Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,206,855 papers from all fields of science
Search
Sign In
Create Free Account
Security type system
In computer science, a type system can be described as a syntactic framework which contains a set of rules that are used to assign a type property…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
7 relations
Computer science
Hasse diagram
Information flow
Language-based security
Expand
Broader (1)
Computer security
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
SPASCA: Secure-Programming Assistant and Side-Channel Analyzer
Ximeng Li
,
H. Mantel
,
Johannes Schickel
,
Markus Tasch
,
Alexandra Weber
,
I. Toteva
2017
Corpus ID: 196047166
Information leakage in computer systems can be clustered in different classes of information leakage. Two examples of such…
Expand
2016
2016
A Dependent Security Type System for Concurrent Imperative Programs
Toby C. Murray
,
Robert Sison
,
Edward Pierzchalski
,
C. Rizkallah
Arch. Formal Proofs
2016
Corpus ID: 46010324
The paper “Compositional Verification and Refinement of Concurrent Value-Dependent Noninterference” by Murray et. al. [MSPR16…
Expand
2015
2015
Deriving a Simple Gradual Security Language
Ronald Garcia
,
Éric Tanter
arXiv.org
2015
Corpus ID: 15646813
Abstracting Gradual Typing (AGT) is an approach to systematically deriving gradual counterparts to static type disciplines. The…
Expand
2014
2014
Information Flow Analysis Based on Program Simplification
Ran Ji
,
Reiner Hähnle
2014
Corpus ID: 56026131
. Deductive verification is a popular approach to language-based information flow analysis, however, the existing methods need non…
Expand
2013
2013
Security Type Systems as Recursive Predicates
A. Popescu
arXiv.org
2013
Corpus ID: 1811686
We show how security type systems from the literature of language-based noninterference can be represented more directly as…
Expand
2013
2013
On Information Flow Control in Event-B and Refinement
C. Mu
International Symposium on Theoretical Aspects of…
2013
Corpus ID: 1126189
This paper investigates the problem of preserving information flow security in Event-B specification models and during the…
Expand
2013
2013
Compositional and Scheduler-Independent information flow security
Henning Sudbrock
2013
Corpus ID: 35999720
Software pervades our society deeper with every year. This trend makes software security more and more important. For instance…
Expand
2009
2009
Securing interaction between threads and the scheduler in the presence of synchronization
Alejandro Russo
,
A. Sabelfeld
J. Log. Algebraic Methods Program.
2009
Corpus ID: 11194761
2008
2008
Security by logic : characterizing Non-Interference in temporal logic
Henri-Charles Blondeel
2008
Corpus ID: 18725515
The information security community has still not reached consensus on how the notion of Non-Interference can be expressed for…
Expand
2007
2007
Information Flow Testing The Third Path towards Confidentiality Guarantee
Gurvan Le Guernic
2007
Corpus ID: 15404384
. Noninterference, which is an information flow property, is typically used as a baseline security policy to formalize con…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE