Computer Networks: The International Journal of Computer and Telecommunications Networking
Differential privacy under fire
SEC'11 Proceedings of the 20th USENIX conference on Security
Automated information flow analysis of virtualized infrastructures
ESORICS'11 Proceedings of the 16th European conference on Research in computer security
Group-Centric Secure Information-Sharing Models for Isolated Groups
ACM Transactions on Information and System Security (TISSEC)
Low-attention forwarding for mobile network covert channels
CMS'11 Proceedings of the 12th IFIP TC 6/TC 11 international conference on Communications and multimedia security
An exploration of L2 cache covert channels in virtualized environments
Proceedings of the 3rd ACM workshop on Cloud computing security workshop
Predictive mitigation of timing channels in interactive systems
Proceedings of the 18th ACM conference on Computer and communications security
InDico: information flow analysis of business processes for confidentiality requirements
STM'10 Proceedings of the 6th international conference on Security and trust management
A new method for authentication based on covert channel
NPC'11 Proceedings of the 8th IFIP international conference on Network and parallel computing
Proceedings of the 4th international conference on Security of information and networks
A non-malleable group key exchange protocol robust against active insiders
ISC'06 Proceedings of the 9th international conference on Information Security
ISPA'05 Proceedings of the Third international conference on Parallel and Distributed Processing and Applications
Covert channel identification founded on information flow analysis
CIS'05 Proceedings of the 2005 international conference on Computational Intelligence and Security - Volume Part II
Specification and verification of side channel declassification
FAST'09 Proceedings of the 6th international conference on Formal Aspects in Security and Trust
Finding covert channels in protocols with message sequence charts: the case of RMTP2
SAM'04 Proceedings of the 4th international SDL and MSC conference on System Analysis and Modeling
Information leakage and capability forgery in a capability-based operating system kernel
OTM'06 Proceedings of the 2006 international conference on On the Move to Meaningful Internet Systems: AWeSOMe, CAMS, COMINF, IS, KSinBIT, MIOS-CIAO, MONET - Volume Part I
Bridging language-based and process calculi security
FOSSACS'05 Proceedings of the 8th international conference on Foundations of Software Science and Computation Structures
Quantifying probabilistic information flow in computational reactive systems
ESORICS'05 Proceedings of the 10th European conference on Research in Computer Security
New constructive approach to covert channel modeling and channel capacity estimation
ISC'05 Proceedings of the 8th international conference on Information Security
Covert channel analysis of the password-capability system
ACSAC'05 Proceedings of the 10th Asia-Pacific conference on Advances in Computer Systems Architecture
OTM'05 Proceedings of the 2005 OTM Confederated international conference on On the Move to Meaningful Internet Systems: CoopIS, COA, and ODBASE - Volume Part II
Traceroute based IP channel for sending hidden short messages
IWSEC'06 Proceedings of the 1st international conference on Security
Fairness strategy for multilevel secure concurrency control protocol
ICISS'06 Proceedings of the Second international conference on Information Systems Security
A feather-weight application isolation model
INTRUST'09 Proceedings of the First international conference on Trusted Systems
ICISC'05 Proceedings of the 8th international conference on Information Security and Cryptology
An 802.11 MAC layer covert channel
Wireless Communications & Mobile Computing
Leaving timing-channel fingerprints in hidden service log files
Digital Investigation: The International Journal of Digital Forensics & Incident Response
NordSec'11 Proceedings of the 16th Nordic conference on Information Security Technology for Applications
Whispers in the hyper-space: high-speed covert channel attacks in the cloud
Security'12 Proceedings of the 21st USENIX conference on Security symposium
Addressing covert termination and timing channels in concurrent information flow systems
Proceedings of the 17th ACM SIGPLAN international conference on Functional programming
Lockdown: towards a safe and practical architecture for security applications on commodity platforms
TRUST'12 Proceedings of the 5th international conference on Trust and Trustworthy Computing
Students who don't understand information flow should be eaten: an experience paper
CSET'12 Proceedings of the 5th USENIX conference on Cyber Security Experimentation and Test
Babel: a secure computer is a polyglot
Proceedings of the 2012 ACM Workshop on Cloud computing security workshop
On significance of the least significant bits for differential privacy
Proceedings of the 2012 ACM conference on Computer and communications security
An approach for network information flow analysis for systems of embedded components
MMM-ACNS'12 Proceedings of the 6th international conference on Mathematical Methods, Models and Architectures for Computer Network Security: computer network security
Systematic engineering of control protocols for covert channels
CMS'12 Proceedings of the 13th IFIP TC 6/TC 11 international conference on Communications and Multimedia Security
Universally composable security with local adversaries
SCN'12 Proceedings of the 8th international conference on Security and Cryptography for Networks
Analysis of the communication between colluding applications on modern smartphones
Proceedings of the 28th Annual Computer Security Applications Conference
The confinement problem in the presence of faults
ICFEM'12 Proceedings of the 14th international conference on Formal Engineering Methods: formal methods and software engineering
πBox: a platform for privacy-preserving apps
nsdi'13 Proceedings of the 10th USENIX conference on Networked Systems Design and Implementation
An information-flow type-system for mixed protocol secure computation
Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security
VoIP steganography and its Detection—A survey
ACM Computing Surveys (CSUR)
A Privacy Preserving Method Using Privacy Enhancing Techniques for Location Based Services
Mobile Networks and Applications
Communications of the ACM
Quantifying and Classifying Covert Communications on Android
Mobile Networks and Applications
PHY covert channels: can you see the idles?
NSDI'14 Proceedings of the 11th USENIX Conference on Networked Systems Design and Implementation
Hi-index | 48.39 |
onfining a program during its execution so that it cannot transmit information to any other program except its caller. A set of examples attempts to stake out the boundaries of the problem. Necessary conditions for a solution are stated and informally justified.