Abstract

The present column is dedicated to non-interference , a fundamental security property that is used in the literature to reason about information flow in a variety of different settings, such as imperative languages, Java bytecode, JavaScript, web applications, mobile applications, and interactive systems, just to name a few. This property can be enforced using several program verification techniques, such as run-time monitoring and static analysis. Among these, type systems are perhaps the most popular approach.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call