[图书][B] Programming languages for information security

SA Zdancewic - 2002 - search.proquest.com
Our society's widespread dependence on networked information systems for everything from
personal finance to military communications makes it essential to improve the security of …

Refactoring programs to secure information flows

SF Smith, M Thober - Proceedings of the 2006 workshop on …, 2006 - dl.acm.org
Adding a sound information flow security policy to an existing program is a difficult task that
requires major analysis of andchanges to the program. In this paper we show how …

[图书][B] Foundations of security: what every programmer needs to know

C Kern, A Kesavan, N Daswani - 2007 - Springer
Dr. Gary McGraw, a well-known software security expert, said,“First things first—make sure
you know how to code, and have been doing so for years. It is better to be a developer (and …

Language-based information-flow security

A Sabelfeld, AC Myers - IEEE Journal on selected areas in …, 2003 - ieeexplore.ieee.org
Current standard security practices do not provide substantial assurance that the end-to-end
behavior of a computing system satisfies important security policies such as confidentiality …

Teaching secure programming

M Bishop, DA Frincke - IEEE security & privacy, 2005 - ieeexplore.ieee.org
Teaching secure programming Page 1 Education Editors: Matt Bishop, bishop@cs.ucdavis.edu
Deborah A. Frincke, deborah.frincke@pnl.com Discussions of what should be taught inevitably …

Computability classes for enforcement mechanisms

KW Hamlen, G Morrisett, FB Schneider - ACM Transactions on …, 2006 - dl.acm.org
A precise characterization of those security policies enforceable by program rewriting is
given. This also exposes and rectifies problems in prior work, yielding a better …

[PDF][PDF] Secure programming for Linux and Unix HOWTO

DA Wheeler - 1999 - Citeseer
This book provides a set of design and implementation guidelines for writing secure
programs for Linux and Unix systems. Such programs include application programs used as …

A semantic framework for declassification and endorsement

A Askarov, A Myers - European Symposium on Programming, 2010 - Springer
Abstract Language-based information flow methods offer a principled way to enforce strong
security properties, but enforcing noninterference is too inflexible for realistic applications …

[PDF][PDF] Operating system protection through program evolution.

FB Cohen - Comput. Secur., 1993 - all.net
From the beginning of electronic computing until 15 years ago, the 'game'of attack and
defense was played on a system by system basis, with defenders relying on physical …

Fable: A language for enforcing user-defined security policies

N Swamy, BJ Corcoran, M Hicks - 2008 IEEE Symposium on …, 2008 - ieeexplore.ieee.org
This paper presents FABLE, a core formalism for a programming language in which
programmers may specify security policies and reason that these policies are properly …