Publisher
Springer Berlin Heidelberg
Reference27 articles.
1. Almeida Matos, A., Boudol, G.: On declassification and the non-disclosure pol- icy. In: CSFW 2005, pp. 226–240 (2005); revised version accepted for publication in the J. of Computer Security, available from the authors web page
2. Lecture Notes in Computer Science;T. Amtoft,2004
3. Banerjee, A., Naumann, D.A.: Stack-based access control for secure information flow. J. of Functional Programming 15, 131–177 (2005); special issue on Language-Based Security
4. Barthe, G., D’Argenio, P., Rezk, T.: Secure information flow by self- composition. In: CSFW 2004 (2004)
5. Barthe, G., Rezk, T.: Non-interference for a JVM-like language. In: ACM SIGPLAN Workshop on Types in Language Design and Implementation, pp. 103–112 (2005)
Cited by
16 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Symbolic Abstract Heaps for Polymorphic Information-Flow Guard Inference;Lecture Notes in Computer Science;2023
2. Robustly Safe Compilation, an Efficient Form of Secure Compilation;ACM Transactions on Programming Languages and Systems;2021-04
3. On the expressiveness and semantics of information flow types;Journal of Computer Security;2020-02-04
4. Robustly Safe Compilation;Programming Languages and Systems;2019
5. Only Connect, Securely;Formal Techniques for Distributed Objects, Components, and Systems;2019