Compositionality of Secure Information Flow

被引:0
|
作者
Palamidessi, Catuscia [1 ]
机构
[1] Ecole Polytech, INRIA, Palaiseau, France
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
引用
收藏
页码:19 / 19
页数:1
相关论文
共 50 条
  • [21] Non-termination and secure information flow
    Smith, Geoffrey
    Alpizar, Rafael
    MATHEMATICAL STRUCTURES IN COMPUTER SCIENCE, 2011, 21 (06) : 1183 - 1205
  • [22] Supporting Secure Information Flow: An Engineering Approach
    Bracher, Shane
    Krishnan, Padmanabhan
    INTERNATIONAL JOURNAL OF E-COLLABORATION, 2012, 8 (01) : 17 - 35
  • [23] Secure information flow by self-composition
    Barthe, G
    D'Argenio, PR
    Rezk, T
    17TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS, 2004, : 100 - 114
  • [24] A type system for computationally secure information flow
    Laud, P
    Vene, V
    FUNDAMENTALS OF COMPUTATIONAL THEORY, PROCEEDINGS, 2005, 3623 : 365 - 377
  • [25] A Method of Secure Information Flow Based on Data Flow Analysis
    Yao, Jianbo
    SOFTWARE ENGINEERING AND KNOWLEDGE ENGINEERING: THEORY AND PRACTICE, VOL 1, 2012, 114 : 597 - 606
  • [26] LATTICE MODEL OF SECURE INFORMATION-FLOW
    DENNING, DE
    COMMUNICATIONS OF THE ACM, 1976, 19 (05) : 236 - 243
  • [27] Secure information flow as typed process behaviour
    Honda, K
    Vasconcelos, V
    Yoshida, N
    PROGRAMMING LANGUAGES AND SYSTEMS, PROCEEDINGS, 2000, 1782 : 180 - 199
  • [28] Dynamic dependency monitoring to secure information flow
    Shroff, Paritosh
    Smith, Scott F.
    Thober, Mark
    20TH IEEE COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSFS20), PROCEEDINGS, 2007, : 203 - +
  • [29] CERTIFICATION OF PROGRAMS FOR SECURE INFORMATION-FLOW
    DENNING, DE
    DENNING, PJ
    COMMUNICATIONS OF THE ACM, 1977, 20 (07) : 504 - 513
  • [30] Handling encryption in an analysis for secure information flow
    Laud, P
    PROGRAMMING LANGUAGES AND SYSTEMS, 2003, 2618 : 159 - 173