Security types preserving compilation
From MaRDI portal
Recommendations
Cites work
- scientific article; zbMATH DE number 1692933 (Why is no real title available?)
- scientific article; zbMATH DE number 1696586 (Why is no real title available?)
- scientific article; zbMATH DE number 1956459 (Why is no real title available?)
- A uniform type structure for secure information flow
- Fundamental Approaches to Software Engineering
- Isabelle/HOL. A proof assistant for higher-order logic
- Java bytecode verification: Algorithms and formalizations
- Modern Compiler Implementation in Java
- Secrecy by typing in security protocols
- Theoretical Computer Science
- Verification, Model Checking, and Abstract Interpretation
- Verified bytecode verifiers.
Cited in
(16)- scientific article; zbMATH DE number 7649976 (Why is no real title available?)
- Theoretical Computer Science
- On flow-sensitive security types
- scientific article; zbMATH DE number 1692933 (Why is no real title available?)
- Programming Languages and Systems
- Output-sensitive information flow analysis
- Hybrid information flow control for low-level code
- Securing a compiler transformation
- Securing a compiler transformation
- Secure information flow via linear continuations
- Theoretical Aspects of Computing – ICTAC 2005
- Output-sensitive information flow analysis
- Verification, Model Checking, and Abstract Interpretation
- A secure compiler for ML modules
- Integration of a security type system into a program logic
- scientific article; zbMATH DE number 1948407 (Why is no real title available?)
This page was built for publication: Security types preserving compilation
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q865705)