A lattice model of secure information flow
From MaRDI portal
Publication:4085248
DOI10.1145/360051.360056zbMath0322.68034OpenAlexW2094873755WikidataQ29308066 ScholiaQ29308066MaRDI QIDQ4085248
Publication date: 1976
Published in: Communications of the ACM (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1145/360051.360056
Symbolic computation and algebraic computation (68W30) Formal languages and automata (68Q45) General topics in the theory of software (68N01) Algorithms in computer science (68W99)
Related Items
Normalising Lustre preserves security, Information Flow Tracking for Side-Effectful Libraries, Automated enforcement for relaxed information release with reference points, Data flow analysis from capability lists, with application to RBAC, Confined types in Java, Integrating security constraints into fixed priority real-time schedulers, Secure information flow connections, A model of systems with modes and mode transitions, Information Flow in Object-Oriented Software, Multi-level Access Control, Directed Graphs and Partial Orders in Flow Control for Data Secrecy and Privacy, Self-adaptation and secure information flow in multiparty communications, Instruction-level security analysis for information flow in stack-based assembly languages, Mediating secure information flow policies, Flow Policy Awareness for Distributed Mobile Code, A formal model for access control with supporting spatial context, Verifying constant-time implementations by abstract interpretation, Information flow control in software DB units based on formal verification, Multilevel transitive and intransitive non-interference, causally, Hybrid statistical estimation of mutual information and its application to information flow, Can you trust your data, Hybrid information flow control for low-level code, Program synthesis for interactive-security systems, A dependent dependency calculus, Model checking the observational determinism security property using PROMELA and SPIN, Only connect, securely, Flexible dynamic information flow control in the presence of exceptions, A logical approach to multilevel security of probabilistic systems, Secure Guarded Commands, Agda formalization of a security-preserving translation from flow-sensitive to flow-insensitive security types, Compiling Information-Flow Security to Minimal Trusted Computing Bases, Secure Multi-party Computation: Information Flow of Outputs and Game Theory, Controlling file access with types, A security flow control algorithm and its denotational semantics correctness proof, Information Theory and Security: Quantitative Information Flow, Secrecy and group creation, Algebraic foundations for quantitative information flow, A survey of challenges for runtime verification from advanced application domains (beyond software), Information flow analysis of scientific workflows, The enforcement of security policies for computation, Information Leakage Analysis by Abstract Interpretation, Thread algebra for noninterference, Non-disclosure for distributed mobile code, Cryptographically-enforced hierarchical access control with multiple keys, Gaining trust by tracing security protocols, Abstract interpretation of operational semantics for secure information flow., Security Property Based Administrative Controls, Quantifying Probabilistic Information Flow in Computational Reactive Systems, Information flow for Algol-like languages, Computational Probabilistic Non-interference