Bibliography

For more papers related to the Jif programming language, see the Jif web site.

CM06
Decentralized Robustness Proceedings of the 19th IEEE Computer Security Foundations Workshop (CSFW), July 2006. Stephen Chong, Andrew C. Myers.
LABW91
Authentication in Distributed Systems: Theory and Practice Proceedings of the 13th ACM Symposium on Operating System Principles (SOSP), October 1991. Butler Lampson, Martín Abadi, Michael Burrows, Edward Wobber.
ML00
Protecting Privacy using the Decentralized Label Model ACM Transactions on Software Engineering and Methodology, 9(4), October 2000. Andrew C. Myers, Barbara Liskov.
MSZ04
Enforcing Robust Declassification Proceedings of the 17th IEEE Computer Security Foundations Workshop (CSFW), June 2004. Andrew C. Myers, Andrei Sabelfeld, Steve Zdancewic.
PC00
Information Flow Inference for Free Proceedings of the 5th ACM SIGPLAN International Conference on Functional Programming (ICFP), 2000. François Pottier, Slyvain Conchon.
San96
Role Hierarchies and Constraints for Lattice-based Access Controls Proceedings of the 4th European Symposium on Research in Computer Security, Septemeber 1996. Ravi S. Sandhu.
TZ05
Run-time Principals in Information-flow Type Systems IEEE Symposium on Security and Privacy, May 2004. Stephen Tse, Steve Zdancewic.
VSI96
A Sound Type System for Secure Flow Analysis Journal of Computer Security, 4(3), 1996. Dennis Volpano, Geoffrey Smith, and Cynthia Irvine.
ZM01
Robust Declassification Proceedings of the 14th IEEE Computer Security Foundations Workshop (CSFW), June 2001. Steve Zdancewic, Andrew C. Myers.