JFlow
- 1 January 1999
- proceedings article
- Published by Association for Computing Machinery (ACM)
- p. 228-241
- https://doi.org/10.1145/292540.292561
Abstract
No abstract availableThis publication has 14 references indexed in Scilit:
- A decentralized model for information flow controlPublished by Association for Computing Machinery (ACM) ,1997
- Provably-secure programming languages for remote evaluationACM SIGPLAN Notices, 1997
- A sound type system for secure flow analysisJournal of Computer Security, 1996
- CACLPublished by Association for Computing Machinery (ACM) ,1992
- Dynamic typing in a statically typed languageACM Transactions on Programming Languages and Systems, 1991
- An Axiomatic Approach to Information Flow in ProgramsACM Transactions on Programming Languages and Systems, 1980
- A language extension for expressing constraints on data accessCommunications of the ACM, 1978
- Certification of programs for secure information flowCommunications of the ACM, 1977
- A lattice model of secure information flowCommunications of the ACM, 1976
- A note on the confinement problemCommunications of the ACM, 1973