export record
dblp key:
journals/tcad/SeftonSASK18 share record
persistent URL:
Seaghan Sefton , Taiman Siddiqui , Nathaniel St. Amour , Gordon Stewart , Avinash Karanth Kodi : GARUDA: Designing Energy-Efficient Hardware Monitors From High-Level Policies for Secure Information Flow. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 37 (11 ) : 2509-2518 (2018 )share record
persistent URL:
Jed Liu , Joe Corbett-Davies , Andrew Ferraiuolo , Alexander Ivanov , Mulong Luo , G. Edward Suh , Andrew C. Myers , Mark E. Campbell : Secure Autonomous Cyber-Physical Systems Through Verifiable Information Flow Control. CPS-SPC@CCS 2018 : 48-59 share record
persistent URL:
Hongxu Chen , Alwen Tiu , Zhiwu Xu , Yang Liu : A Permission-Dependent Type System for Secure Information Flow Analysis. CSF 2018 : 218-232 share record
persistent URL:
Christian Palmiero , Giuseppe Di Guglielmo , Luciano Lavagno , Luca P. Carloni : Design and Implementation of a Dynamic Information Flow Tracking Architecture to Secure a RISC-V Core for IoT Applications. HPEC 2018 : 1-7 share record
persistent URL:
N. V. Narendra Kumar , R. K. Shyamasundar : A Semantic Notion of Secure Information-Flow. ISEA-ISAP 2018 : 35-52 export record
dblp key:
journals/corr/abs-1802-08984 share record
persistent URL:
Kalev Alpernas , Cormac Flanagan , Sadjad Fouladi , Leonid Ryzhyk , Mooly Sagiv , Thomas Schmitz , Keith Winstein : Secure Serverless Computing Using Dynamic Information Flow Control. CoRR abs/1802.08984 (2018 )2017 share record
persistent URL:
Tsau Young Lin , Pierre Vachon : Secure information flow and file movements: A topological theory of discretionary access controls. IEEE BigData 2017 : 1821-1829 share record
persistent URL:
Lucas Waye , Pablo Buiras , Owen Arden , Alejandro Russo , Stephen Chong : Cryptographically Secure Information Flow Control on Key-Value Stores. CCS 2017 : 1893-1907 share record
persistent URL:
Andrew Ferraiuolo , Weizhe Hua , Andrew C. Myers , G. Edward Suh : Secure Information Flow Verification with Mutable Dependent Types. DAC 2017 : 6:1-6:6 export record
dblp key:
conf/date/ArdeshirichamHM17 share record
persistent URL:
Armaiti Ardeshiricham , Wei Hu , Joshua Marxen , Ryan Kastner : Register transfer level information flow tracking for provably secure hardware design. DATE 2017 : 1691-1696 share record
persistent URL:
Patrick Ah-Fat , Michael Huth : Secure Multi-party Computation: Information Flow of Outputs and Game Theory. POST 2017 : 71-92 export record
dblp key:
journals/corr/abs-1708-08895 share record
persistent URL:
Lucas Waye , Pablo Buiras , Owen Arden , Alejandro Russo , Stephen Chong : Cryptographically Secure Information Flow Control on Key-Value Stores. CoRR abs/1708.08895 (2017 )export record
dblp key:
journals/corr/abs-1709-09623 share record
persistent URL:
Hongxu Chen , Alwen Tiu , Zhiwu Xu , Yang Liu : A Permission-Dependent Type System for Secure Information Flow Analysis. CoRR abs/1709.09623 (2017 )2016 export record
dblp key:
journals/fac/CastellaniDP16 share record
persistent URL:
Ilaria Castellani , Mariangiola Dezani-Ciancaglini , Jorge A. Pérez : Self-adaptation and secure information flow in multiparty communications. Formal Aspects Comput. 28 (4 ) : 669-696 (2016 )share record
persistent URL:
Wen Zeng , Maciej Koutny , Paul Watson , Vasileios Germanos : Formal verification of secure information flow in cloud computing. J. Inf. Secur. Appl. 27-28 : 103-116 (2016 )share record
persistent URL:
Anders T. Gjerdrum , Håvard D. Johansen , Dag Johansen : Implementing Informed Consent as Information-Flow Policies for Secure Analytics on eHealth Data: Principles and Practices. CHASE 2016 : 107-112 export record
dblp key:
journals/corr/AgarwalCF16a share record
persistent URL:
Gaurav Kumar Agarwal , Martina Cardone , Christina Fragouli : On (Secure) Information flow for Multiple-Unicast Sessions: Analysis with Butterfly Network. CoRR abs/1606.07561 (2016 )2015 share record
persistent URL:
Daniel Grahl : Deductive Verification of Concurrent Programs and its Application to Secure Information Flow for Java. Karlsruhe Institute of Technology, 2015 share record
persistent URL:
Mounir Assaf : From qualitative to quantitative program analysis : permissive enforcement of secure information flow. (Approches qualitatives et quantitatives d'analyse de programmes : mise en oeuvre permissive de flux d'information sécurisés). University of Rennes 1, France, 2015 share record
persistent URL:
Ning Xi , Cong Sun , Jianfeng Ma , Yulong Shen : Secure service composition with information flow control in service clouds. Future Gener. Comput. Syst. 49 : 142-148 (2015 )export record
dblp key:
journals/scn/MohammadpourfardDGS15 share record
persistent URL:
Mostafa Mohammadpourfard , Mohammad-Ali Doostari , Mohammad Bagher Ghaznavi Ghoushchi , Nafiseh Shakiba : A new secure Internet voting protocol using Java Card 3 technology and Java information flow concept. Secur. Commun. Networks 8 (2 ) : 261-283 (2015 )share record
persistent URL:
Ralph Adaimy , Wassim El-Hajj , Ghassen Ben Brahim , Hazem M. Hajj , Haïdar Safa : A Framework for Secure Information Flow Analysis in Web Applications. AINA 2015 : 434-441 export record
dblp key:
conf/compsac/SolankiHYBY15 share record
persistent URL:
Nidhiben Solanki , Timothy Hoffman , I-Ling Yen , Farokh B. Bastani , Stephen S. Yau : An Access and Information Flow Control Paradigm for Secure Information Sharing in Service-Based Systems. COMPSAC (Stephen S. Yau Academic Symposium) 2015 : 60-67 share record
persistent URL:
Indrakshi Ray , Raman Adaikkalavan , Xing Xie , Rose F. Gamble : Stream Processing with Secure Information Flow Constraints. DBSec 2015 : 311-329 share record
persistent URL:
Bernhard Beckert , Vladimir Klebanov , Mattias Ulbrich : Regression verification for Java using a secure information flow calculus. FTfJP@ECOOP 2015 : 6:1-6:6 share record
persistent URL:
Toby C. Murray : Short Paper: On High-Assurance Information-Flow-Secure Programming Languages. PLAS@ECOOP 2015 : 43-48 share record
persistent URL:
Steffen Helke , Florian Kammüller , Christian W. Probst : Secure Refactoring with Java Information Flow. DPM/QASA@ESORICS 2015 : 264-272 share record
persistent URL:
S. Susheel , N. V. Narendra Kumar , R. K. Shyamasundar : Enforcing Secure Data Sharing in Web Application Development Frameworks Like Django Through Information Flow Control. ICISS 2015 : 551-561 share record
persistent URL:
Gerry Howser : Using Information Flow Methods to Secure Cyber-Physical Systems. Critical Infrastructure Protection 2015 : 185-205 share record
persistent URL:
José Fragoso Santos , Thomas P. Jensen , Tamara Rezk , Alan Schmitt : Hybrid Typing of Secure Information Flow in a JavaScript-Like Language. TGC 2015 : 63-78