Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Language-based information-flow security
Current standard security practices do not provide substantial assurance that the end-to-end
behavior of a computing system satisfies important security policies such as confidentiality …
behavior of a computing system satisfies important security policies such as confidentiality …
A perspective on information-flow control
Abstract Information-flow control tracks how information propagates through the program
during execution to make sure that the program handles the information securely. Secure …
during execution to make sure that the program handles the information securely. Secure …
Secure program partitioning
This paper presents secure program partitioning, a language-based technique for protecting
confidential data during computation in distributed systems containing mutually untrusted …
confidential data during computation in distributed systems containing mutually untrusted …
[PDF][PDF] Secure Information Flow and Pointer Confinement in a Java-like Language.
We consider a sequential object-oriented language with pointers and mutable state, private
fields and classbased visibility, dynamic binding and inheritance, recursive classes, casts …
fields and classbased visibility, dynamic binding and inheritance, recursive classes, casts …
Stack-based access control and secure information flow
Access control mechanisms are often used with the intent of enforcing confidentiality and
integrity policies, but few rigorous connections have been made between information flow …
integrity policies, but few rigorous connections have been made between information flow …
[LLIBRE][B] Programming languages for information security
SA Zdancewic - 2002 - search.proquest.com
Our society's widespread dependence on networked information systems for everything from
personal finance to military communications makes it essential to improve the security of …
personal finance to military communications makes it essential to improve the security of …
Using replication and partitioning to build secure distributed systems
A challenging unsolved security problem is how to specify and enforce system-wide security
policies; this problem is even more acute in distributed systems with mutual distrust. This …
policies; this problem is even more acute in distributed systems with mutual distrust. This …
On the composition of secure systems
H Mantel - Proceedings 2002 IEEE Symposium on Security and …, 2002 - ieeexplore.ieee.org
When complex systems are constructed from simpler components it is important to know
how properties of the components behave under composition. We present various …
how properties of the components behave under composition. We present various …
A survey on formal specification and verification of separation kernels
Y Zhao, Z Yang, D Ma - Frontiers of Computer Science, 2017 - Springer
Separation kernels are fundamental software of safety and security-critical systems, which
provide their hosted applications with spatial and temporal separation as well as controlled …
provide their hosted applications with spatial and temporal separation as well as controlled …
Untrusted hosts and confidentiality: Secure program partitioning
This paper presents secure program partitioning, a language-based technique for protecting
confidential data during computation in distributed systems containing mutually untrusted …
confidential data during computation in distributed systems containing mutually untrusted …