A decentralized model for information flow control
- 1 October 1997
- journal article
- Published by Association for Computing Machinery (ACM) in ACM SIGOPS Operating Systems Review
- Vol. 31 (5) , 129-142
- https://doi.org/10.1145/269005.266669
Abstract
No abstract availableThis publication has 16 references indexed in Scilit:
- Provably-secure programming languages for remote evaluationACM SIGPLAN Notices, 1997
- Multilevel security in the UNIX traditionSoftware: Practice and Experience, 1992
- Authentication in distributed systemsACM SIGOPS Operating Systems Review, 1991
- Algebraic reconstruction of types and effectsPublished by Association for Computing Machinery (ACM) ,1991
- Linear-time algorithms for testing the satisfiability of propositional horn formulaeThe Journal of Logic Programming, 1984
- An Axiomatic Approach to Information Flow in ProgramsACM Transactions on Programming Languages and Systems, 1980
- A language extension for expressing constraints on data accessCommunications of the ACM, 1978
- Certification of programs for secure information flowCommunications of the ACM, 1977
- A lattice model of secure information flowCommunications of the ACM, 1976
- A note on the confinement problemCommunications of the ACM, 1973