Discretional Array Operations for Secure Information Flow
Cited by
Export citation
- BibTex
- RIS
- TXT
@Article{JICS-1-67,
author = {},
title = {Discretional Array Operations for Secure Information Flow},
journal = {Journal of Information and Computing Science},
year = {2024},
volume = {1},
number = {2},
pages = {67--77},
abstract = { Arrays exist in many nontrivial programs. Array operations can cause subtle information leaks.
This paper allows array as first-class value and regards discretional array as array of array by alias array.
2τ is the
Arrays are given types of the form
security class of the array's alias. To distinguish array from its alias, we propose a novel binary memory
model [
},
issn = {1746-7659},
doi = {https://doi.org/},
url = {http://global-sci.org/intro/article_detail/jics/22845.html}
}
TY - JOUR
T1 - Discretional Array Operations for Secure Information Flow
AU -
JO - Journal of Information and Computing Science
VL - 2
SP - 67
EP - 77
PY - 2024
DA - 2024/01
SN - 1
DO - http://doi.org/
UR - https://global-sci.org/intro/article_detail/jics/22845.html
KW - alias array, discretional array , secure information flow, type system.
AB - Arrays exist in many nontrivial programs. Array operations can cause subtle information leaks.
This paper allows array as first-class value and regards discretional array as array of array by alias array.
2τ is the
Arrays are given types of the form
security class of the array's alias. To distinguish array from its alias, we propose a novel binary memory
model [
. (2024). Discretional Array Operations for Secure Information Flow.
Journal of Information and Computing Science. 1 (2).
67-77.
doi:
Copy to clipboard