arrow
Volume 1, Issue 2
Discretional Array Operations for Secure Information Flow

J. Info. Comput. Sci. , 1 (2006), pp. 67-77.

[An open-access article; the PDF is free to any online user.]

Export citation
  • Abstract
Arrays  exist  in  many  nontrivial  programs.  Array  operations  can  cause  subtle  information  leaks. This  paper  allows  array  as  first-class  value  and  regards  discretional  array  as  array  of  array  by  alias  array. 2τ   is  the Arrays  are  given  types  of  the  form security  class  of  the  array's  alias.  To  distinguish  array  from  its  alias,  we  propose  a  novel  binary  memory model [
  • Keywords

  • AMS Subject Headings

  • Copyright

COPYRIGHT: © Global Science Press

  • Email address
  • BibTex
  • RIS
  • TXT
@Article{JICS-1-67, author = {}, title = {Discretional Array Operations for Secure Information Flow}, journal = {Journal of Information and Computing Science}, year = {2006}, volume = {1}, number = {2}, pages = {67--77}, abstract = { Arrays  exist  in  many  nontrivial  programs.  Array  operations  can  cause  subtle  information  leaks. This  paper  allows  array  as  first-class  value  and  regards  discretional  array  as  array  of  array  by  alias  array. 2τ   is  the Arrays  are  given  types  of  the  form security  class  of  the  array's  alias.  To  distinguish  array  from  its  alias,  we  propose  a  novel  binary  memory model [ }, issn = {3080-180X}, doi = {https://doi.org/}, url = {http://global-sci.org/intro/article_detail/jics/22845.html} }
TY - JOUR T1 - Discretional Array Operations for Secure Information Flow AU - JO - Journal of Information and Computing Science VL - 2 SP - 67 EP - 77 PY - 2006 DA - 2006/04 SN - 1 DO - http://doi.org/ UR - https://global-sci.org/intro/article_detail/jics/22845.html KW - AB - Arrays  exist  in  many  nontrivial  programs.  Array  operations  can  cause  subtle  information  leaks. This  paper  allows  array  as  first-class  value  and  regards  discretional  array  as  array  of  array  by  alias  array. 2τ   is  the Arrays  are  given  types  of  the  form security  class  of  the  array's  alias.  To  distinguish  array  from  its  alias,  we  propose  a  novel  binary  memory model [
. (2006). Discretional Array Operations for Secure Information Flow. Journal of Information and Computing Science. 1 (2). 67-77. doi:
Copy to clipboard
The citation has been copied to your clipboard