Role-Based Access Control Models
Computer
Exception-based information flow control in object-oriented systems
ACM Transactions on Information and System Security (TISSEC)
Protecting privacy using the decentralized label model
ACM Transactions on Software Engineering and Methodology (TOSEM)
Information Flow Control in Object-Oriented Systems
IEEE Transactions on Knowledge and Data Engineering
Information Flow Control in Role-Based Model for Distributed Objects
ICPADS '01 Proceedings of the Eighth International Conference on Parallel and Distributed Systems
An information flow control model for C applications based on access control lists
Journal of Systems and Software
Language-based information-flow security
IEEE Journal on Selected Areas in Communications
Hi-index | 0.00 |
When an application is being executed, users can read the application's output. If sensitive information is managed by an application, information should be prevented from being leaked to unauthorized users during application execution. The prevention can be achieved through information flow control. Since the procedural C language is still in use heavily, we developed a model based on role-based access control (RBAC) for C applications. This paper describes the model.