We provide a formal definition of information flows in XML transformations and, more generally, in the presence of type driven computations and describe a sound technique to detect transformations that may leak private or confidential information. We also outline a general framework to check middleware-located information flows. © Springer-Verlag Berlin Heidelberg 2003.
CITATION STYLE
Benzaken, V., Burelle, M., & Castagna, G. (2003). Information flow security for XML transformations. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2896, 33–53. https://doi.org/10.1007/978-3-540-40965-6_4
Mendeley helps you to discover research relevant for your work.