A Per Model of Secure Information Flow in Sequential Programs
- 1 January 1999
- book chapter
- Published by Springer Nature
Abstract
No abstract availableKeywords
This publication has 22 references indexed in Scilit:
- A probabilistic powerdomain of evaluationsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2003
- A core calculus of dependencyPublished by Association for Computing Machinery (ACM) ,1999
- A Classification of Security Properties for Process Algebras1Journal of Computer Security, 1995
- Can you trust your dataPublished by Springer Nature ,1995
- A semantic model of binding times for safe partial evaluationPublished by Springer Nature ,1995
- The specification and modeling of computer securityComputer, 1990
- Security Policies and Security ModelsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1982
- An Axiomatic Approach to Information Flow in ProgramsACM Transactions on Programming Languages and Systems, 1980
- Certification of programs for secure information flowCommunications of the ACM, 1977
- A lattice model of secure information flowCommunications of the ACM, 1976