Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Security type system

In computer science, a type system can be described as a syntactic framework which contains a set of rules that are used to assign a type property… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
This paper presents HyperFlow, a processor that enforces secure information flow, including control over timing channels. The… Expand
  • table 1
  • table 2
  • figure 3
  • table 3
  • table 4
Is this relevant?
2016
2016
The paper “Compositional Verification and Refinement of Concurrent Value-Dependent Noninterference” by Murray et. al. [MSPR16… Expand
Is this relevant?
2013
2013
Type systems for information-flow control (IFC) are often inflexible and too conservative. On the other hand, dynamic run-time… Expand
  • figure 3
  • figure 5
  • figure 6
  • figure 11
Is this relevant?
2013
2013
We show how security type systems from the literature of language-based noninterference can be represented more directly as… Expand
Is this relevant?
2008
2008
Type systems and program logics are often conceived to be at opposing ends of the spectrum of formal software analyses. In this… Expand
  • figure 1
  • figure 2
  • figure 4
  • figure 5
  • figure 7
Is this relevant?
2005
2005
Information flow analysis can be used to explore and protect the confidentiality and integrity of information, which is one… Expand
  • figure 4
  • figure 6
  • figure 8
  • figure 9
  • figure 10
Is this relevant?
Highly Cited
2004
Highly Cited
2004
A long-standing problem in information security is how to specify and enforce expressive security policies that control… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2004
2004
Initiating from the seminal work of Volpano and Smith, there has been ample evidence that type systems may be used to enforce… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2003
2003
Language-based approaches to information security have led to the development of security type systems that permit the programmer… Expand
  • figure 2
Is this relevant?
Highly Cited
2000
Highly Cited
2000
A number of security systems for programming languages have recently appeared, including systems for enforcing some form of… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?