Abstract is missing.
- Typing illegal information flows as program effectsAna Almeida Matos, José Fragoso Santos. 1 [doi]
- Knowledge-oriented secure multiparty computationPiotr Mardziel, Michael Hicks, Jonathan Katz, Mudhakar Srivatsa. 2 [doi]
- Security-policy monitoring and enforcement with JavaMOPSoha Hussein, Patrick O'Neil Meredith, Grigore Rosu. 3 [doi]
- Security correctness for secure nested transactions: position paperDominic Duggan, Ye Wu. 4 [doi]
- A generic approach for security policies composition: position paperAlejandro Mario Hernandez, Flemming Nielson. 5 [doi]
- Static flow-sensitive & context-sensitive information-flow analysis for software product lines: position paperEric Bodden. 6 [doi]
- Towards a taint mode for cloud computing web applicationsLuciano Bello, Alejandro Russo. 7 [doi]
- Hash-flow taint analysis of higher-order programsShuying Liang, Matthew Might. 8 [doi]
- Development of secured systems by mixing programs, specifications and proofs in an object-oriented programming environment: a case study within the FoCaLiZe environmentDamien Doligez, Mathieu Jaume, Renaud Rioboo. 9 [doi]