Automata-Based Confidentiality Monitoring
- 1 January 2007
- book chapter
- Published by Springer Nature
Abstract
No abstract availableKeywords
This publication has 23 references indexed in Scilit:
- Computability classes for enforcement mechanismsACM Transactions on Programming Languages and Systems, 2006
- Natural semanticsPublished by Springer Nature ,2005
- Edit automata: enforcement mechanisms for run-time security policiesInternational Journal of Information Security, 2005
- Enforcing Non-safety Security Policies with Program MonitorsPublished by Springer Nature ,2005
- Stack-based access control and secure information flowJournal of Functional Programming, 2005
- Language-based information-flow securityIEEE Journal on Selected Areas in Communications, 2003
- Information flow inference for MLACM Transactions on Programming Languages and Systems, 2003
- Enforceable security policiesACM Transactions on Information and System Security, 2000
- A security flow control algorithm and its denotational semantics correctness proofFormal Aspects of Computing, 1992
- Information transmission in computational systemsACM SIGOPS Operating Systems Review, 1977