• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations
Advanced Search Include Citations

DMCA

Language-Based Information-Flow Security (2003)

Cached

  • Download as a PDF

Download Links

  • [www.cs.cornell.edu]
  • [www.cs.purdue.edu]
  • [www.ece.cmu.edu]
  • [www.utdallas.edu]
  • [www.cs.purdue.edu]
  • [www.cs.purdue.edu]
  • [www.utdallas.edu]
  • [www.cs.purdue.edu]
  • [www.cs.cornell.edu]
  • [www.cs.cornell.edu]
  • [people.csail.mit.edu]
  • [www.cs.chalmers.se]
  • [www.md.chalmers.se]
  • [www.math.chalmers.se]
  • [www.cse.chalmers.se]
  • [www.cs.wpi.edu]
  • [www.cse.chalmers.se]
  • [www.utdallas.edu]
  • [www.utdallas.edu]
  • [www.utdallas.edu]
  • [www.utdallas.edu]
  • [www.utdallas.edu]

  • Save to List
  • Add to Collection
  • Correct Errors
  • Monitor Changes
by Andrei Sabelfeld , Andrew C. Myers
Venue:IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS
Citations:828 - 57 self
  • Summary
  • Citations
  • Active Bibliography
  • Co-citation
  • Clustered Documents
  • Version History

BibTeX

@ARTICLE{Sabelfeld03language-basedinformation-flow,
    author = {Andrei Sabelfeld and Andrew C. Myers},
    title = { Language-Based Information-Flow Security},
    journal = {IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS},
    year = {2003},
    volume = {21},
    number = {1},
    pages = {2003}
}

Share

Facebook Twitter Reddit Bibsonomy

OpenURL

 

Abstract

Current standard security practices do not provide substantial assurance that the end-to-end behavior of a computing system satisfies important security policies such as confidentiality. An end-to-end confidentiality policy might assert that secret input data cannot be inferred by an attacker through the attacker's observations of system output; this policy regulates information flow.

Keyphrases

language-based information-flow security    substantial assurance    end-to-end confidentiality policy    secret input data cannot    information flow    current standard security practice    system output    end-to-end behavior   

Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University