Secure Information Flow as Typed Process Behaviour
- 12 May 2000
- book chapter
- conference paper
- Published by Springer Science and Business Media LLC in Lecture Notes in Computer Science
- p. 180-199
- https://doi.org/10.1007/3-540-46425-5_12
Abstract
No abstract availableKeywords
This publication has 27 references indexed in Scilit:
- Types and Subtypes for Client-Server InteractionsLecture Notes in Computer Science, 1999
- Control flow analysis for the π-calculusPublished by Springer Science and Business Media LLC ,1998
- The Compositional Security Checker: a tool for the verification of information flow security propertiesIEEE Transactions on Software Engineering, 1997
- Secrecy by typing in security protocolsLecture Notes in Computer Science, 1997
- On reduction-based process semanticsTheoretical Computer Science, 1995
- Types for dyadic interactionLecture Notes in Computer Science, 1993
- Probabilistic interferencePublished by Institute of Electrical and Electronics Engineers (IEEE) ,1990
- Linear logicTheoretical Computer Science, 1987
- Security Policies and Security ModelsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1982
- Certification of programs for secure information flowCommunications of the ACM, 1977