arrow
Volume 1, Issue 2
Discretional Array Operations for Secure Information Flow

J. Info. Comput. Sci. , 1 (2006), pp. 67-77.

Export citation
  • Abstract
Arrays exist in many nontrivial programs. Array operations can cause subtle information leaks. This paper allows array as first-class value and regards discretional array as array of array by alias array. 2τ is the Arrays are given types of the form security class of the array's alias. To distinguish array from its alias, we propose a novel binary memory model [
  • AMS Subject Headings

  • Copyright

COPYRIGHT: © Global Science Press

  • Email address
  • BibTex
  • RIS
  • TXT
@Article{JICS-1-67, author = {}, title = {Discretional Array Operations for Secure Information Flow}, journal = {Journal of Information and Computing Science}, year = {2024}, volume = {1}, number = {2}, pages = {67--77}, abstract = { Arrays exist in many nontrivial programs. Array operations can cause subtle information leaks. This paper allows array as first-class value and regards discretional array as array of array by alias array. 2τ is the Arrays are given types of the form security class of the array's alias. To distinguish array from its alias, we propose a novel binary memory model [ }, issn = {1746-7659}, doi = {https://doi.org/}, url = {http://global-sci.org/intro/article_detail/jics/22845.html} }
TY - JOUR T1 - Discretional Array Operations for Secure Information Flow AU - JO - Journal of Information and Computing Science VL - 2 SP - 67 EP - 77 PY - 2024 DA - 2024/01 SN - 1 DO - http://doi.org/ UR - https://global-sci.org/intro/article_detail/jics/22845.html KW - alias array, discretional array , secure information flow, type system. AB - Arrays exist in many nontrivial programs. Array operations can cause subtle information leaks. This paper allows array as first-class value and regards discretional array as array of array by alias array. 2τ is the Arrays are given types of the form security class of the array's alias. To distinguish array from its alias, we propose a novel binary memory model [
. (2024). Discretional Array Operations for Secure Information Flow. Journal of Information and Computing Science. 1 (2). 67-77. doi:
Copy to clipboard
The citation has been copied to your clipboard