Proceedings of the 6th ACM SIGACT-SIGPLAN Symposium on Principles of Programming Languages - POPL '79 1979
DOI: 10.1145/567752.567779
|View full text |Cite
|
Sign up to set email alerts
|

Certifying information flow properties of programs

Abstract: Interesting program properties other than func-

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
9
0

Year Published

1984
1984
2014
2014

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 9 publications
(9 citation statements)
references
References 8 publications
0
9
0
Order By: Relevance
“…There exists quite a large body of literature studying different instances of secure information flow, e.g., [3,4,5,7,10,11,12,13,14,15,16]. With the notable exception of [15,16], security is defined through noninterference, i.e., it is required that the public outputs of the program do not contain any information (in the information-theoretic sense) about the confidential inputs.…”
Section: Introductionmentioning
confidence: 99%
“…There exists quite a large body of literature studying different instances of secure information flow, e.g., [3,4,5,7,10,11,12,13,14,15,16]. With the notable exception of [15,16], security is defined through noninterference, i.e., it is required that the public outputs of the program do not contain any information (in the information-theoretic sense) about the confidential inputs.…”
Section: Introductionmentioning
confidence: 99%
“…Information Flow Security for Concurrent Programs: To our knowledge, the first approach to information flow analysis for concurrent programs is proposed by Andrews and Reitman [7], [44]. It considers a flow logic that supports the derivation of noninterference proofs for programs.…”
Section: Related Workmentioning
confidence: 99%
“…Their work initiated a long line of research on noninterference-like properties, culminating in frameworks for comparing and engineering such security properties (see, e.g., [4], [5], [6]). Even earlier, Reitman and Andrews proposed an information flow analysis for concurrent programs [7], but they did not yet provide a soundness proof or precise claim about which security property their analysis enforces. These shortcomings were overcome 17 years later by Volpano and Smith [8].…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations