arrow
Volume 2, Issue 4
Secure Information Flow Based on Data Flow Analysis

J. Info. Comput. Sci. , 2 (2007), pp. 252-260.

Export citation
  • Abstract
The static analysis of secure information flow has been studied for many years. The existing methods tend to be overly conservative or to be overly attention to location information leak. This paper uses data flow analysis to deal with secure information flow. Two variables of dynamic update security levels were introduced. The program is secure without any variable of downgrade security level at exit of a program. The analysis can deal with more secure programs. The soundness of the analysis is proved.
  • AMS Subject Headings

  • Copyright

COPYRIGHT: © Global Science Press

  • Email address
  • BibTex
  • RIS
  • TXT
@Article{JICS-2-252, author = {}, title = {Secure Information Flow Based on Data Flow Analysis}, journal = {Journal of Information and Computing Science}, year = {2024}, volume = {2}, number = {4}, pages = {252--260}, abstract = { The static analysis of secure information flow has been studied for many years. The existing methods tend to be overly conservative or to be overly attention to location information leak. This paper uses data flow analysis to deal with secure information flow. Two variables of dynamic update security levels were introduced. The program is secure without any variable of downgrade security level at exit of a program. The analysis can deal with more secure programs. The soundness of the analysis is proved. }, issn = {1746-7659}, doi = {https://doi.org/}, url = {http://global-sci.org/intro/article_detail/jics/22787.html} }
TY - JOUR T1 - Secure Information Flow Based on Data Flow Analysis AU - JO - Journal of Information and Computing Science VL - 4 SP - 252 EP - 260 PY - 2024 DA - 2024/01 SN - 2 DO - http://doi.org/ UR - https://global-sci.org/intro/article_detail/jics/22787.html KW - secure information flow, data flow analysis, static analysis, formal semantics AB - The static analysis of secure information flow has been studied for many years. The existing methods tend to be overly conservative or to be overly attention to location information leak. This paper uses data flow analysis to deal with secure information flow. Two variables of dynamic update security levels were introduced. The program is secure without any variable of downgrade security level at exit of a program. The analysis can deal with more secure programs. The soundness of the analysis is proved.
. (2024). Secure Information Flow Based on Data Flow Analysis. Journal of Information and Computing Science. 2 (4). 252-260. doi:
Copy to clipboard
The citation has been copied to your clipboard