A lattice model of secure information flow
From MaRDI portal
Publication:4085248
Cited in
(49)- Abstract interpretation of operational semantics for secure information flow.
- Algebraic foundations for quantitative information flow
- Information flow for Algol-like languages
- The enforcement of security policies for computation
- Secure guarded commands
- Automated enforcement for relaxed information release with reference points
- Normalising Lustre preserves security
- Information flow analysis of scientific workflows
- Agda formalization of a security-preserving translation from flow-sensitive to flow-insensitive security types
- A logical approach to multilevel security of probabilistic systems
- Data flow analysis from capability lists, with application to RBAC
- Controlling file access with types
- Information theory and security: Quantitative information flow
- Only connect, securely
- Computational probabilistic non-interference
- Hybrid information flow control for low-level code
- Cryptographically-enforced hierarchical access control with multiple keys
- Integrating security constraints into fixed priority real-time schedulers
- Thread algebra for noninterference
- A survey of challenges for runtime verification from advanced application domains (beyond software)
- Secure Multi-party Computation: Information Flow of Outputs and Game Theory
- Secure information flow connections
- Non-disclosure for distributed mobile code
- Flow Policy Awareness for Distributed Mobile Code
- Information Flow Tracking for Side-Effectful Libraries
- A model of systems with modes and mode transitions
- Secrecy and group creation
- Mediating secure information flow policies
- Self-adaptation and secure information flow in multiparty communications
- Security property based administrative controls
- Can you trust your data?
- Hybrid statistical estimation of mutual information and its application to information flow
- Information flow in object-oriented software
- Instruction-level security analysis for information flow in stack-based assembly languages
- Multilevel transitive and intransitive non-interference, causally
- Quantifying probabilistic information flow in computational reactive systems
- Confined types in Java
- A formal model for access control with supporting spatial context
- Verifying constant-time implementations by abstract interpretation
- Model checking the observational determinism security property using PROMELA and SPIN
- Information leakage analysis by abstract interpretation
- Information flow control in software DB units based on formal verification
- A dependent dependency calculus
- Compiling Information-Flow Security to Minimal Trusted Computing Bases
- Program synthesis for interactive-security systems
- A security flow control algorithm and its denotational semantics correctness proof
- Flexible dynamic information flow control in the presence of exceptions
- Multi-level Access Control, Directed Graphs and Partial Orders in Flow Control for Data Secrecy and Privacy
- Gaining trust by tracing security protocols
This page was built for publication: A lattice model of secure information flow
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4085248)