Certification of programs for secure information flow
From MaRDI portal
Publication:4134927
DOI10.1145/359636.359712zbMATH Open0361.68033OpenAlexW2129278597MaRDI QIDQ4134927FDOQ4134927
Authors: Dorothy E. Denning, Peter J. Denning
Publication date: 1977
Published in: Communications of the ACM (Search for Journal in Brave)
Full work available at URL: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.108.995
Cited In (50)
- Abstract interpretation of operational semantics for secure information flow.
- From exponential to polynomial-time security typing via principal types
- Fast computation of strong control dependencies
- The enforcement of security policies for computation
- Type-based information flow analysis for the \(\pi\)-calculus
- Formal verification of side-channel countermeasures using self-composition
- Safe functional systems through integrity types and verified assembly
- Secure guarded commands
- Secure information flow by self-composition
- Automated enforcement for relaxed information release with reference points
- Formalizing non-interference for a simple bytecode language in Coq
- Hoare logic for disjunctive information flow
- Title not available (Why is that?)
- Securing interaction between threads and the scheduler in the presence of synchronization
- Controlling file access with types
- Simple and efficient computation of minimal weak control closure
- Efficient Information-Flow Verification Under Speculative Execution
- Optimality and condensing of information flow through linear refinement
- Fast and incremental computation of weak control closure
- Efficient computation of arbitrary control dependencies
- Computationally Sound Typing for Non-interference: The Case of Deterministic Encryption
- Survey on JavaScript security policies and their enforcement mechanisms in a web browser
- Type systems equivalent to data-flow analyses for imperative languages
- A survey of challenges for runtime verification from advanced application domains (beyond software)
- Non-termination and secure information flow
- Secure information flow connections
- Securing a compiler transformation
- Information flow analysis for valued-indexed data security compartments
- Can you trust your data?
- Efficient static checker for tainted variable attacks
- System-level non-interference of constant-time cryptography. II: Verified static analysis and stealth memory
- Instruction-level security analysis for information flow in stack-based assembly languages
- Combining behavioural types with security analysis
- Abstract Certification of Global Non-interference in Rewriting Logic
- Type-based security for mobile computing integrity, secrecy and liveness
- Combining slicing and constraint solving for validation of measurement software
- An alternative characterization of weak order dependence
- Information flow control in software DB units based on formal verification
- Stepwise refinement of heap-manipulating code in Chalice
- Model-driven information flow security for component-based systems
- A secrecy-preserving language for distributed and object-oriented systems
- A unifying theory of control dependence and its application to arbitrary program structures
- Dynamic program slicing
- Flexible dynamic information flow control in the presence of exceptions
- A security flow control algorithm and its denotational semantics correctness proof
- Cryptographically-masked flows
- Content dependent information flow control
- Abstract semantic dependency
- The spirit of ghost code
- Symbolic abstract heaps for polymorphic information-flow guard inference
This page was built for publication: Certification of programs for secure information flow
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4134927)