References
- Abadi and A. D. Gordon., "A calculus for cryptographic protocols:The Spi calculus," Inform. Comput., Vol. 148, No. 1, Jan 1999, pp. 1-70. https://doi.org/10.1006/inco.1998.2740
- A. C. Myers., "JFlow:Practical mostlystatic information flow control," in Proc. ACM Symp, Principles Programming Languages, Jan 1999, pp. 228-241.
- A. C. Myers., and B. Liskov, "A decentralized model for information flow control," in Proc. ACM Symp. Operating System Principles, Oct. 1997, pp. 129-142.
- A. Sabelfeld and A. C. Myers, "Language-Based Information-Flow Security," IEEE Journal on Selected Areas in Communications, 21, 2003, pp. 5-19. https://doi.org/10.1109/JSAC.2002.806121
- Clark, C. Hankin., and S. Hunt, "Information flow for algol-like languages," J. Comput. Languages, 2002.
- D. E. Denning., and P. J. Denning, "Certification of programs for secure information flow," Commun. ACM, July 1977, Vol. 20, No. 7, pp. 504-513. https://doi.org/10.1145/359636.359712
- D. F. Ferraiolo., D. R. Kuhn., and R. Chandramouli, "Role-Based Access Control", Artech House, 2003.
- Eunyoung Lee, "Programming Language-based Information Flow Security," KIISC Review, Vol. 16, No. 5, 2006, pp. 35-44.
- G. V. Posta., and A. Kagan, "Evaluating information security tradeoffs:Restricting access can interfere with user tasks," Computersand Security, Vol. 26, No. 3, May 2007, pp. 229-237. https://doi.org/10.1016/j.cose.2006.10.004
- L. Zheng and A. C. Myers, "Dynamic security labels and noninterference," In Proc. 2nd Workshop on Formal Aspects in Security and Trust, IFIP TC1 WG1.7. Springer, Aug. 2004.
- N. Heintze and J. G. Riecke, "The SLam calculus:Programming with secrecy and integrity," in Proc. ACM Symp, Principles Programming Languages, Jan 1998, pp. 365-377.
- N. Vachharajani., M. J. Bridges., J. Chang., R. Rangan., G. Ottoni., J. A. Blome., G. A. Reis., M. Vachharajani., and D. I. August., "Rifle:An architectural framework for user-centric information-flow security," In 37th International Symposium on Microarchitecture, December 2004.
- R. S. Sandhu., E. J. Coyne., H. L. Feinstein., and C. E. Youman., "Role-Based Access Control Models," Computer, Vol. 29 No. 2, February 1996, pp. 38-47. https://doi.org/10.1109/2.485845
- Seungcheol Shin, "Analyzing Methods for Information Flow Security," KIISC Review, Vol. 16, No. 5, 2006, pp. 55-64.
- S. Tse and S. Zdancewic, "Run-time Principals inInformation-flow Type Systems," In Proc. IEEE Symposium on Security and Privacy, 2004.
- S. Zdancewic., and A. C. Myers., "Robust declassification," in Proc. IEEE Computer Security Foundations Workshop, June 2001, pp. 15-23.
- S. Zdancewic, "Challenges for information-flow security," In Proc. Programming Language Interference and Dependence (PLID), August 2004.
- U. S. Department of Defense, "Department of Defense Trusted Computer System Evaluation Criteria," DOD 5200.28-STD, National Computer Security Center, 1985.
- http://cristal.inria.fr/~simonet/soft/flowcaml/.
- http://www.cs.cornell.edu/jif/.