Up: A Model for Decentralized
Previous: Acknowledgments
- AR80
-
Gregory R. Andrews and Richard P. Reitman.
An axiomatic approach to information flow in programs.
ACM Transactions on Programming Languages and Systems,
2(1):56-76, 1980.
- Bib77
-
K. J. Biba.
Integrity considerations for secure computer systems.
Technical Report ESD-TR-76-372, USAF Electronic Systems Division,
Bedford, MA, April 1977.
- BL75
-
D. E. Bell and L. J. LaPadula.
Secure computer system: Unified exposition and Multics
interpretation.
Technical Report ESD-TR-75-306, MITRE Corp. MTR-2997, Bedford, MA,
1975.
Available as NTIS AD-A023 588.
- BN89
-
D. F. Brewer and J. Nash.
The Chinese wall security policy.
In Proc. of the IEEE Symposium on Security and Privacy, pages
206-258, May 1989.
- CW87
-
David Clark and David R. Wilson.
A comparison of commerical and military computer security policies.
In Proc. of the IEEE Symposium on Security and Privacy, pages
184-194, 1987.
- DD77
-
Dorothy E. Denning and Peter J. Denning.
Certification of programs for secure information flow.
Comm. of the ACM, 20(7):504-513, 1977.
- Den76
-
Dorothy E. Denning.
A lattice model of secure information flow.
Comm. of the ACM, 19(5):236-243, 1976.
- DG84
-
William F. Dowling and Jean H. Gallier.
Linear-time algorithms for testing the satisfiability of
propositional Horn formulæ.
Journal of Logic Programming, 1(3):267-284, October 1984.
- Fol91
-
Simon N. Foley.
A taxonomy for information flow policies and models.
In Proc. of the IEEE Symposium on Security and Privacy, pages
98-108, 1991.
- GJS96
-
James Gosling, Bill Joy, and Guy Steele.
The Java Language Specification.
Addison-Wesley, August 1996.
ISBN 0-201-63451-1.
- GM84
-
J. A. Goguen and J. Meseguer.
Unwinding and inference control.
In Proc. of the IEEE Symposium on Security and Privacy, pages
11-20, April 1984.
- JG91
-
Pierre Jouvelot and David K. Gifford.
Algebraic reconstruction of types and effects.
In ACM Symposium on Principles of Programming Languages,
pages 303-310, January 1991.
- JL78
-
Anita K. Jones and Barbara Liskov.
A language extension for expressing constraints on data access.
Comm. of the ACM, 21(5):358-367, May 1978.
- LAB+84
-
Barbara Liskov, Russell Atkinson, Toby Bloom, J. Eliot Moss, J. Craig
Schaffert, Robert Scheifler, and Alan Snyder.
CLU Reference Manual.
Springer-Verlag, 1984.
Also published as Lecture Notes in Computer Science 114, G. Goos and
J. Hartmanis, Eds., Springer-Verlag, 1981.
- LABW91
-
Butler Lampson, Martín Abadi, Michael Burrows, and Edward Wobber.
Authentication in distributed systems: Theory and practice.
In Proc. 13th ACM Symp. on Operating System Principles
(SOSP), pages 165-182, October 1991.
Operating System Review, 253(5).
- Lam73
-
Butler W. Lampson.
A note on the confinement problem.
Comm. of the ACM, 10:613-615, 1973.
- LY96
-
T. Lindholm and F. Yellin.
The Java Virtual Machine.
Addison-Wesley, Englewood Cliffs, NJ, May 1996.
- MMN90
-
Catherine J. McCollum, Judith R. Messing, and LouAnna Notargiacomo.
Beyond the pale of MAC and DAC -- defining new forms of access
control.
In Proc. of the IEEE Symposium on Security and Privacy, pages
190-200, 1990.
- MR92
-
M. D. McIlroy and J. A. Reeds.
Multilevel security in the UNIX tradition.
Software--Practice and Experience, 22(8):673-694, August
1992.
- Nec97
-
George C. Necula.
Proof-carrying code.
In Proc. of ACM Symp. on Principles of Programming Languages,
pages 106-119, January 1997.
- PO95
-
Jens Palsberg and Peter Ørbæk.
Trust in the lambda-calculus.
In Proc. 2nd International Symposium on Static Analysis, number
983 in Lecture Notes in Computer Science, pages 314-329. Springer, September
1995.
- RM96
-
Jakob Rehof and Torben Æ. Mogensen.
Tractable constraints in finite semilattices.
In Proc. 3rd International Symposium on Static Analysis, number
1145 in Lecture Notes in Computer Science, pages 285-300. Springer-Verlag,
September 1996.
- RSC92
-
Joel Richardson, Peter Schwarz, and Luis-Felipe Cabrera.
CACL: Efficient fine-grained protection for objects.
In Proceedings of the 1992 ACM Conference on Object-Oriented
Programming Systems, Languages, and Applications, pages 154-165, Vancouver,
BC, Canada, October 1992.
- Vol97
-
Dennis Volpano.
Provably-secure programming languages for remote evaluation.
ACM SIGPLAN Notices, 32(1):117-119, January 1997.
- VSI96
-
Dennis Volpano, Geoffrey Smith, and Cynthia Irvine.
A sound type system for secure flow analysis.
Journal of Computer Security, 4(3):167-187, 1996.
Andrew C. Myers, Barbara Liskov
Copyright ©1997 by the Association for Computing Machinery