@Article{JICS-1-67, author = {}, title = {Discretional Array Operations for Secure Information Flow}, journal = {Journal of Information and Computing Science}, year = {2006}, volume = {1}, number = {2}, pages = {67--77}, abstract = { Arrays  exist  in  many  nontrivial  programs.  Array  operations  can  cause  subtle  information  leaks. This  paper  allows  array  as  first-class  value  and  regards  discretional  array  as  array  of  array  by  alias  array. 2τ   is  the Arrays  are  given  types  of  the  form security  class  of  the  array's  alias.  To  distinguish  array  from  its  alias,  we  propose  a  novel  binary  memory model [ }, issn = {3080-180X}, doi = {https://doi.org/}, url = {http://global-sci.org/intro/article_detail/jics/22845.html} }