Security type system

In computer science, a type system can be described as a syntactic framework which contains a set of rules that are used to assign a type property… (More)
Wikipedia

Topic mentions per year

Topic mentions per year

2000-2017
02420002017

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
The paper “Compositional Verification and Refinement of Concurrent Value-Dependent Noninterference” by Murray et. al. [MSPR16… (More)
Is this relevant?
2013
2013
Type systems for information-flow control (IFC) are often inflexible and too conservative. On the other hand, dynamic run-time… (More)
  • figure 3
  • figure 5
  • figure 6
  • figure 11
Is this relevant?
Highly Cited
2010
Highly Cited
2010
Anecdotal evidence suggests that most “theorems” initially given to an interactive theorem prover do not hold, typically because… (More)
  • figure 1
Is this relevant?
2010
2010
The move toward publically available services that store private information has increased the importance of tracking information… (More)
  • figure 1
  • figure 11
Is this relevant?
2006
2006
Type systems and program logics are often conceived to be at opposing ends of the spectrum of formal software analyses. In this… (More)
  • figure 1
  • figure 2
  • figure 5
  • figure 4
Is this relevant?
Highly Cited
2006
Highly Cited
2006
Non-interference is typically used as a baseline security policy to formalize confidentiality of secret information manipulated… (More)
  • figure 2
  • figure 3
  • table 1
  • figure 4
Is this relevant?
Highly Cited
2005
Highly Cited
2005
Access control mechanisms are often used with the intent of enforcing confidentiality and integrity policies, but few rigorous… (More)
  • figure 1
  • figure 2
Is this relevant?
Highly Cited
2004
Highly Cited
2004
A long-standing problem in information security is how to specify and enforce expressive security policies that control… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2004
2004
Initiating from the seminal work of Volpano and Smith, there has been ample evidence that type systems may be used to enforce… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2003
2003
Language-based approaches to information security have led to the development of security type systems that permit the programmer… (More)
  • figure 2
Is this relevant?