@Article{JICS-1-67, author = {}, title = {Discretional Array Operations for Secure Information Flow}, journal = {Journal of Information and Computing Science}, year = {2024}, volume = {1}, number = {2}, pages = {67--77}, abstract = { Arrays exist in many nontrivial programs. Array operations can cause subtle information leaks. This paper allows array as first-class value and regards discretional array as array of array by alias array. 2τ is the Arrays are given types of the form security class of the array's alias. To distinguish array from its alias, we propose a novel binary memory model [ }, issn = {1746-7659}, doi = {https://doi.org/}, url = {http://global-sci.org/intro/article_detail/jics/22845.html} }