Detection of information leak by data flow analysis
- 1 August 2002
- journal article
- Published by Association for Computing Machinery (ACM) in ACM SIGPLAN Notices
- Vol. 37 (8), 66-71
- https://doi.org/10.1145/596992.597005
Abstract
No abstract availableThis publication has 8 references indexed in Scilit:
- A Per Model of Secure Information Flow in Sequential ProgramsHigher-Order and Symbolic Computation, 2001
- A semantic approach to secure information flowScience of Computer Programming, 2000
- A type-based approach to program securityPublished by Springer Nature ,1997
- Compile-time detection of information flow in sequential programsLecture Notes in Computer Science, 1994
- A security flow control algorithm and its denotational semantics correctness proofFormal Aspects of Computing, 1992
- An Axiomatic Approach to Information Flow in ProgramsACM Transactions on Programming Languages and Systems, 1980
- Certification of programs for secure information flowCommunications of the ACM, 1977
- A lattice model of secure information flowCommunications of the ACM, 1976