共 50 条
- [1] Optimal Constructions for Chain-Based Cryptographic Enforcement of Information Flow Policies DATA AND APPLICATIONS SECURITY AND PRIVACY XXIX, 2015, 9149 : 330 - 345
- [2] Semantics and Enforcement of Expressive Information Flow Policies FORMAL ASPECTS IN SECURITY AND TRUST, 2010, 5983 : 1 - 3
- [3] Designing Secure Cryptographic Accelerators with Information Flow Enforcement: A Case Study on AES PROCEEDINGS OF THE 2019 56TH ACM/EDAC/IEEE DESIGN AUTOMATION CONFERENCE (DAC), 2019,
- [4] Flow policies: Specification and enforcement CONFERENCE PROCEEDINGS OF THE 2004 IEEE INTERNATIONAL PERFORMANCE, COMPUTING, AND COMMUNICATIONS CONFERENCE, 2004, : 681 - 686
- [5] Cryptographic Enforcement of Language-Based Information Erasure 2015 IEEE 28TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM CSF 2015, 2015, : 334 - 348
- [6] Cryptographic Enforcement of Access Control Policies in the Cloud: Implementation and Experimental Assessment SECRYPT 2021: PROCEEDINGS OF THE 18TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2021, : 370 - 381
- [7] Cryptographic Enforcement of Access Control Policies: Models, Applications, and Future Directions PROCEEDINGS OF THE 29TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, SACMAT 2024, 2024, : 3 - 4
- [9] Verified Enforcement of Stateful Information Release Policies PLAS'08: PROCEEDINGS OF THE ACM SIGPLAN THIRD WORKSHOP ON PROGRAMMING LANGUAGES AND ANALYSIS FOR SECURITY, 2008, : 21 - 31