skip to main content
research-article

Security & privacy column

Published:09 February 2017Publication History
Skip Abstract Section

Abstract

The present column is dedicated to non-interference, a fundamental security property that is used in the literature to reason about information flow in a variety of different settings, such as imperative languages, Java bytecode, JavaScript, web applications, mobile applications, and interactive systems, just to name a few. This property can be enforced using several program verification techniques, such as run-time monitoring and static analysis. Among these, type systems are perhaps the most popular approach.

Recommendations

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in

Full Access

  • Published in

    cover image ACM SIGLOG News
    ACM SIGLOG News  Volume 4, Issue 1
    January 2017
    61 pages
    EISSN:2372-3491
    DOI:10.1145/3051528
    Issue’s Table of Contents

    Copyright © 2017 Author

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    • Published: 9 February 2017

    Check for updates

    Qualifiers

    • research-article
  • Article Metrics

    • Downloads (Last 12 months)0
    • Downloads (Last 6 weeks)0

    Other Metrics