Subject
General Computer Science,Theoretical Computer Science
Reference19 articles.
1. M. Abadi, A. Banerjee, N. Heintze, J. Riecke, A core calculus of dependency, in: Proc. 26th ACM Symp. on Principles of Programming Languages, POPL, San Antonio, TX, 1999, pp. 147–160.
2. Enforcing security and safety models with an information flow analysis tool;Chapman;ACM SIGAda Ada Letters,2004
3. Generalising monads to arrows;Hughes;Science of Computer Programming,2000
4. P. Li, S. Zdancewic, Encoding information flow in Haskell, in: Proceedings of the 19th IEEE Computer Security Foundations Workshop, CSFW’06, 2006.
5. S. Liang, P. Hudak, M. Jones, Monad transformers and modular interpreters, in: Proceedings of the 22nd ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, 1995, pp. 333–343.
Cited by
37 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Quest Complete: The Holy Grail of Gradual Security;Proceedings of the ACM on Programming Languages;2024-06-20
2. A Haskell-Embedded DSL for Secure Information-Flow;Lecture Notes in Computer Science;2023-12-02
3. Verifying Indistinguishability of Privacy-Preserving Protocols;Proceedings of the ACM on Programming Languages;2023-10-16
4. A Programming Language for Data Privacy with Accuracy Estimations;ACM Transactions on Programming Languages and Systems;2021-07
5. Mechanized Type Safety for Gradual Information Flow;2021 IEEE Security and Privacy Workshops (SPW);2021-05