Language-based information-flow security

Current standard security practices do not provide substantial assurance that the end-to-end behavior of a computing system satisfies important security policies such as confidentiality. An end-to-end confidentiality policy might assert that secret input data cannot be inferred by an attacker throug...

Full description

Saved in:
Bibliographic Details
Published in:IEEE journal on selected areas in communications Vol. 21; no. 1; pp. 5 - 19
Main Authors: Sabelfeld, A., Myers, A.C.
Format: Journal Article
Language:English
Published: New York IEEE 01.01.2003
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Subjects:
ISSN:0733-8716, 1558-0008
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Be the first to leave a comment!
You must be logged in first