Secure Information Flow Based on Data Flow Analysis
Cited by
Export citation
- BibTex
- RIS
- TXT
@Article{JICS-2-252,
author = {},
title = {Secure Information Flow Based on Data Flow Analysis},
journal = {Journal of Information and Computing Science},
year = {2024},
volume = {2},
number = {4},
pages = {252--260},
abstract = { The static analysis of secure information flow has been studied for many years. The existing
methods tend to be overly conservative or to be overly attention to location information leak. This paper uses
data flow analysis to deal with secure information flow. Two variables of dynamic update security levels
were introduced. The program is secure without any variable of downgrade security level at exit of a program.
The analysis can deal with more secure programs. The soundness of the analysis is proved.
},
issn = {1746-7659},
doi = {https://doi.org/},
url = {http://global-sci.org/intro/article_detail/jics/22787.html}
}
TY - JOUR
T1 - Secure Information Flow Based on Data Flow Analysis
AU -
JO - Journal of Information and Computing Science
VL - 4
SP - 252
EP - 260
PY - 2024
DA - 2024/01
SN - 2
DO - http://doi.org/
UR - https://global-sci.org/intro/article_detail/jics/22787.html
KW - secure information flow, data flow analysis, static analysis, formal semantics
AB - The static analysis of secure information flow has been studied for many years. The existing
methods tend to be overly conservative or to be overly attention to location information leak. This paper uses
data flow analysis to deal with secure information flow. Two variables of dynamic update security levels
were introduced. The program is secure without any variable of downgrade security level at exit of a program.
The analysis can deal with more secure programs. The soundness of the analysis is proved.
. (2024). Secure Information Flow Based on Data Flow Analysis.
Journal of Information and Computing Science. 2 (4).
252-260.
doi:
Copy to clipboard