Show simple item record

dc.contributor.authorIrvine, Cynthia E.
dc.contributor.authorVolpano, Dennis
dc.date.accessioned2012-07-11T15:49:40Z
dc.date.available2012-07-11T15:49:40Z
dc.date.issued1995-12-00
dc.identifier.citationProceedings of the 11th Annual Computer Security Applications Conference, New Orleans, LA, pp. 190-195, December 1995
dc.identifier.urihttps://hdl.handle.net/10945/7178
dc.description.abstractWe introduce a tool we are developing that will allow designers of trusted applications to isolate those portions of a system where an information flow policy is being violated. The tool is a language-sensitive editor that checks a program for policy violations incrementally as the program is developed. What is novel about our approach is that the checking occurs as a form of type checking.en_US
dc.publisherProceedings of the 11th Annual Computer Security Applications Conferenceen_US
dc.rightsThis publication is a work of the U.S. Government as defined in Title 17, United States Code, Section 101. Copyright protection is not available for this work in the United States.en_US
dc.titleA Practical Tool for Developing Trusted Applicationsen_US
dc.typeArticleen_US
dc.contributor.departmentComputer Science (CS)
dc.description.distributionstatementApproved for public release; distribution is unlimited.


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record