Secure Information Flow as Typed Process Behaviour
- 12 May 2000
- book chapter
- Published by Springer Nature
- p. 180-199
- https://doi.org/10.1007/3-540-46425-5_12
Abstract
No abstract availableKeywords
This publication has 28 references indexed in Scilit:
- Types and Subtypes for Client-Server InteractionsPublished by Springer Nature ,1999
- Control flow analysis for the π-calculusPublished by Springer Nature ,1998
- The Compositional Security Checker: a tool for the verification of information flow security propertiesIEEE Transactions on Software Engineering, 1997
- Secrecy by typing in security protocolsPublished by Springer Nature ,1997
- On reduction-based process semanticsTheoretical Computer Science, 1995
- Types for dyadic interactionPublished by Springer Nature ,1993
- Probabilistic interferencePublished by Institute of Electrical and Electronics Engineers (IEEE) ,1990
- Linear logicTheoretical Computer Science, 1987
- Security Policies and Security ModelsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1982
- Certification of programs for secure information flowCommunications of the ACM, 1977