A semantic approach to secure information flow
- 31 May 2000
- journal article
- Published by Elsevier in Science of Computer Programming
- Vol. 37 (1-3) , 113-138
- https://doi.org/10.1016/s0167-6423(99)00024-6
Abstract
No abstract availableKeywords
This publication has 14 references indexed in Scilit:
- A Per Model of Secure Information Flow in Sequential ProgramsPublished by Springer Nature ,1999
- A semantic approach to secure information flowPublished by Springer Nature ,1998
- Safe kernel extensions without run-time checkingPublished by Association for Computing Machinery (ACM) ,1996
- Compile-time detection of information flow in sequential programsPublished by Springer Nature ,1994
- Building a secure computer system : Morris Gasser 0-442-23022-2 Van Nostrand Reinhold at International Thomson Publishing Services Ltd, North Way, Andover, Hants SP10 5BE. £26–95Computer Fraud & Security Bulletin, 1989
- Predicative programming Part ICommunications of the ACM, 1984
- An Axiomatic Approach to Information Flow in ProgramsACM Transactions on Programming Languages and Systems, 1980
- Certification of programs for secure information flowCommunications of the ACM, 1977
- A lattice model of secure information flowCommunications of the ACM, 1976
- A note on the confinement problemCommunications of the ACM, 1973