swMATH16478MaRDI QIDQ28347FDOQ28347
Author name not available (Why is that?)
Official website: http://www.cs.cornell.edu/jif/
Cited In (39)
- Value sensitivity and observable abstract values for information flow control
- Multiple facets for dynamic information flow
- CoCon: a conference management system with formally verified document confidentiality
- Arrows for secure information flow
- JRIF: reactive information flow control for Java
- Product programs in the wild: retrofitting program verifiers to check information flow security
- SeLINQ: tracking information across application-database boundaries
- Securing interaction between threads and the scheduler in the presence of synchronization
- Attacker control and impact for confidentiality and integrity
- Information flow analysis for mobile code in dynamic security environments
- CoSMed: a confidentiality-verified social media platform
- CoSMed: a confidentiality-verified social media platform
- Flow Caml
- ConfiChair
- Paragon
- dsdtool
- CoSMed
- Ur/Web
- Combining behavioural types with security analysis
- JFlow
- GWT
- Flicker
- Fable
- Laminar
- MJ
- Pixy
- SeLINQ
- RVT
- JRIF
- JSFlow
- Type-based security for mobile computing integrity, secrecy and liveness
- FlowFox
- Narcissus
- ZaphodFacetes
- CoCon
- A survey on server-side approaches to securing web applications
- Compiling Information-Flow Security to Minimal Trusted Computing Bases
- Toward general diagnosis of static errors
- Integration of a security type system into a program logic
This page was built for software: Jif