Abstract

The present column is dedicated to non-interference , a fundamental security property that is used in the literature to reason about information flow in a variety of different settings, such as imperative languages, Java bytecode, JavaScript, web applications, mobile applications, and interactive systems, just to name a few. This property can be enforced using several program verification techniques, such as run-time monitoring and static analysis. Among these, type systems are perhaps the most popular approach.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.