Security-Typed Languages for Implementation of Cryptographic Protocols: A Case Study
- 1 January 2005
- book chapter
- Published by Springer Nature
- p. 197-221
- https://doi.org/10.1007/11555827_12
Abstract
No abstract availableKeywords
This publication has 31 references indexed in Scilit:
- Downgrading policies and relaxed noninterferenceACM SIGPLAN Notices, 2005
- A Model for Delimited Information ReleasePublished by Springer Nature ,2004
- Controlled Declassification Based on Intransitive NoninterferencePublished by Springer Nature ,2004
- Language-based information-flow securityIEEE Journal on Selected Areas in Communications, 2003
- Information flow inference for MLACM Transactions on Programming Languages and Systems, 2003
- Untrusted hosts and confidentialityACM SIGOPS Operating Systems Review, 2001
- A decentralized model for information flow controlACM SIGOPS Operating Systems Review, 1997
- A new privacy homomorphism and applicationsInformation Processing Letters, 1996
- Certification of programs for secure information flowCommunications of the ACM, 1977
- A lattice model of secure information flowCommunications of the ACM, 1976