Belief in Information Flow
- 6 July 2005
- proceedings article
- Published by Institute of Electrical and Electronics Engineers (IEEE)
Abstract
This paper advocates a novel approach to the construction of secure software: controlling information flow and maintaining integrity via monadic encapsulation of effects. This approach is constructive, relying on properties of monads and monad transformers ...Keywords
This publication has 18 references indexed in Scilit:
- Measuring the confinement of probabilistic systemsTheoretical Computer Science, 2005
- Quantified Interference for a While LanguageElectronic Notes in Theoretical Computer Science, 2005
- Secrecy in multiagent systemsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2003
- Quantifying information flowPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2003
- Limiting privacy breaches in privacy preserving data miningPublished by Association for Computing Machinery (ACM) ,2003
- A probabilistic approach to information hidingPublished by Springer Nature ,2003
- Toward a mathematical foundation for information flow securityPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- The Turing Test and non-information flowPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- Verifying secrets and relative secrecyPublished by Association for Computing Machinery (ACM) ,2000
- Semantics of probabilistic programsJournal of Computer and System Sciences, 1981