Language-based information-flow security

A Sabelfeld, AC Myers - IEEE Journal on selected areas in …, 2003 - ieeexplore.ieee.org
Current standard security practices do not provide substantial assurance that the end-to-end
behavior of a computing system satisfies important security policies such as confidentiality …

5G networks: Types of isolation and their parameters in RAN and CN slices

Z Kotulski, TW Nowak, M Sepczuk, MA Tunia - Computer Networks, 2020 - Elsevier
In this paper, we present a systematic overview of existing isolation techniques in nodes and
networks, especially in the Radio Access Network and the Core Network (RAN and CN) to …

Analyzing memory accesses in x86 executables

G Balakrishnan, T Reps - International conference on compiler …, 2004 - Springer
This paper concerns static-analysis algorithms for analyzing x86 executables. The aim of the
work is to recover intermediate representations that are similar to those that can be created …

[HTML][HTML] Semantic remote attestation: A virtual machine directed approach to trusted computing

V Haldar, D Chandra, M Franz - USENIX Virtual Machine Research and …, 2004 - usenix.org
Remote attestation is one of the core functionalities provided by trusted computing platforms.
It holds the promise of enabling a variety of novel applications. However, current techniques …

A study of security isolation techniques

R Shu, P Wang, SA Gorski III, B Andow… - ACM Computing …, 2016 - dl.acm.org
Security isolation is a foundation of computing systems that enables resilience to different
forms of attacks. This article seeks to understand existing security isolation techniques by …

Abstract non-interference: Parameterizing non-interference by abstract interpretation

R Giacobazzi, I Mastroeni - ACM SIGPLAN Notices, 2004 - dl.acm.org
In this paper we generalize the notion of non-interference making it parametric relatively to
what an attacker can analyze about the input/output information flow. The idea is to consider …

Lightweight self-protecting JavaScript

PH Phung, D Sands, A Chudnov - … of the 4th International Symposium on …, 2009 - dl.acm.org
This paper introduces a method to control JavaScript execution. The aim is to prevent or
modify inappropriate behaviour caused by eg malicious injected scripts or poorly designed …

A calculus for orchestration of web services

A Lapadula, R Pugliese, F Tiezzi - European Symposium on Programming, 2007 - Springer
We introduce COWS (Calculus for Orchestration of Web Services), a new foundational
language for SOC whose design has been influenced by WS-BPEL, the de facto standard …

[图书][B] Programming languages for information security

SA Zdancewic - 2002 - search.proquest.com
Our society's widespread dependence on networked information systems for everything from
personal finance to military communications makes it essential to improve the security of …

SMCQL: secure querying for federated databases

J Bater, G Elliott, C Eggen, S Goel, A Kho… - arXiv preprint arXiv …, 2016 - arxiv.org
People and machines are collecting data at an unprecedented rate. Despite this newfound
abundance of data, progress has been slow in sharing it for open science, business, and …