A lattice model of secure information flow
From MaRDI portal
Publication:4085248
DOI10.1145/360051.360056zbMATH Open0322.68034OpenAlexW2094873755WikidataQ29308066 ScholiaQ29308066MaRDI QIDQ4085248FDOQ4085248
Authors: Dorothy E. Denning
Publication date: 1976
Published in: Communications of the ACM (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1145/360051.360056
General topics in the theory of software (68N01) Formal languages and automata (68Q45) Symbolic computation and algebraic computation (68W30) Algorithms in computer science (68W99)
Cited In (49)
- Algebraic foundations for quantitative information flow
- Abstract interpretation of operational semantics for secure information flow.
- Information flow for Algol-like languages
- The enforcement of security policies for computation
- Secure guarded commands
- Automated enforcement for relaxed information release with reference points
- Normalising Lustre preserves security
- A logical approach to multilevel security of probabilistic systems
- Agda formalization of a security-preserving translation from flow-sensitive to flow-insensitive security types
- Information flow analysis of scientific workflows
- Data flow analysis from capability lists, with application to RBAC
- Controlling file access with types
- Information theory and security: Quantitative information flow
- Only connect, securely
- Hybrid information flow control for low-level code
- Computational probabilistic non-interference
- Cryptographically-enforced hierarchical access control with multiple keys
- Thread algebra for noninterference
- Integrating security constraints into fixed priority real-time schedulers
- A survey of challenges for runtime verification from advanced application domains (beyond software)
- Secure Multi-party Computation: Information Flow of Outputs and Game Theory
- Non-disclosure for distributed mobile code
- Secure information flow connections
- Flow Policy Awareness for Distributed Mobile Code
- Information Flow Tracking for Side-Effectful Libraries
- A model of systems with modes and mode transitions
- Secrecy and group creation
- Mediating secure information flow policies
- Self-adaptation and secure information flow in multiparty communications
- Security property based administrative controls
- Can you trust your data?
- Hybrid statistical estimation of mutual information and its application to information flow
- Information flow in object-oriented software
- Instruction-level security analysis for information flow in stack-based assembly languages
- Quantifying probabilistic information flow in computational reactive systems
- Multilevel transitive and intransitive non-interference, causally
- Confined types in Java
- A formal model for access control with supporting spatial context
- Verifying constant-time implementations by abstract interpretation
- Model checking the observational determinism security property using PROMELA and SPIN
- Information leakage analysis by abstract interpretation
- Information flow control in software DB units based on formal verification
- A dependent dependency calculus
- Compiling Information-Flow Security to Minimal Trusted Computing Bases
- Program synthesis for interactive-security systems
- Flexible dynamic information flow control in the presence of exceptions
- A security flow control algorithm and its denotational semantics correctness proof
- Multi-level Access Control, Directed Graphs and Partial Orders in Flow Control for Data Secrecy and Privacy
- Gaining trust by tracing security protocols
This page was built for publication: A lattice model of secure information flow
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4085248)