Computer Science ›› 2015, Vol. 42 ›› Issue (12): 243-246.
Previous Articles Next Articles
JIN Li and ZHU Hao
[1] Sabelfeld A,Sands D.Declassification:dimensions and principles[J].Journal of Computer Security,2009,7(5):517-548 [2] Sabelfeld A,Russo A.Securing interaction between threads and the scheduler [C]∥19th IEEE Computer Security Foundations Workshop.2006:177-189 [3] Sabelfeld A.The impact of synchronisation on secure information flow in concurrent programs [M]∥Perspectives of System Informatics,LNCS 2244.2001:225-239 [4] Smith G,Volpano D.Secure information flow in a multi-threaded imperative language [C]∥25th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages.1998:355-364 [5] Mantel H,Reinhard A.Controlling the what and where of declassification in language-based security [M]∥Programming Languages and Systems,LNCS 4421.2007:141-156 [6] Lux A,Mantel H,Perner M.Scheduler-Independent Declassification [M]∥Mathematics of Program Construction,LNCS 7342.2012:25-47 [7] 姜励,陈健,平玲娣,等.多线程程序的信息抹除和降密安全策略[J].浙江大学学报(工学版),2010 (5):854-862 Jiang L,Chen J,Ping L D,et al,Security policy for information erasing and leaking in multithreaded codes[J].Journal of Zhejiang University(Engineering Science),2010(5):854-862 [8] Focardi R,Gorrieri R,Martinelli F.Non Interference for the Analysis of Cryptographic Protocols[M]∥Automata Languages and Programming,LNCS 1853.2000:354-372 [9] Russo A,Sabelfeld A.Securing interaction between threads and the scheduler [C]∥19th IEEE Computer Security Foundations Workshop.2006:177-189 [10] 朱浩,庄毅,薛羽,等.基于内容和地点维度的机密信息降级策略[J].计算机科学,2012,9(8):153-157 Zhu H,Zhuang Y,Xue Y,et al,Declassification Policy Based on Content and Location Dimensions[J].Computer Science,2012,9(8):153-157 [11] Askarov A,Myers A.A semantic framework for declassification and endorsement[M]∥Programming Languages and Systems,LNCS 6012.2010:64-84 [12] 李沁,袁志祥.一种宽容的多线程程序内部时间信息流类型系统[J].计算机科学,2014,1(3):163-168 Li Qin,Yuan Zhi-xiang.Permissive Type System for Internal Timing Information Flow in Multi-thread Programs[J].Computer Science,2014,1(3):163-168 |
No related articles found! |
|