Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Declassification

Known as: Declassified documents, Declassify 
Declassification is the process of documents that used to be classified as secret ceasing to be so restricted, often under the principle of freedom… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2014
2014
We propose a novel mechanism for enforcing information flow policies with support for declassification on event-driven programs… Expand
  • figure 1
  • figure 2
Is this relevant?
Highly Cited
2009
Highly Cited
2009
Computing systems often deliberately release (or declassify) sensitive information. A principal security concern for systems… Expand
Is this relevant?
Highly Cited
2008
Highly Cited
2008
Current tools for analysing information flow in programs build upon ideas going back to Denning's work from the 70's. These… Expand
  • figure 1
  • figure 3
  • figure 4
Is this relevant?
Highly Cited
2007
Highly Cited
2007
Information security has a challenge to address: enabling information-flow controls with expressive information release (or… Expand
  • figure 2
  • figure 3
  • figure 6
  • figure 7
  • figure 9
Is this relevant?
Highly Cited
2006
Highly Cited
2006
Noninterference requires that there is no information flow from sensitive to public data in a given system. However, many systems… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2006
Highly Cited
2006
This paper shows that classified boards destroy value by entrenching management and reducing director effectiveness. First, I… Expand
Is this relevant?
Highly Cited
2005
Highly Cited
2005
Computing systems often deliberately release (or declassify) sensitive information. A principal security concern for systems… Expand
  • figure 1
Is this relevant?
Highly Cited
2004
Highly Cited
2004
Traditional noninterference cannot cope with common features of secure systems like channel control, information filtering, or… Expand
Is this relevant?
Highly Cited
2001
Highly Cited
2001
Abstract: Security properties based on information flow, such as noninterference, provide strong guarantees that confidentiality… Expand
Is this relevant?
Highly Cited
1992
Highly Cited
1992
Abstract : This report presents guidelines for defining, recording, and reporting two frequently used measures of software size… Expand
  • figure 4-10
  • figure 8-3
  • figure 2-1
  • figure 2-2
  • figure 2-3
Is this relevant?