Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
article

A semantic approach to secure information flow

Published: 01 May 2000 Publication History

Abstract

No abstract available.

Cited By

View all

Recommendations

Comments

Information & Contributors

Information

Published In

cover image Science of Computer Programming
Science of Computer Programming  Volume 37, Issue 1-3
Special issue on mathematics of program construction
May 2000
302 pages
ISSN:0167-6423
Issue’s Table of Contents

Publisher

Elsevier North-Holland, Inc.

United States

Publication History

Published: 01 May 2000

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 15 Oct 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Axiomatising an information flow logic based on partial equivalence relationsInternational Journal on Software Tools for Technology Transfer (STTT)10.1007/s10009-024-00756-z26:4(445-461)Online publication date: 1-Aug-2024
  • (2022)Provably Correct Runtime Enforcement of Non-interference PropertiesInformation and Communications Security10.1007/11935308_24(332-351)Online publication date: 10-Mar-2022
  • (2019)Whither Specifications as ProgramsUnifying Theories of Programming10.1007/978-3-030-31038-7_3(39-61)Online publication date: 8-Oct-2019
  • (2017)Secure Multi-party ComputationProceedings of the 6th International Conference on Principles of Security and Trust - Volume 1020410.1007/978-3-662-54455-6_4(71-92)Online publication date: 22-Apr-2017
  • (2017)Modular Verification of Procedure Equivalence in the Presence of Memory AllocationProgramming Languages and Systems10.1007/978-3-662-54434-1_35(937-963)Online publication date: 25-Apr-2017
  • (2015)Data Leakage Analysis of the Hibernate Query Language on a Propositional Formulae DomainTransactions on Large-Scale Data- and Knowledge-Centered Systems XXIII - Volume 948010.1007/978-3-662-49175-1_2(23-44)Online publication date: 1-Sep-2015
  • (2014)Abstractions of non-interference security: probabilistic versus possibilisticFormal Aspects of Computing10.1007/s00165-012-0237-426:1(169-194)Online publication date: 1-Jan-2014
  • (2012)Noninterference via symbolic executionProceedings of the 14th joint IFIP WG 6.1 international conference and Proceedings of the 32nd IFIP WG 6.1 international conference on Formal Techniques for Distributed Systems10.1007/978-3-642-30793-5_10(152-168)Online publication date: 13-Jun-2012
  • (2011)Modelling declassification policies using abstract domain completenessMathematical Structures in Computer Science10.1017/S096012951100020X21:6(1253-1299)Online publication date: 1-Dec-2011
  • (2011)Compositional refinement in agent-based security protocolsFormal Aspects of Computing10.1007/s00165-010-0164-123:6(711-737)Online publication date: 1-Nov-2011
  • Show More Cited By

View Options

View options

Get Access

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media