Refactoring programs to secure information flows
- 10 June 2006
- conference paper
- Published by Association for Computing Machinery (ACM)
Abstract
No abstract availableKeywords
This publication has 15 references indexed in Scilit:
- A logic for information flow analysis with an application to forward slicing of simple imperative programsScience of Computer Programming, 2007
- Efficient path conditions in dependence graphs for software safety analysisACM Transactions on Software Engineering and Methodology, 2006
- A survey of software refactoringIEEE Transactions on Software Engineering, 2004
- Using access control for secure information flow in a Java-like languagePublished by Institute of Electrical and Electronics Engineers (IEEE) ,2004
- Language-based information-flow securityIEEE Journal on Selected Areas in Communications, 2003
- JFlowPublished by Association for Computing Machinery (ACM) ,1999
- A core calculus of dependencyPublished by Association for Computing Machinery (ACM) ,1999
- A decentralized model for information flow controlPublished by Association for Computing Machinery (ACM) ,1997
- Problems with automatic restructurersACM SIGPLAN Notices, 1988
- A lattice model of secure information flowCommunications of the ACM, 1976