Semantics and Program Analysis of Computationally Secure Information Flow
- 23 March 2001
- book chapter
- Published by Springer Nature
Abstract
No abstract availableKeywords
This publication has 13 references indexed in Scilit:
- Reconciling Two Views of CryptographyPublished by Springer Nature ,2000
- JFlowPublished by Association for Computing Machinery (ACM) ,1999
- A core calculus of dependencyPublished by Association for Computing Machinery (ACM) ,1999
- A Per Model of Secure Information Flow in Sequential ProgramsPublished by Springer Nature ,1999
- The SLam calculusPublished by Association for Computing Machinery (ACM) ,1998
- On the foundations of modern cryptographyPublished by Springer Nature ,1997
- A sound type system for secure flow analysisJournal of Computer Security, 1996
- Certifying information flow properties of programsPublished by Association for Computing Machinery (ACM) ,1979
- Certification of programs for secure information flowCommunications of the ACM, 1977
- A lattice model of secure information flowCommunications of the ACM, 1976