Next: About this document ...
Up: Program Analysis and the
Previous: Dissemination and Exploitation
- 1
- Abramsky, S., Jagadeesan, R. and Malacaria, P., Full
Abstraction for PCF.
Info. & Comp. 163 (2000), 409-470.
- 2
- Abadi, M. and Gordon, A. A calculus of
cryptographic protocols, Information and computation, 1999.
- 3
- Abadi,M. and Fournet,C. Mobile Values, New
Names, and Secure Communication.
POPL'01, ACM Press, 2001.
- 4
- Abadi,M. and Fournet,C.
Hiding Names: private authentication in the applied pi-calculus, ISSS02, LNCS 2609, 317-338.
- 5
- Abadi, M. and Blanchet, B. Analyzing Security
Protocols with Secrecy Types and Logic Programs.
POPL'2002, 33-44, ACM, 2002.
- 6
- Abadi, M., Banerjee, A., Heintze, N. and Riecke, J., A
core calculus of dependency,
POPL'99, ACM, 1999.
- 7
-
Abramsky, S., Honda, K. and McCusker, G.,
A Fully Abstract Game Semantics for General References.
LICS'98 IEEE, 1998.
- 8
-
Amtoft, T., Nielson, F., and Nielson, H., Type and Effect
Systems: Behaviours for Concurrency, IC Press, 1999.
- 9
- Ball et al. Automatic predicate abstraction of C
programs. PLDI'01, ACM, 2001.
- 10
- Bhargavan, K., Fornet, C. and Gordon, A.,
A Semantics for Web Services Authentication,
to appear in POPL'04. ACM.
- 11
- Berger, M., Honda, K. and Yoshida, N.,
Genericity and
the
-Calculus,
Proc. of 6th International Conference,
Foundations of Software Science and Computer Structures (FoSSaCs 2003),
LNCS 2620,
Springer, 2003.
- 12
- Berger, M., Honda, K. and Yoshida, N., Sequentiality and
the
-Calculus, TLCA01,
LNCS 2044,
Springer, 2001.
- 13
-
Berger, M. and Honda, K., The Two-Phase Commitment Protocol
in an Extended pi-Calculus, Proc. EXPRESS'00,
Electronic Notes in Theoretical Computer Science,
Elsevier Science, August,
2000.
- 14
- Boudol, G., Asynchrony and the pi-calculus,
INRIA Research Report 1702, 1992.
- 15
-
Bodei, C. et al,
Control
Flow Analysis for the pi-calculus.
Proceedings of CONCUR'98, LNCS 1466:84-98, Springer.
- 16
-
Bodei, C., et al.,
Techniques for Security Checking: Non-Interference vs Control Flow
Analysis. Proceedings of the Final Workshop Tosca 2001. ENTCS 62, 2001.
- 17
- Clark D., Hankin C. and Hunt S., Information Flow
Analsyis for Algol-like Languages, Computer Languages,
Elsevier Science, to appear 2002.
- 18
- Clark D., Hunt S., and Malacaria P.
Quantitative analysis of leakage of confidential data.
In QAPL 2001, volume 59 of ENTCS, 2002.
- 19
- Clarke, E. et al. Model Checking, MIT Press.
- 20
-
Denning, D. and Denning, P.,
Certification of programs for secure information flow.
Communication of ACM, ACM, 20:504-513, 1997.
- 21
-
Di Pierro A. and Wiklicky H.,
Probabilistic Concurrent Constraint Programming:
Towards a Fully Abstract Model,
MFCS98, LNCS 1450,
Springer-Verlag, 1998.
- 22
-
Di Pierro A. and Wiklicky H.,
Measuring the Precision of Abstract Interpretations,
LOPSTR00, LNCS 2042,
Springer, 1998.
- 23
-
Di Pierro A. and Wiklicky H.,
Concurrent Constraint Programming: Towards
Probabilistic Abstract Interpretation,
Proc PPDP00,
ACM SIGPLAN, 2000.
- 24
-
Di Pierro A., Hankin C. and Wiklicky H.,
Analysing Approximative Confinement under Uniform Attacks.
In Proceedings of SAS'02
LNCS 2477, 2002. Springer Verlag.
- 25
-
Di Pierro A., Hankin C. and Wiklicky H.,
Approximate non-interference.
In I. Cervesato, editor, CSFW'02
IEEE, 2002.
- 26
-
Di Pierro A., Hankin C. and Wiklicky H.,
Approximate non-interference.
In Journal of Computer Security, 2003.
- 27
-
Di Pierro A., Hankin C. and Wiklicky H.,
Measuring the Confinement of Concurrent Probabilistic Systems.
In Proceedings of WITS'03 Workshop on Issues in the Theory of
Security, 2003.
- 28
-
Di Pierro A., Hankin C. and Wiklicky H.,
Quantitative Relations and Approximate Process Equivalences.
In Proceedings of CONCUR'03, LNCS 2761, 2003.
Springer Verlag.
- 29
-
Fiore, M. and Honda, K.,
Recursive types in games: Axiomatics and process representation.
LICS'98, 13th Annual IEEE Symposium on
Logic in Computer Science, 345-356, IEEE, 1998.
- 30
- Flanagan, C. et al. Extended Static Checking
for Java,
PLDI'02.
- 31
- Flanagan, C., Freund, S. and Qadeer, S.,
Thread-Modular Verification for Shared-Memory Programs,
ESOP'02, LNCS 2305, 262-277, Springer, 2002.
- 32
- Girard, J.-Y., Linear Logic, TCS, Vol. 50,
1-102, 1987.
- 33
- Gordon, A. and Jeffrey, A., Authenticity by
typing for security protocols, IEEE CSFW 2001,
2001.
- 34
- Harper, Morrisett and Shneider. Language-Based Security.
LNCS 2000, Springer Verlag.
- 35
- Hennessy, M., Rathke, J. and Yoshida, N.,
SafeDpi: a language for controlling mobile code. 65 pages.
To appear as a technical report at Sussex University. Oct, 2003.
- 36
- Hennessy, M. and Riely, J., Information flow vs resource
access in the asynchronous pi-calculus,
ICALP00, LNCS 1853, 415-427, 2000.
- 37
-
Herescu, M and Palamidessi, C.,
Probabilistic asynchronous
-calculus.
FOSSACS'00, LNCS 1784, 146-160. Springer-Verlag, 2000.
- 38
- Honda, K.
Composing Processes. POPL'96, January 1996.
- 39
-
Honda, K. Elementary Structures for Process Theory (1): Sets with Renaming.
MSCS, 2001.
- 40
- Honda, K. and Tokoro, M., An Object
Calculus for Asynchronous Communication.
ECOOP'91, LNCS 512,
Springer 1991.
- 41
- Honda, K., Vasconcelos, V. and Yoshida, N, Secure
Information Flow as Typed Process Behaviour, ESOP'00, LNCS
1782, 2000.
- 42
-
Honda, K. and Yoshida, N.,
On Reduction-based Process Semantics.
TCS,
No. 151, North-Holland, 1995.
- 43
- Honda, K. and Yoshida, N., Combinatory Representation
of Mobile Processes, POPL'94, ACM, 1994.
- 44
-
Honda, K. and Yoshida, N.,
Game-Theoretic Analysis of Call-by-Value Computation,
TCS,
Vol. 221 (1999),
North-Holland, 1999.
- 45
- Honda, K. and Yoshida, N., A uniform type structure for
secure information flow. POPL'02, ACM Press, 2002.
The full version is available
as Dcs Technical Report at www.dcs.qmul.ac.uk/
kohei.
- 46
- Honda, K. and Yoshida, N., Noninterference through
Flow-Analysis, 45pp, submitted for a journal publication, 2003.
Available
as Dcs Technical Report at www.dcs.qmul.ac.uk/
kohei.
- 47
- Hyland, M. and Ong, L., "On Full Abstraction for PCF": I,
II and III.
Info. & Comp. 163 (2000), 285-408.
- 48
- Jensen, T. et al. Security and Dynamic Class
Loading in Java: A Formalisation.
Proc. International Conference on Computer Languages, IEEE, 1999
- 49
-
Kocher P.C.
Cryptanalysis of Diffie-Hellman, RSA, DSS, and other
cryptosystems using timing attacks.
In CRYPTO '95, LNCS 963,
- 50
-
Myers, A. and Liskov, B.,
A decentralized model for information flow control.
SOSP'97, 129-142, ACM, 1997.
- 51
- Malacaria P. and Hankin C., Non-deterministic Games
and Program Analysis: An application to security,
LICS'99, IEEE Press, 1999.
- 52
-
Myers, A. JFlow: Practical Mostly-Static Information Flow Control.
POPL'99, ACM Press. 1999.
- 53
-
Milner, R., Functions as Processes,
MSCS. 2(2):119-141, 1992,
- 54
-
Milner, R., Parrow, J.G. and Walker, D.,
A Calculus of Mobile Processes.
Information and Computation, 100(1):1-77,
1992.
- 55
-
Myers A. and Sabelfeld A.,
Language-based information flow security,
IEEE Journal on Selected Areas in Communications.
- 56
-
Nielson, F., Nielson H.R., and Hankin C.,
Principles of Program Analysis, Springer-Verlag, 1999.
- 57
-
Palsberg, J.,
Type-based analysis and applications,
2001, available at: http://www.cs.purdue.edu/homes/palsberg.
- 58
-
Pottier, F. and Simonet, V.
Information Flow Inference for ML.
POPL'02, ACM, 2002.
- 59
-
Riely, J. and Hennessy, M.,
Trust and partial typing in open systems of mobile agents.
POPL'99, ACM Press, 1999.
- 60
-
Riecke, J.
Fully Abstract Translations between Functional Languages.
MSCS, CUP, 1993.
- 61
- Skoglund and Wrigstad. A mode system for
read-only references in Java. A typescript, 10pp, 2001.
- 62
-
Smith, G.,
A New Type System for Secure Information Flow,
CSFW'01, IEEE, 2001.
- 63
-
Smith, G. and Volpano, D.,
Secure information flow in a multi-threaded imperative
language,
POPL'98, ACM, 1998.
- 64
-
SecSafe, A European FET Open project,
http://www.doc.ic.ac.uk/
siveroni/secsafe.
- 65
-
Volpano, D., Smith, G. and Irvine, C.,
A Sound type system for secure flow analysis.
J. Computer Security, 4(2,3):167-187, 1996.
- 66
- VerifiCard, a European Project for Smart Card
Verification, http://www.verificard.org.
- 67
- Volpano, D. and Smith, G., Verifying Secrets
and Relative Secrecy,
POPL'00, 268-276, 2000, ACM Press.
- 68
- Yoshida, N.,
Channel Dependency Types for Higher-Order
-Calculus,
To appear in POPL04, ACM Press, 2004.
- 69
- Yoshida, N., Optimal Reduction in Weak
lambda-calculus with Shared Environments: FPCA'93,
Functional Programming and Computer Architecture,
ACM SIGACT-SIGPLAN, June, 1993.
- 70
-
Yoshida, N.,
Graph Types for Monadic Mobile Processes.
Proc. of 16th FST/TCS, LNCS 1180, 1996.
- 71
-
Yoshida, N.,
Minimality and Separation Results on Asynchronous Mobile Processes:
Representability Theorems by Concurrent Combinators,
TCS, 2002, North Holland.
- 72
- Yoshida, N., Berger, M. and Honda, K., Strong
Normalisation in the
-Calculus, Proc. LICS '01.
IEEE, June, 2001. The full version in
Info. & Comp.
- 73
-
Yoshida, N. and Hennessy, M.,
Subtyping and Locality in Distributed Higher Order Processes.
CONCUR'99, LNCS 1664,
Springer, 1999.
- 74
- Yoshida, N. and Hennessy, M., Assigning Types to
Processes, LICS '00, IEEE, 2000, Full version to appear in
Info. & Comp.
- 75
- Yoshida, N., Honda, K. and Berger, M. Linearity and
Bisimulation, Proc. of 5th International Conference, Foundations of
Software Science and Computer Structures (FoSSaCs 2002),
LNCS 2303,
Springer, 2002.
- 76
-
Zdancewic, S. and Myers, A.,
Secure Information Flow and CPS,
ESOP01, LNCS 2028, 46-62, Springer, 2001.
Igor Siveroni
2004-08-16