An Axiomatic Approach to Information Flow in Programs
From MaRDI portal
Publication:3922155
DOI10.1145/357084.357088zbMath0468.68034OpenAlexW1993302007MaRDI QIDQ3922155
Gregory R. Andrews, Richard P. Reitman
Publication date: 1980
Published in: ACM Transactions on Programming Languages and Systems (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1145/357084.357088
parallel programsinformation securityproof rulesaxiomatic logiccorrectness rulessecurity certification
Specification and verification (program logics, model checking, etc.) (68Q60) Abstract data types; algebraic specification (68Q65) Theory of operating systems (68N25)
Related Items (14)
Product programs and relational program logics ⋮ Securing interaction between threads and the scheduler in the presence of synchronization ⋮ Instruction-level security analysis for information flow in stack-based assembly languages ⋮ Hoare Logic for Disjunctive Information Flow ⋮ Type systems equivalent to data-flow analyses for imperative languages ⋮ Information Flow Control-by-Construction for an Object-Oriented Language ⋮ A calculus of trustworthy ad hoc networks ⋮ Integration of a security type system into a program logic ⋮ From Exponential to Polynomial-Time Security Typing via Principal Types ⋮ Content dependent information flow control ⋮ A security flow control algorithm and its denotational semantics correctness proof ⋮ Using Dynamic Pushdown Networks to Automate a Modular Information-Flow Analysis ⋮ Secure information flow by self-composition ⋮ Abstract interpretation of operational semantics for secure information flow.
This page was built for publication: An Axiomatic Approach to Information Flow in Programs