Language-based information-flow security

Current standard security practices do not provide substantial assurance that the end-to-end behavior of a computing system satisfies important security policies such as confidentiality. An end-to-end confidentiality policy might assert that secret input data cannot be inferred by an attacker throug...

Full description

Saved in:
Bibliographic Details
Published in:IEEE journal on selected areas in communications Vol. 21; no. 1; pp. 5 - 19
Main Authors: Sabelfeld, A., Myers, A.C.
Format: Journal Article
Language:English
Published: New York IEEE 01.01.2003
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Subjects:
ISSN:0733-8716, 1558-0008
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Abstract Current standard security practices do not provide substantial assurance that the end-to-end behavior of a computing system satisfies important security policies such as confidentiality. An end-to-end confidentiality policy might assert that secret input data cannot be inferred by an attacker through the attacker's observations of system output; this policy regulates information flow. Conventional security mechanisms such as access control and encryption do not directly address the enforcement of information-flow policies. Previously, a promising new approach has been developed: the use of programming-language techniques for specifying and enforcing information-flow policies. In this paper, we survey the past three decades of research on information-flow security, particularly focusing on work that uses static program analysis to enforce information-flow policies. We give a structured view of work in the area and identify some important open challenges.
AbstractList Current standard security practices do not provide substantial assurance that the end-to-end behavior of a computing system satisfies important security policies such as confidentiality. An end-to-end confidentiality policy might assert that secret input data cannot be inferred by an attacker through the attacker's observations of system output; this policy regulates information flow. Conventional security mechanisms such as access control and encryption do not directly address the enforcement of information-flow policies. Previously, a promising new approach has been developed: the use of programming-language techniques for specifying and enforcing information-flow policies. In this paper, we survey the past three decades of research on information-flow security, particularly focusing on work that uses static program analysis to enforce information-flow policies. We give a structured view of work in the area and identify some important open challenges.
Author Sabelfeld, A.
Myers, A.C.
Author_xml – sequence: 1
  givenname: A.
  surname: Sabelfeld
  fullname: Sabelfeld, A.
  organization: Comput. Sci. Dept., Cornell Univ., Ithaca, NY, USA
– sequence: 2
  givenname: A.C.
  surname: Myers
  fullname: Myers, A.C.
  organization: Comput. Sci. Dept., Cornell Univ., Ithaca, NY, USA
BookMark eNp9kE1Lw0AQQBepYFu9C16KB_WSOrOb_cixFD8peFDPy2azKVvSpO4mSP-9qRWEHnoaBt4bmDcig7qpHSGXCFNEyO5f32fzKQWgUwUCKZ6QIXKuEgBQAzIEyViiJIozMopxBYBpquiQ3C1MvezM0iW5ia6Y-Lpswtq0vqmTsmq-J9HZLvh2e05OS1NFd_E3x-Tz8eFj_pws3p5e5rNFYhnHNhGplchtQTFlIgcLShYukzlIWuQcOSrDs9xaUfCCG8aptFDy3Kl-LVVh2Jjc7u9uQvPVudjqtY_WVZWpXdNFnQGKLOOIPXlzlKSKUc4RevD6AFw1Xaj7L7RSKZUpUtZDYg_Z0MQYXKmtb387tMH4SiPoXWe966x3nfW-cy_CgbgJfm3C9phytVe8c-4fR54JjuwHP0KIQA
CODEN ISACEM
CitedBy_id crossref_primary_10_1016_j_tcs_2014_04_022
crossref_primary_10_3390_fi15070224
crossref_primary_10_1109_TIFS_2017_2707323
crossref_primary_10_1109_ACCESS_2024_3487852
crossref_primary_10_1515_sats_2023_0010
crossref_primary_10_1109_TDSC_2024_3403653
crossref_primary_10_1007_s10515_009_0050_3
crossref_primary_10_1007_s11334_010_0127_y
crossref_primary_10_1145_3591276
crossref_primary_10_1145_3371081
crossref_primary_10_3233_JCS_150541
crossref_primary_10_1016_j_cola_2019_100904
crossref_primary_10_1016_j_infsof_2013_09_004
crossref_primary_10_1007_s10207_007_0047_5
crossref_primary_10_1016_j_cl_2016_05_003
crossref_primary_10_1145_3276488
crossref_primary_10_1145_1805974_1805982
crossref_primary_10_1145_3591261
crossref_primary_10_1145_2398857_2384621
crossref_primary_10_1016_j_is_2013_12_006
crossref_primary_10_1016_j_scico_2006_03_002
crossref_primary_10_1145_3436817
crossref_primary_10_1016_j_infsof_2025_107719
crossref_primary_10_1016_j_entcs_2009_11_018
crossref_primary_10_1109_ACCESS_2020_2974487
crossref_primary_10_1016_j_jnca_2018_06_004
crossref_primary_10_1007_s13389_011_0021_z
crossref_primary_10_1145_3175660
crossref_primary_10_1007_s10664_024_10556_3
crossref_primary_10_1109_ACCESS_2020_2977992
crossref_primary_10_1016_j_jlamp_2022_100829
crossref_primary_10_1007_s10207_009_0086_1
crossref_primary_10_1016_j_jlap_2007_02_009
crossref_primary_10_1145_3498713
crossref_primary_10_1007_s11334_008_0050_7
crossref_primary_10_1145_1111320_1111071
crossref_primary_10_1002_stvr_272
crossref_primary_10_1155_2012_254942
crossref_primary_10_1007_s10009_024_00765_y
crossref_primary_10_1016_j_cose_2011_10_002
crossref_primary_10_1016_j_infsof_2005_08_008
crossref_primary_10_1016_j_jss_2004_11_003
crossref_primary_10_1016_j_jlap_2004_01_003
crossref_primary_10_1007_s11225_010_9223_0
crossref_primary_10_1109_MM_2023_3273009
crossref_primary_10_1145_2858965_2814274
crossref_primary_10_1016_j_cl_2005_05_002
crossref_primary_10_1145_3564785
crossref_primary_10_1016_j_scico_2013_11_031
crossref_primary_10_1145_3720427
crossref_primary_10_3390_info16050405
crossref_primary_10_1016_j_tcs_2015_02_045
crossref_primary_10_1145_3290348
crossref_primary_10_1145_3332371
crossref_primary_10_1016_j_jlamp_2017_12_003
crossref_primary_10_1016_j_scico_2018_08_003
crossref_primary_10_1145_3274282
crossref_primary_10_1007_s10207_024_00939_4
crossref_primary_10_1016_j_engappai_2018_01_002
crossref_primary_10_3233_JCS_191316
crossref_primary_10_1016_j_cosrev_2025_100758
crossref_primary_10_1140_epjst_e2016_60402_0
crossref_primary_10_1145_3729349
crossref_primary_10_1007_s00354_012_0207_7
crossref_primary_10_1145_2480359_2429115
crossref_primary_10_3233_JCS_160557
crossref_primary_10_1016_j_entcs_2020_08_005
crossref_primary_10_1016_j_jcss_2009_11_002
crossref_primary_10_1007_s10515_014_0166_y
crossref_primary_10_1007_s00165_016_0381_3
crossref_primary_10_1016_j_cose_2021_102343
crossref_primary_10_1145_3656448
crossref_primary_10_1145_2834114
crossref_primary_10_1109_TDSC_2017_2672983
crossref_primary_10_1145_1571629_1571631
crossref_primary_10_2168_LMCS_7_3_17_2011
crossref_primary_10_1145_3571213
crossref_primary_10_1145_3421473_3421478
crossref_primary_10_1016_j_jss_2004_03_017
crossref_primary_10_1109_JESTPE_2024_3366089
crossref_primary_10_3103_S0146411614070177
crossref_primary_10_1145_1046191_1032305
crossref_primary_10_1017_S0960129511000211
crossref_primary_10_1109_TSC_2008_10
crossref_primary_10_1145_2345156_2254099
crossref_primary_10_1145_2692915_2628151
crossref_primary_10_1145_2786763_2694385
crossref_primary_10_3233_JCS_160542
crossref_primary_10_4028_www_scientific_net_AMM_336_338_2348
crossref_primary_10_1016_j_cl_2013_06_001
crossref_primary_10_1145_1543136_1542474
crossref_primary_10_3233_JCS_160544
crossref_primary_10_1016_j_cose_2021_102299
crossref_primary_10_1016_j_ic_2007_04_002
crossref_primary_10_1017_S096012951100020X
crossref_primary_10_1016_j_tcs_2007_05_004
crossref_primary_10_1186_s13635_018_0074_y
crossref_primary_10_1002_sec_1708
crossref_primary_10_1007_s10619_024_07449_1
crossref_primary_10_1145_3623382
crossref_primary_10_1007_s10676_023_09730_w
crossref_primary_10_1145_2676548
crossref_primary_10_1145_3571740
crossref_primary_10_1145_3649817
crossref_primary_10_1016_j_mejo_2023_106088
crossref_primary_10_1007_s10703_019_00337_w
crossref_primary_10_1016_j_micpro_2021_104377
crossref_primary_10_1007_s00778_017_0486_1
crossref_primary_10_1016_j_cosrev_2011_02_002
crossref_primary_10_1016_j_scico_2018_04_006
crossref_primary_10_1016_j_jss_2021_111138
crossref_primary_10_1016_j_cose_2017_04_001
crossref_primary_10_1145_2775054_2694372
crossref_primary_10_1007_s13173_013_0119_5
crossref_primary_10_1145_3483790
crossref_primary_10_1145_1815918_1815932
crossref_primary_10_1016_j_jss_2017_02_040
crossref_primary_10_1007_s10009_021_00622_2
crossref_primary_10_1145_1178625_1178628
crossref_primary_10_1109_MSECP_2003_1253571
crossref_primary_10_1145_2980983_2908092
crossref_primary_10_1145_2619091
crossref_primary_10_1145_1328897_1328478
crossref_primary_10_1145_1328897_1328479
crossref_primary_10_1007_s00165_007_0055_2
crossref_primary_10_3233_JCS_211385
crossref_primary_10_1007_s10207_007_0015_0
crossref_primary_10_1016_j_ic_2014_07_005
crossref_primary_10_1109_MC_2012_1
crossref_primary_10_1145_3229061
crossref_primary_10_1007_s10207_007_0016_z
crossref_primary_10_1007_s10462_012_9343_1
crossref_primary_10_1145_2382756_2382791
crossref_primary_10_1145_3360563
crossref_primary_10_1145_2858949_2784758
crossref_primary_10_1109_TCAD_2014_2331332
crossref_primary_10_1145_2345156_2254078
crossref_primary_10_1109_TDSC_2019_2914209
crossref_primary_10_1145_3591250
crossref_primary_10_1145_1945023_1945039
crossref_primary_10_1145_2775054_2694385
crossref_primary_10_1016_j_tcs_2010_01_025
crossref_primary_10_3233_JCS_191342
crossref_primary_10_1145_3711902
crossref_primary_10_1007_s11192_015_1708_1
crossref_primary_10_1145_3375408_3375413
crossref_primary_10_1186_s13677_022_00307_4
crossref_primary_10_1016_j_apal_2011_06_001
crossref_primary_10_1145_1993316_1993551
crossref_primary_10_1007_s11432_014_5168_7
crossref_primary_10_1145_2813885_2737957
crossref_primary_10_3745_KIPSTC_2010_17C_1_015
crossref_primary_10_1145_3093337_3037733
crossref_primary_10_1145_1052883_1052897
crossref_primary_10_1016_j_entcs_2007_10_010
crossref_primary_10_1016_j_entcs_2007_01_059
crossref_primary_10_1016_j_infsof_2008_05_008
crossref_primary_10_1016_j_scico_2020_102414
crossref_primary_10_1145_1290520_1290526
crossref_primary_10_1145_3474385
crossref_primary_10_1145_1016848_1016868
crossref_primary_10_1016_j_cosrev_2021_100431
crossref_primary_10_1016_j_cose_2020_101791
crossref_primary_10_1016_j_tcs_2020_09_039
crossref_primary_10_1145_2096148_2034688
crossref_primary_10_1007_s00236_025_00502_1
crossref_primary_10_1016_j_scico_2007_09_003
crossref_primary_10_1109_TCAD_2015_2424951
crossref_primary_10_1017_S0960129513000583
crossref_primary_10_1145_3573270
crossref_primary_10_1145_1698750_1698754
crossref_primary_10_3745_KIPSTC_2010_17C_1_001
crossref_primary_10_1016_j_cose_2006_08_009
crossref_primary_10_3233_JCS_15805
crossref_primary_10_1016_j_cose_2022_103090
crossref_primary_10_1145_2541228_2555295
crossref_primary_10_1007_s10009_024_00756_z
crossref_primary_10_1109_TR_2015_2457411
crossref_primary_10_1016_j_jsc_2014_09_028
crossref_primary_10_1145_1095809_1095826
crossref_primary_10_1080_00207179_2014_944356
crossref_primary_10_1109_TSE_2018_2861707
crossref_primary_10_1145_2775051_2676994
crossref_primary_10_1145_1952982_1952988
crossref_primary_10_1145_3371924
crossref_primary_10_1016_j_entcs_2011_11_014
crossref_primary_10_1016_j_entcs_2005_02_031
crossref_primary_10_1145_2654822_2541947
crossref_primary_10_1145_3093333_3009878
crossref_primary_10_1016_j_entcs_2004_07_010
crossref_primary_10_1016_j_scico_2014_03_011
crossref_primary_10_1089_big_2022_0201
crossref_primary_10_1145_1357010_1352603
crossref_primary_10_1016_j_entcs_2005_11_077
crossref_primary_10_1007_s10703_021_00376_2
crossref_primary_10_1145_2980983_2908100
crossref_primary_10_1145_1667209_1667223
crossref_primary_10_1007_s10207_014_0257_6
crossref_primary_10_1016_j_tcs_2007_02_004
crossref_primary_10_1145_2578855_2535847
crossref_primary_10_1016_j_entcs_2005_10_031
crossref_primary_10_1145_2544174_2500574
crossref_primary_10_1016_j_matpr_2021_01_738
crossref_primary_10_1145_1667209_1667222
crossref_primary_10_1145_3296979_3192375
crossref_primary_10_1145_3690636
crossref_primary_10_1145_1082983_1083204
crossref_primary_10_1145_1631687_1596598
crossref_primary_10_1016_j_jss_2023_111918
crossref_primary_10_1017_S0960129512000850
crossref_primary_10_1145_1993316_1993518
crossref_primary_10_1016_j_entcs_2007_09_012
crossref_primary_10_1109_ACCESS_2018_2815766
crossref_primary_10_1145_2578855_2535862
crossref_primary_10_1080_01972243_2011_607038
crossref_primary_10_1145_3093333_3009889
crossref_primary_10_1145_3296957_3173213
crossref_primary_10_1007_s10817_020_09566_9
crossref_primary_10_1007_s00165_012_0237_4
crossref_primary_10_1016_j_tcs_2008_01_024
crossref_primary_10_1145_1993316_1993512
crossref_primary_10_1145_3649861
crossref_primary_10_1016_S1571_0661_04_80824_7
crossref_primary_10_1145_2685616
crossref_primary_10_1016_j_scico_2025_103351
crossref_primary_10_1016_S1571_0661_03_50014_7
crossref_primary_10_1186_s13638_016_0711_4
crossref_primary_10_1038_s41598_022_25697_y
crossref_primary_10_3233_JCS_15784
crossref_primary_10_1093_logcom_exp053
crossref_primary_10_1145_1082983_1083216
crossref_primary_10_1145_1809028_1806643
crossref_primary_10_3745_KIPSTA_2008_15_A_1_45
crossref_primary_10_1017_S0956796816000058
crossref_primary_10_1109_ACCESS_2024_3410019
crossref_primary_10_1145_3632886
crossref_primary_10_1145_3428244
crossref_primary_10_1007_s10817_020_09577_6
crossref_primary_10_1016_j_cose_2023_103642
crossref_primary_10_1016_j_jlap_2010_07_005
crossref_primary_10_1007_s10207_024_00886_0
crossref_primary_10_1145_1410234_1410239
crossref_primary_10_1109_JETCAS_2021_3075098
crossref_primary_10_1007_s11859_012_0866_8
crossref_primary_10_1016_j_knosys_2008_11_004
crossref_primary_10_1007_s00607_021_00924_y
crossref_primary_10_1145_1047659_1040319
crossref_primary_10_1049_ip_sen_20030985
crossref_primary_10_1051_ita_2008026
crossref_primary_10_1145_2786763_2694372
crossref_primary_10_1145_3498668
crossref_primary_10_1145_3444963
crossref_primary_10_1016_j_tcs_2008_04_033
crossref_primary_10_1016_S1353_4858_10_70037_4
crossref_primary_10_1016_j_tcs_2008_04_032
crossref_primary_10_1049_iet_ifs_2012_0342
crossref_primary_10_1016_j_tcs_2012_10_047
crossref_primary_10_1016_j_infsof_2015_12_006
crossref_primary_10_1016_j_jlamp_2022_100761
crossref_primary_10_1016_j_jlap_2013_05_001
crossref_primary_10_1016_j_scico_2005_07_010
crossref_primary_10_1016_j_cose_2015_12_004
crossref_primary_10_1145_1513443_1513447
crossref_primary_10_1145_3024086
crossref_primary_10_1016_j_knosys_2007_05_003
crossref_primary_10_1145_2980983_2908113
crossref_primary_10_1145_3643781
crossref_primary_10_1145_1543135_1542484
crossref_primary_10_1145_1543135_1542485
crossref_primary_10_1016_j_entcs_2005_12_115
crossref_primary_10_1007_s10009_020_00552_5
crossref_primary_10_1145_3296979_3192383
crossref_primary_10_1016_j_tcs_2008_04_028
crossref_primary_10_1145_2578855_2535839
crossref_primary_10_3233_JCS_17984
crossref_primary_10_3233_JCS_200036
crossref_primary_10_1007_s11036_024_02332_w
crossref_primary_10_1145_3447867
crossref_primary_10_1145_3106739
crossref_primary_10_1007_s10207_007_0019_9
crossref_primary_10_3390_electronics12061332
crossref_primary_10_1145_3022671_2984002
crossref_primary_10_1145_3093336_3037733
crossref_primary_10_1145_3485464
crossref_primary_10_1109_ACCESS_2019_2895261
crossref_primary_10_1016_j_entcs_2009_02_071
crossref_primary_10_1016_j_jlamp_2021_100733
crossref_primary_10_3103_S0146411618070039
crossref_primary_10_1016_j_ijcip_2010_09_001
crossref_primary_10_1109_TC_2022_3209923
crossref_primary_10_1109_TCAD_2011_2120970
crossref_primary_10_1145_2103621_2103667
crossref_primary_10_1145_3452096
crossref_primary_10_1109_TSE_2019_2931331
crossref_primary_10_1007_s10703_015_0232_5
crossref_primary_10_1017_S096012951100017X
crossref_primary_10_1016_j_jlap_2008_09_003
crossref_primary_10_1109_ACCESS_2017_2780254
crossref_primary_10_1145_2544173_2509554
crossref_primary_10_1016_j_entcs_2005_12_092
crossref_primary_10_1016_j_ic_2009_06_007
crossref_primary_10_1145_2638548
crossref_primary_10_1145_2024723_2000087
crossref_primary_10_1016_j_cose_2008_05_002
crossref_primary_10_1145_3360608
crossref_primary_10_1145_3360607
crossref_primary_10_1145_3434316
crossref_primary_10_3233_JCS_181136
crossref_primary_10_1145_2034574_2034792
crossref_primary_10_1016_j_entcs_2009_07_056
crossref_primary_10_1145_3704887
crossref_primary_10_1109_TIFS_2012_2189105
crossref_primary_10_1017_S0960129511000181
crossref_primary_10_1145_982962_964017
crossref_primary_10_1145_1323293_1294295
crossref_primary_10_1145_2103621_2103677
crossref_primary_10_1631_FITEE_1601371
crossref_primary_10_1007_s11416_018_0317_y
crossref_primary_10_1145_3054924
crossref_primary_10_1145_3643567
crossref_primary_10_1145_3747589
crossref_primary_10_1007_s10703_024_00447_0
crossref_primary_10_1016_j_scico_2004_01_002
crossref_primary_10_1145_3090064_3090071
crossref_primary_10_1080_0144929X_2015_1128976
crossref_primary_10_1016_j_entcs_2017_04_002
crossref_primary_10_1145_3290389
crossref_primary_10_1145_3290388
crossref_primary_10_1016_j_tcs_2006_12_019
crossref_primary_10_1109_ACCESS_2025_3555873
crossref_primary_10_1145_2829949
crossref_primary_10_1016_j_cose_2007_07_002
crossref_primary_10_1017_S0960129511000193
crossref_primary_10_1109_TNSM_2013_122313_130423
crossref_primary_10_1145_1805974_1805977
crossref_primary_10_1145_3491201
crossref_primary_10_1007_s10703_019_00334_z
crossref_primary_10_1145_3487292
crossref_primary_10_1017_S0956796816000241
crossref_primary_10_1145_2345156_2254100
crossref_primary_10_1145_3290390
crossref_primary_10_1145_1111320_1111045
crossref_primary_10_1145_1111320_1111046
crossref_primary_10_1145_1111320_1111044
crossref_primary_10_1016_j_entcs_2007_02_027
crossref_primary_10_1016_j_scico_2013_03_012
crossref_primary_10_1017_S0956796814000033
crossref_primary_10_1145_3371072
crossref_primary_10_1145_2644865_2541947
crossref_primary_10_1016_j_jss_2012_05_061
crossref_primary_10_1145_2501654_2501663
crossref_primary_10_1016_j_scico_2011_10_008
crossref_primary_10_1145_3408987
crossref_primary_10_1145_2775050_2633371
crossref_primary_10_1016_j_cl_2018_07_003
crossref_primary_10_1145_1323293_1294275
crossref_primary_10_1109_TDSC_2012_73
Cites_doi 10.3233/JCS-1999-72-305
10.1007/3-540-48294-6_20
10.1007/3-540-60360-3_47
10.1109/CSFW.1995.518560
10.1109/secpri.2001.924288
10.1007/3-540-45309-1_6
10.1007/3-540-59293-8_221
10.1007/3-540-44685-0_11
10.1109/SP.1982.10014
10.1145/268946.268976
10.1145/365230.365252
10.3233/JCS-1994/1995-3103
10.1109/TIT.1983.1056650
10.1007/3-540-45309-1_4
10.1007/3-540-68697-5_9
10.1016/S1571-0661(04)00290-7
10.1145/324133.324266
10.1109/CSFW.1999.779775
10.1007/BFb0053547
10.1145/362375.362389
10.1145/325694.325729
10.1109/CSFW.1993.246640
10.1007/3-540-45789-5_27
10.1109/SECPRI.1988.8110
10.1145/775265.775268
10.1017/S0956796897002906
10.1007/3-540-44743-1_3
10.1109/CSFW.2002.1021826
10.1145/292540.292561
10.1109/csfw.2002.1021820
10.1145/503272.503281
10.1007/978-1-4419-8598-9
10.1109/SECPRI.2002.1004364
10.1145/565816.503302
10.1007/3-540-45315-6_2
10.1109/CSFW.2002.1021804
10.1145/351240.351245
10.1109/RISP.1990.63848
10.1007/3-540-48340-3_26
10.1145/1067625.806556
10.1016/S1571-0661(04)00152-5
10.1007/3-540-58618-0_56
10.1145/263699.263712
10.1109/FTDCS.1995.525008
10.1007/BFb0030629
10.1109/SP.1985.10005
10.1109/CSFW.1997.596807
10.1016/S0304-3975(02)00010-5
10.1109/CSFW.2001.930151
10.1016/0890-5401(91)90030-6
10.21236/ADA462529
10.3233/JCS-2003-11406
10.3233/JCS-1996-42-304
10.1109/PROC.1975.9939
10.1109/SP.1984.10019
10.1145/355616.364017
10.1145/325694.325702
10.1109/CSFW.2002.1021819
10.1007/3-540-44577-3_6
10.1145/292540.292555
10.1007/3-540-49099-X_4
10.1145/292540.292560
10.1109/CSFW.2000.856937
10.1007/3-540-45789-5_26
10.1145/503272.503302
10.1007/3-540-45789-5_23
10.1109/CSFW.2001.930133
10.1145/357084.357088
10.21236/ADA463011
10.1145/168619.168635
10.1006/inco.1998.2740
10.1145/268998.266669
10.1145/359636.359712
10.1007/978-3-662-03811-6
10.1109/SECPRI.1999.766716
10.1109/RISP.1994.296590
10.1109/CSFW.2001.930142
10.1109/CSFW.2000.856935
10.1145/363516.363520
10.1023/A:1020843229247
10.1109/CSFW.2000.856943
10.1007/3-540-48320-9_32
10.1109/32.481534
10.1109/CSFW.2000.856941
10.1023/A:1011553200337
10.1109/SECPRI.1998.674834
10.1109/CSFW.2000.856940
10.1145/502034.502036
10.1016/S0167-6423(99)00024-6
10.1145/360051.360056
10.1007/3-540-48224-5_32
10.1145/512950.512973
10.1145/268946.268975
10.1109/CSFW.2002.1021818
10.1145/91556.91577
10.1093/comjnl/17.2.143
10.1017/cbo9780511609619
10.1007/3-540-45608-2_1
10.1007/978-1-349-12020-8_1
10.1007/3-540-49019-1_9
10.1006/inco.2000.3020
10.1109/CSFW.2001.930141
10.1145/584091.584093
10.1109/CSFW.2000.856936
10.1109/SECPRI.1995.398927
10.1145/357401.357402
10.1016/S0096-0551(02)00006-1
10.1109/CSFW.1998.683153
10.1007/3-540-45022-X_35
10.1007/BFb0014571
10.1109/sp.1987.10009
10.1007/BF03180570
10.1109/LICS.1999.782639
10.1145/319301.319345
10.1145/335169.335201
10.21236/ADB145741
ContentType Journal Article
Copyright Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2003
Copyright_xml – notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2003
DBID RIA
RIE
AAYXX
CITATION
7SP
8FD
L7M
F28
FR3
DOI 10.1109/JSAC.2002.806121
DatabaseName IEEE All-Society Periodicals Package (ASPP) 1998–Present
IEEE Electronic Library (IEL)
CrossRef
Electronics & Communications Abstracts
Technology Research Database
Advanced Technologies Database with Aerospace
ANTE: Abstracts in New Technology & Engineering
Engineering Research Database
DatabaseTitle CrossRef
Technology Research Database
Advanced Technologies Database with Aerospace
Electronics & Communications Abstracts
Engineering Research Database
ANTE: Abstracts in New Technology & Engineering
DatabaseTitleList Engineering Research Database

Technology Research Database
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EISSN 1558-0008
EndPage 19
ExternalDocumentID 2429240641
10_1109_JSAC_2002_806121
1159651
GroupedDBID -~X
.DC
0R~
29I
3EH
4.4
41~
5GY
5VS
6IK
97E
AAJGR
AARMG
AASAJ
AAWTH
ABAZT
ABQJQ
ABVLG
ACGFO
ACGFS
ACIWK
ACNCT
ADRHT
AENEX
AETIX
AGQYO
AGSQL
AHBIQ
AI.
AIBXA
AKJIK
AKQYR
ALLEH
ALMA_UNASSIGNED_HOLDINGS
ATWAV
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
CS3
DU5
EBS
EJD
HZ~
H~9
IBMZZ
ICLAB
IES
IFIPE
IFJZH
IPLJI
JAVBF
LAI
M43
O9-
OCL
P2P
RIA
RIE
RNS
TN5
VH1
AAYXX
CITATION
7SP
8FD
L7M
F28
FR3
ID FETCH-LOGICAL-c351t-64c715cd21436b0c087de97b072db51518a59bcc6d5d5a3527c0f5be85d5f8da3
IEDL.DBID RIE
ISICitedReferencesCount 996
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000181030800002&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
ISSN 0733-8716
IngestDate Sun Sep 28 01:30:18 EDT 2025
Sun Sep 28 06:26:10 EDT 2025
Sun Nov 30 04:33:40 EST 2025
Sat Nov 29 08:05:55 EST 2025
Tue Nov 18 19:37:55 EST 2025
Wed Aug 27 02:47:43 EDT 2025
IsPeerReviewed true
IsScholarly true
Issue 1
Language English
License https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c351t-64c715cd21436b0c087de97b072db51518a59bcc6d5d5a3527c0f5be85d5f8da3
Notes ObjectType-Article-2
SourceType-Scholarly Journals-1
ObjectType-Feature-1
content type line 14
content type line 23
PQID 884274123
PQPubID 23500
PageCount 15
ParticipantIDs proquest_miscellaneous_28325510
proquest_miscellaneous_901699511
ieee_primary_1159651
crossref_citationtrail_10_1109_JSAC_2002_806121
crossref_primary_10_1109_JSAC_2002_806121
proquest_journals_884274123
PublicationCentury 2000
PublicationDate 2003-Jan.
2003-01-00
20030101
PublicationDateYYYYMMDD 2003-01-01
PublicationDate_xml – month: 01
  year: 2003
  text: 2003-Jan.
PublicationDecade 2000
PublicationPlace New York
PublicationPlace_xml – name: New York
PublicationTitle IEEE journal on selected areas in communications
PublicationTitleAbbrev J-SAC
PublicationYear 2003
Publisher IEEE
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Publisher_xml – name: IEEE
– name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
References ref57
ref56
ref59
ref58
Pierro (ref74)
ref52
ref55
Reitman (ref96) 1978
Box (ref23)
Zdancewic (ref94) 2002
ref51
Myers (ref44) 2001
ref46
ref45
ref48
ref47
ref42
Wagner (ref29) 2000
ref43
Bell (ref37) 1973; 1
ref49
ref7
Giambiagi (ref69) 2002
ref9
ref4
Morrisett (ref118) 1995
ref3
ref6
ref5
ref101
ref40
Fenton (ref35) 1973
ref36
ref31
ref30
ref33
ref146
ref32
ref147
Barthe (ref8); LNCS 1722
ref39
ref26
ref20
ref22
Cohen (ref50) 1978
ref21
ref28
ref27
Thiemann (ref100); LNCS 2028
ref13
ref12
ref15
ref128
ref14
ref129
ref97
ref127
ref11
ref99
ref124
ref10
Leino (ref84); LNCS 1422
ref98
ref125
Sabelfeld (ref138) 2001
ref17
Giambiagi (ref108) 2001
ref16
ref19
ref18
Bodei (ref126) 2000
Denning (ref41) 1982
Abadi (ref79) 1996
Barendregt (ref75) 1984
ref93
ref133
ref92
ref134
Mizuno (ref53)
ref95
Agat (ref119) 2000
ref131
ref132
ref130
ref89
ref139
ref86
ref137
ref85
ref88
ref87
ref136
Lindholm (ref24) 1996
Mizuno (ref54)
Ørbæk (ref61) 1997
ref82
ref144
Honda (ref91); LNCS 1782
ref145
ref142
ref83
ref143
ref141
ref80
Sutherland (ref81)
ref78
ref109
ref106
ref107
Sabelfeld (ref90); LNCS 2244
ref104
ref105
ref77
ref102
ref76
ref103
ref2
ref1
Abramksy (ref135) 1998
ref71
ref111
ref70
ref112
ref73
ref72
ref110
ref68
LaPadula (ref38) 1973; 4
ref67
ref117
ref64
ref115
ref63
ref116
ref66
ref113
ref65
ref114
Fritzinger (ref25)
Biba (ref34) 1977
Ryan (ref140) 2001; LNCS 2171
ref60
ref122
ref123
ref62
ref120
ref121
References_xml – ident: ref9
  doi: 10.3233/JCS-1999-72-305
– volume-title: Compiling with types
  year: 1995
  ident: ref118
– ident: ref46
  doi: 10.1007/3-540-48294-6_20
– ident: ref2
  doi: 10.1007/3-540-60360-3_47
– ident: ref104
  doi: 10.1109/CSFW.1995.518560
– ident: ref124
  doi: 10.1109/secpri.2001.924288
– ident: ref110
  doi: 10.1007/3-540-45309-1_6
– ident: ref59
  doi: 10.1007/3-540-59293-8_221
– ident: ref147
  doi: 10.1007/3-540-44685-0_11
– ident: ref47
  doi: 10.1109/SP.1982.10014
– ident: ref5
  doi: 10.1145/268946.268976
– ident: ref21
  doi: 10.1145/365230.365252
– ident: ref139
  doi: 10.3233/JCS-1994/1995-3103
– ident: ref19
  doi: 10.1109/TIT.1983.1056650
– ident: ref12
  doi: 10.1007/3-540-45309-1_4
– ident: ref101
  doi: 10.1007/3-540-68697-5_9
– ident: ref73
  doi: 10.1016/S1571-0661(04)00290-7
– ident: ref97
  doi: 10.1145/324133.324266
– volume: LNCS 2028
  volume-title: Proc. European Symp. Programming
  ident: ref100
  article-title: Enforcing security properties by type specialization
– ident: ref141
  doi: 10.1109/CSFW.1999.779775
– ident: ref129
  doi: 10.1007/BFb0053547
– ident: ref18
  doi: 10.1145/362375.362389
– ident: ref70
  doi: 10.1145/325694.325729
– ident: ref56
  doi: 10.1109/CSFW.1993.246640
– volume-title: Static analysis and computer security: New techniques for software assurance
  year: 2000
  ident: ref29
– ident: ref72
  doi: 10.1007/3-540-45789-5_27
– ident: ref137
  doi: 10.1109/SECPRI.1988.8110
– ident: ref20
  doi: 10.1145/775265.775268
– ident: ref60
  doi: 10.1017/S0956796897002906
– volume-title: Licentiate dissertation, Royal Inst. Technol.
  year: 2001
  ident: ref108
  article-title: Secrecy for mobile implementations of security protocols
– start-page: 297
  volume-title: Foundations of Secure Computation
  year: 1978
  ident: ref50
  article-title: Information transmission in sequential programs
– ident: ref131
  doi: 10.1007/3-540-44743-1_3
– ident: ref93
  doi: 10.1109/CSFW.2002.1021826
– ident: ref7
  doi: 10.1145/292540.292561
– start-page: 1
  volume-title: Proc. IEEE Computer Security Foundations Workshop
  ident: ref74
  article-title: Approximate noninterference
– ident: ref13
  doi: 10.1109/csfw.2002.1021820
– ident: ref92
  doi: 10.1145/503272.503281
– volume-title: The Lambda Calculus, Its Syntax and Semantics.
  year: 1984
  ident: ref75
– volume-title: A Theory of Objects.
  year: 1996
  ident: ref79
  doi: 10.1007/978-1-4419-8598-9
– ident: ref142
  doi: 10.1109/SECPRI.2002.1004364
– ident: ref77
  doi: 10.1145/565816.503302
– ident: ref98
  doi: 10.1007/3-540-45315-6_2
– ident: ref113
  doi: 10.1109/CSFW.2002.1021804
– ident: ref16
  doi: 10.1145/351240.351245
– ident: ref103
  doi: 10.1109/RISP.1990.63848
– ident: ref121
  doi: 10.1007/3-540-48340-3_26
– ident: ref49
  doi: 10.1145/1067625.806556
– ident: ref111
  doi: 10.1016/S1571-0661(04)00152-5
– start-page: 175
  volume-title: Proc. National Computer Security Conf.
  ident: ref81
  article-title: A model of information
– volume-title: Type Based Techniques for Covert Channel Elimination and Register Allocation
  year: 2000
  ident: ref119
– ident: ref57
  doi: 10.1007/3-540-58618-0_56
– ident: ref30
  doi: 10.1145/263699.263712
– ident: ref58
  doi: 10.1109/FTDCS.1995.525008
– ident: ref63
  doi: 10.1007/BFb0030629
– ident: ref43
  doi: 10.1109/SP.1985.10005
– ident: ref67
  doi: 10.1109/CSFW.1997.596807
– ident: ref89
  doi: 10.1016/S0304-3975(02)00010-5
– volume: 1
  year: 1973
  ident: ref37
  article-title: Secure Computer Systems: Mathematical Foundations
  publication-title: MITRE Corp., Bedford, MA, MTR-2547
– volume-title: The Java Virtual Machine.
  year: 1996
  ident: ref24
– ident: ref99
  doi: 10.1109/CSFW.2001.930151
– ident: ref105
  doi: 10.1016/0890-5401(91)90030-6
– ident: ref102
  doi: 10.21236/ADA462529
– ident: ref116
  doi: 10.3233/JCS-2003-11406
– ident: ref3
  doi: 10.3233/JCS-1996-42-304
– ident: ref117
  doi: 10.1109/PROC.1975.9939
– ident: ref48
  doi: 10.1109/SP.1984.10019
– volume-title: Semantic models for the security of sequential and concurrent programs
  year: 2001
  ident: ref138
– ident: ref22
  doi: 10.1145/355616.364017
– volume-title: Information flow in parallel programs: An axiomatic approach
  year: 1978
  ident: ref96
– volume: LNCS 1782
  start-page: 180
  volume-title: Proc. Eur. Symp. Programming
  ident: ref91
  article-title: Secure information flow as typed process behavior
– ident: ref10
  doi: 10.1145/325694.325702
– ident: ref145
  doi: 10.1109/CSFW.2002.1021819
– ident: ref33
  doi: 10.1007/3-540-44577-3_6
– ident: ref15
  doi: 10.1145/292540.292555
– ident: ref85
  doi: 10.1007/3-540-49099-X_4
– volume-title: Confidentiality for Implementations of Security Protocols.
  year: 2002
  ident: ref69
– ident: ref123
  doi: 10.1145/292540.292560
– ident: ref11
  doi: 10.1109/CSFW.2000.856937
– ident: ref136
  doi: 10.1007/3-540-45789-5_26
– ident: ref14
  doi: 10.1145/503272.503302
– start-page: 56
  volume-title: Proc. Nat. Computer Security Conf.
  ident: ref53
  article-title: Information flow control in a distributed object-oriented system with statically-bound object variables
– ident: ref112
  doi: 10.1007/3-540-45789-5_23
– ident: ref65
  doi: 10.1109/CSFW.2001.930133
– ident: ref52
  doi: 10.1145/357084.357088
– ident: ref51
  doi: 10.21236/ADA463011
– volume-title: Cryptography and Data Security.
  year: 1982
  ident: ref41
– ident: ref27
  doi: 10.1145/168619.168635
– ident: ref107
  doi: 10.1006/inco.1998.2740
– ident: ref4
  doi: 10.1145/268998.266669
– ident: ref40
  doi: 10.1145/359636.359712
– volume-title: Sun Microsystems, Inc.
  ident: ref25
  article-title: Java security
– ident: ref125
  doi: 10.1007/978-3-662-03811-6
– volume-title: Information protection systems
  year: 1973
  ident: ref35
– ident: ref32
  doi: 10.1109/SECPRI.1999.766716
– year: 2001
  ident: ref44
  article-title: Jif: Java Information Flow, Software release
– ident: ref45
  doi: 10.1109/RISP.1994.296590
– ident: ref115
  doi: 10.1109/CSFW.2001.930142
– volume-title: Trust and dependence analysis
  year: 1997
  ident: ref61
– volume: LNCS 1422
  start-page: 254
  volume-title: Proc. Mathematics of Program Construction
  ident: ref84
  article-title: A semantic approach to secure information flow
– ident: ref146
  doi: 10.1109/CSFW.2000.856935
– ident: ref26
  doi: 10.1145/363516.363520
– ident: ref76
  doi: 10.1023/A:1020843229247
– ident: ref143
  doi: 10.1109/CSFW.2000.856943
– ident: ref130
  doi: 10.1007/3-540-48320-9_32
– ident: ref80
  doi: 10.1109/32.481534
– ident: ref109
  doi: 10.1109/CSFW.2000.856941
– ident: ref17
  doi: 10.1023/A:1011553200337
– volume-title: Programming languages for information security
  year: 2002
  ident: ref94
– ident: ref106
  doi: 10.1109/SECPRI.1998.674834
– ident: ref68
  doi: 10.1109/CSFW.2000.856940
– ident: ref71
  doi: 10.1145/502034.502036
– ident: ref66
  doi: 10.1016/S0167-6423(99)00024-6
– ident: ref62
  doi: 10.1145/360051.360056
– ident: ref88
  doi: 10.1007/3-540-48224-5_32
– ident: ref133
  doi: 10.1145/512950.512973
– ident: ref6
  doi: 10.1145/268946.268975
– ident: ref78
  doi: 10.1109/CSFW.2002.1021818
– ident: ref23
  article-title: (2000) Simple Object Access Protocol (SOAP) 1.1
– ident: ref122
  doi: 10.1145/91556.91577
– volume-title: Logic and Computation: Proc. 1997 Marktoberdorf Summer School
  year: 1998
  ident: ref135
  article-title: Game semantics
– ident: ref36
  doi: 10.1093/comjnl/17.2.143
– ident: ref120
  doi: 10.1017/cbo9780511609619
– volume: LNCS 2171
  start-page: 1
  volume-title: Foundations Security Analysis and Design
  year: 2001
  ident: ref140
  article-title: Mathematical models of computer security-Tutorial lectures
  doi: 10.1007/3-540-45608-2_1
– year: 1977
  ident: ref34
  article-title: Integrity Considerations for Secure Computer Systems
  publication-title: USAF Electronic Systems Division, Bedford, MA, ESD-TR-76-372
– ident: ref39
  doi: 10.1007/978-1-349-12020-8_1
– volume: 4
  start-page: 239
  issue: 2-3
  year: 1973
  ident: ref38
  article-title: Secure Computer Systems: A Mathematical Model
  publication-title: MITRE Corp., Bedford, MA, MTR-2547, vol. 2
– ident: ref127
  doi: 10.1007/3-540-49019-1_9
– volume: LNCS 2244
  start-page: 227
  volume-title: Proc. Andrei Ershov Int. Conf Perspectives System Informatics
  ident: ref90
  article-title: The impact of synchronization on secure information flow in concurrent programs
– ident: ref128
  doi: 10.1006/inco.2000.3020
– ident: ref87
  doi: 10.1109/CSFW.2001.930141
– ident: ref114
  doi: 10.1145/584091.584093
– start-page: 558
  volume-title: Proc. Nat. Computer Security Conf.
  ident: ref54
  article-title: A least fixed point approach to inter-procedural information flow control
– ident: ref83
  doi: 10.1109/CSFW.2000.856936
– ident: ref95
  doi: 10.1109/SECPRI.1995.398927
– ident: ref1
  doi: 10.1145/357401.357402
– ident: ref132
  doi: 10.1016/S0096-0551(02)00006-1
– ident: ref86
  doi: 10.1109/CSFW.1998.683153
– ident: ref144
  doi: 10.1007/3-540-45022-X_35
– volume: LNCS 1722
  start-page: 53
  volume-title: Proc. FLOPS
  ident: ref8
  article-title: Partial evaluation and noninterference for object calculi
– ident: ref64
  doi: 10.1007/BFb0014571
– ident: ref82
  doi: 10.1109/sp.1987.10009
– ident: ref55
  doi: 10.1007/BF03180570
– ident: ref134
  doi: 10.1109/LICS.1999.782639
– ident: ref28
  doi: 10.1145/319301.319345
– ident: ref31
  doi: 10.1145/335169.335201
– start-page: 525
  volume-title: Current Trends in Theoretical Computer Science
  year: 2000
  ident: ref126
  article-title: Security analysis using flow logics
– ident: ref42
  doi: 10.21236/ADB145741
SSID ssj0014482
Score 2.3827057
Snippet Current standard security practices do not provide substantial assurance that the end-to-end behavior of a computing system satisfies important security...
SourceID proquest
crossref
ieee
SourceType Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 5
SubjectTerms Access control
Assurance
Computer information security
Computer security
Concurrent computing
Cryptography
Data security
Encryption
Focusing
Information analysis
Information security
Information systems
Military computing
Policies
Protection
Security
Title Language-based information-flow security
URI https://ieeexplore.ieee.org/document/1159651
https://www.proquest.com/docview/884274123
https://www.proquest.com/docview/28325510
https://www.proquest.com/docview/901699511
Volume 21
WOSCitedRecordID wos000181030800002&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVIEE
  databaseName: IEEE Electronic Library (IEL)
  customDbUrl:
  eissn: 1558-0008
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0014482
  issn: 0733-8716
  databaseCode: RIE
  dateStart: 19830101
  isFulltext: true
  titleUrlDefault: https://ieeexplore.ieee.org/
  providerName: IEEE
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LSwMxEB5q8aAHX1Ws9bEHDwqmzT6zOZZiESlFUKG3Ja-CIF3ptvr3zWS3q-IDvO2SLBtmksyX-TIzAOfMYgoeKUk4F5JECWVEGuFbIEd1oqSgkXCBwiM2HqeTCb9rwFUdC2OMcZfPTBcfHZevc7VEV1nPoheeYLz0GmNJGatVMwb2mOEYAxaGBA8BK0qS8t7tfX_gLiN0UzTo_hcT5GqqfNuInXUZbv9vXDuwVaFIr1-qfRcaZrYHm59yC7bgYlR5IgkaKu1VGVJRD2T6nL95RVW5bh8eh9cPgxtSlUUgKoz9BUkixfxY6cBCnURSRVOmDWeSskBLC0_8VMRcKpXoWMfCAiym6DSWJrWv01SL8ACas3xmDsELhbItAsk5GjFmN2FKlZkimaiDSIZt6K0klakqZziWrnjO3NmB8gxli6Usg6yUbRsu6y9eynwZf_RtoSw_-pVibENnpYysWlBFlqYRJtoJ7JDO6la7EpDeEDOTL4sMiy5Z_Efb4P3Sg2PqGQsp_aOf_9yBDXdXz3lYjqG5mC_NCayr18VTMT918-0dYTzRzw
linkProvider IEEE
linkToHtml http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1ZSwMxEB6kCuqDt1jPffBBwbTZ3exm81iKxaMWwQq-LbkKQmmlh_59M9ltVTzAt12SZcNMkvkyX2YG4JQ7TCGYVkQIqQhLKSfKytABOWpSrSRl0gcKt3mnkz09ifsFuJjHwlhr_eUzW8NHz-WboZ6iq6zu0ItIMV56MWEsokW01pwzcAcNzxnwOCZ4DJiRklTUbx4aTX8doZahSQ-_GCFfVeXbVuztS2v9fyPbgLUSRwaNQvGbsGAHW7D6KbvgNpy1S18kQVNlgjJHKmqC9PrDt2Bc1q7bgcfWZbd5RcrCCETHSTghKdM8TLSJHNhJFdU048YKriiPjHIAJcxkIpTWqUlMIh3E4pr2EmUz99rLjIx3oTIYDuweBLHUrkUiPUcZ524bplTbHtKJJmIqrkJ9Jqlcl1nDsXhFP_enBypylC0Ws4zyQrZVOJ9_8VJkzPij7zbK8qNfIcYqHMyUkZdLapxnGcNUO5Eb0sm81a0FJDjkwA6n4xzLLjkESKsQ_NJDYPIZByrD_Z__fALLV927dt6-7twewIq_uef9LYdQmYym9giW9OvkeTw69nPvHXUx1RY
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Language-based+information-flow+security&rft.jtitle=IEEE+journal+on+selected+areas+in+communications&rft.au=Sabelfeld%2C+A&rft.au=Myers%2C+A+C&rft.date=2003-01-01&rft.issn=0733-8716&rft.volume=21&rft.issue=1&rft.spage=5&rft.epage=19&rft_id=info:doi/10.1109%2FJSAC.2002.806121&rft.externalDBID=NO_FULL_TEXT
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0733-8716&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0733-8716&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0733-8716&client=summon