CONTROLLING INFORMATION FLOWS DURING SOFTWARE DEVELOPMENT
S. Chou. International Journal of Security, Privacy and Trust Management ( IJSPTM ), 5 (3):
1-7(August 2016)
DOI: 10.5121/ijsptm.2016.5301
Abstract
Information flow control (IFC) is useful in preventing information leakage during software execution. Our survey reveals that no IFC model is applied on the entire software development process
%0 Journal Article
%1 noauthororeditor
%A Chou, Shih-Chien
%D 2016
%J International Journal of Security, Privacy and Trust Management ( IJSPTM )
%K Software security
%N 3
%P 1-7
%R 10.5121/ijsptm.2016.5301
%T CONTROLLING INFORMATION FLOWS DURING SOFTWARE DEVELOPMENT
%U http://aircconline.com/ijsptm/V5N3/5316ijsptm01.pdf
%V 5
%X Information flow control (IFC) is useful in preventing information leakage during software execution. Our survey reveals that no IFC model is applied on the entire software development process
@article{noauthororeditor,
abstract = {Information flow control (IFC) is useful in preventing information leakage during software execution. Our survey reveals that no IFC model is applied on the entire software development process},
added-at = {2018-04-05T06:48:32.000+0200},
author = {Chou, Shih-Chien},
biburl = {https://www.bibsonomy.org/bibtex/26c27450f78370c8ffbba803555e98998/nagaprakash123},
doi = {10.5121/ijsptm.2016.5301},
interhash = {37dd2bd418a2398ff0c2b73f93541d6d},
intrahash = {6c27450f78370c8ffbba803555e98998},
issn = {ISSN 2277 - 5498 [Online]; 2319 - 4103 [Print]},
journal = {International Journal of Security, Privacy and Trust Management ( IJSPTM )},
keywords = {Software security},
language = {English},
month = {August},
number = 3,
pages = {1-7},
timestamp = {2018-04-05T06:48:32.000+0200},
title = {CONTROLLING INFORMATION FLOWS DURING SOFTWARE DEVELOPMENT},
url = {http://aircconline.com/ijsptm/V5N3/5316ijsptm01.pdf},
volume = 5,
year = 2016
}