Controlled Declassification Based on Intransitive Noninterference
- 1 January 2004
- book chapter
- Published by Springer Nature
Abstract
No abstract availableKeywords
This publication has 23 references indexed in Scilit:
- Modelling downgrading in information flow securityPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2004
- Quantifying information flowPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2003
- Approximate non-interferencePublished by Institute of Electrical and Electronics Engineers (IEEE) ,2003
- Handling Encryption in an Analysis for Secure Information FlowPublished by Springer Nature ,2003
- Quantitative Analysis of the Leakage of Confidential DataElectronic Notes in Theoretical Computer Science, 2002
- Computational Probabilistic Non-interferencePublished by Springer Nature ,2002
- Information Flow Control and Applications — Bridging a Gap —Published by Springer Nature ,2001
- Transforming out timing leaksPublished by Association for Computing Machinery (ACM) ,2000
- Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other SystemsPublished by Springer Nature ,1996
- A lattice model of secure information flowCommunications of the ACM, 1976