Termination-Insensitive Noninterference Leaks More Than Just a Bit
- 1 January 2008
- book chapter
- Published by Springer Nature
Abstract
No abstract availableKeywords
This publication has 16 references indexed in Scilit:
- Adversaries and Information Leaks (Tutorial)Published by Springer Nature ,2008
- Termination-Insensitive Noninterference Leaks More Than Just a BitPublished by Springer Nature ,2008
- Fast probabilistic simulation, nontermination, and secure information flowPublished by Association for Computing Machinery (ACM) ,2007
- Automata-Based Confidentiality MonitoringPublished by Springer Nature ,2007
- Cryptographically-Masked FlowsPublished by Springer Nature ,2006
- Enforcing security and safety models with an information flow analysis toolACM SIGAda Ada Letters, 2004
- A semantic approach to secure information flowScience of Computer Programming, 2000
- A Per Model of Secure Information Flow in Sequential ProgramsPublished by Springer Nature ,1999
- Certification of programs for secure information flowCommunications of the ACM, 1977
- Memoryless subsystemsThe Computer Journal, 1974