Certification of programs for secure information flow
- 1 July 1977
- journal article
- Published by Association for Computing Machinery (ACM) in Communications of the ACM
- Vol. 20 (7) , 504-513
- https://doi.org/10.1145/359636.359712
Abstract
No abstract availableKeywords
This publication has 12 references indexed in Scilit:
- A lattice model of secure information flowCommunications of the ACM, 1976
- Security Kernel validation in practiceCommunications of the ACM, 1976
- Exception handlingCommunications of the ACM, 1975
- The enforcement of security policies for computationPublished by Association for Computing Machinery (ACM) ,1975
- A comment on the confinement problemPublished by Association for Computing Machinery (ACM) ,1975
- Structured specification of a Security KernelPublished by Association for Computing Machinery (ACM) ,1975
- Memoryless subsystemsThe Computer Journal, 1974
- A note on the confinement problemCommunications of the ACM, 1973
- Performance predictions for extended paged memoriesActa Informatica, 1971
- Object code optimizationCommunications of the ACM, 1969