Secure Information Flow as a Safety Problem
Top Cited Papers
- 1 January 2005
- book chapter
- Published by Springer Nature
- p. 352-367
- https://doi.org/10.1007/11547662_24
Abstract
No abstract availableKeywords
This publication has 12 references indexed in Scilit:
- Robust declassificationPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2005
- Transition predicate abstraction and fair terminationPublished by Association for Computing Machinery (ACM) ,2005
- Downgrading policies and relaxed noninterferencePublished by Association for Computing Machinery (ACM) ,2005
- Abstract non-interference: parameterizing non-interference by abstract interpretationPublished by Association for Computing Machinery (ACM) ,2004
- A Model for Delimited Information ReleasePublished by Springer Nature ,2004
- Language-based information-flow securityIEEE Journal on Selected Areas in Communications, 2003
- A general theory of composition for trace sets closed under selective interleaving functionsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- Relative Completeness of Abstraction Refinement for Software Model CheckingPublished by Springer Nature ,2002
- The S LAM projectPublished by Association for Computing Machinery (ACM) ,2002
- Lazy abstractionPublished by Association for Computing Machinery (ACM) ,2002