Supplemental Material
- Owen Arden, Michael D. George, Jed Liu, K. Vikram, Aslan Askarov, and Andrew C. Myers. Sharing mobile code securely with information flow control. In Proc. IEEE Symposium on Security and Privacy, pages 191-205, May 2012. Google Scholar
Digital Library
- Adam Chlipala. Static checking of dynamically-varying security policies in database-backed applications. In Proc. 9th USENIX Symp. on Operating Systems Design and Implementation (OSDI), October 2010. Google Scholar
Digital Library
- Stephen Chong, Jed Liu, Andrew C. Myers, Xin Qi, K. Vikram, Lantian Zheng, and Xin Zheng. Secure web applications via automatic partitioning. In Proc. 21st ACM Symp. on Operating System Principles (SOSP), October 2007. Google Scholar
Digital Library
- Ezra Cooper, Sam Lindley, Philip Wadler, and Jeremy Yallop. Links: Web programming without tiers. In Proc. 5th International Symposium on Formal Methods for Components and Objects, November 2006. Google Scholar
Digital Library
- Jed Liu, Owen Arden, Michael D. George, K. Vikram, and Andrew C. Myers. Fabric 0.2. Software release, http://www.cs.cornell.edu/projects/fabric, October 2012.Google Scholar
- Jed Liu, Michael D. George, K. Vikram, Xin Qi, Lucas Waye, and Andrew C. Myers. Fabric: A platform for secure distributed computation and storage. In Proc. 22nd ACM Symp. on Operating System Principles (SOSP), pages 321-334, 2009. Google Scholar
Digital Library
- Andrew C. Myers, Lantian Zheng, Steve Zdancewic, Stephen Chong, and Nathaniel Nystrom. Jif 3.0: Java information flow. Software release, http://www.cs.cornell.edu/jif, July 2006.Google Scholar
- M. Serrano, E. Gallesio, and F. Loitsch. HOP, a language for programming the Web 2.0. In Proc. 1st Dynamic Languages Symposium, pages 975-985, October 2006.Google Scholar
Index Terms
How languages can save distributed computing
Recommendations
How languages can save distributed computing
POPL '13: Proceedings of the 40th annual ACM SIGPLAN-SIGACT symposium on Principles of programming languagesInsider Threats to Cloud Computing: Directions for New Research Challenges
COMPSAC '12: Proceedings of the 2012 IEEE 36th Annual Computer Software and Applications ConferenceCloud computing related insider threats are often listed as a serious concern by security researchers, but to date this threat has not been thoroughly explored. We believe the fundamental nature of current insider threats will remain relatively ...
Information Flow Control Model and Method in Distribute MILS
CIS '14: Proceedings of the 2014 Tenth International Conference on Computational Intelligence and SecurityA new generation of avionics system has three major technical characteristics of high resource sharing, data integration and software intensive. However, in the cooperative combat environment, which has the problem of potential sensitive information ...







Comments