A semantic approach to secure information flow
From MaRDI portal
Publication:1566911
DOI10.1016/S0167-6423(99)00024-6zbMath0954.68052OpenAlexW2173102238MaRDI QIDQ1566911
Rajeev Joshi, K. Rustan M. Leino
Publication date: 4 June 2000
Published in: Science of Computer Programming (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/s0167-6423(99)00024-6
Related Items (18)
Product programs and relational program logics ⋮ Information Flow in Object-Oriented Software ⋮ Instruction-level security analysis for information flow in stack-based assembly languages ⋮ Compositional refinement in agent-based security protocols ⋮ Formal verification of side-channel countermeasures using self-composition ⋮ The shadow knows: refinement and security in sequential programs ⋮ Modular Verification of Procedure Equivalence in the Presence of Memory Allocation ⋮ Formalizing non-interference for a simple bytecode language in Coq ⋮ Integration of a security type system into a program logic ⋮ Secure Multi-party Computation: Information Flow of Outputs and Game Theory ⋮ Quantification of integrity ⋮ A logic for secure memory access of abstract state machines ⋮ Relational bytecode correlations ⋮ Abstractions of non-interference security: probabilistic versus possibilistic ⋮ Abstract Interpretation of Symbolic Execution with Explicit State Updates ⋮ Secure information flow by self-composition ⋮ Modelling declassification policies using abstract domain completeness ⋮ What You Lose is What You Leak: Information Leakage in Declassification Policies
This page was built for publication: A semantic approach to secure information flow