Information-flow and data-flow analysis of while-programs
Until recently, information-flow analysis has been used primarily to verify that information transmission between program variables cannot violate security requirements. Here, the notion of information flow is explored as an aid to program development and validation. Information-flow relations are p...
Gespeichert in:
Veröffentlicht in: | ACM transactions on programming languages and systems 1985-01, Vol.7 (1), p.37-61 |
---|---|
Hauptverfasser: | , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 61 |
---|---|
container_issue | 1 |
container_start_page | 37 |
container_title | ACM transactions on programming languages and systems |
container_volume | 7 |
creator | Bergeretti, Jean-Francois Carré, Bernard A. |
description | Until recently, information-flow analysis has been used primarily to verify that information transmission between program variables cannot violate security requirements. Here, the notion of information flow is explored as an aid to program development and validation. Information-flow relations are presented for while-programs, which identify those program statements whose execution may cause information to be transmitted from or to particular input, internal, or output values. It is shown with examples how these flow relations can be helpful in writing, testing, and updating programs; they also usefully extend the class of errors which can be detected automatically in the "static analysis" of a program. |
doi_str_mv | 10.1145/2363.2366 |
format | Article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_miscellaneous_28956101</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>28956101</sourcerecordid><originalsourceid>FETCH-LOGICAL-a371t-4b22126d3fe9774360c0071e1926bf8cf12afeac577f6e31b9a17da608a790e13</originalsourceid><addsrcrecordid>eNqNkM1LAzEQxYMoWKsHT173IIKH1Eyy-TpK8QsKXvS8TLOJruxHTbaU_vfu2tqzlzcM85v34BFyCWwGkMs7LpSYDaKOyASkNDSXVhyTCQOVU2a5PCVnKX0xxsBIMyH2pQ1dbLCvupaGuttk2JZZiT3-bVhvU5WyLmSbz6r2dBW7j4hNOicnAevkL_ZzSt4fH97mz3Tx-vQyv19QFBp6mi85B65KEbzVOheKOcY0eLBcLYNxATgGj05qHZQXsLQIukTFDGrLPIgpudn5DsHfa5_6oqmS83WNre_WqeDGSgXsH2CuFNdGDuDtDnSxSyn6UKxi1WDcFsCKscVibHEUNbDXe1NMDusQsXVVOjyYnHFhRuxqh6FrDsdfgx9DV3cu</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>24662785</pqid></control><display><type>article</type><title>Information-flow and data-flow analysis of while-programs</title><source>ACM Digital Library Complete</source><creator>Bergeretti, Jean-Francois ; Carré, Bernard A.</creator><creatorcontrib>Bergeretti, Jean-Francois ; Carré, Bernard A.</creatorcontrib><description>Until recently, information-flow analysis has been used primarily to verify that information transmission between program variables cannot violate security requirements. Here, the notion of information flow is explored as an aid to program development and validation. Information-flow relations are presented for while-programs, which identify those program statements whose execution may cause information to be transmitted from or to particular input, internal, or output values. It is shown with examples how these flow relations can be helpful in writing, testing, and updating programs; they also usefully extend the class of errors which can be detected automatically in the "static analysis" of a program.</description><identifier>ISSN: 0164-0925</identifier><identifier>EISSN: 1558-4593</identifier><identifier>DOI: 10.1145/2363.2366</identifier><identifier>CODEN: ATPSDT</identifier><language>eng</language><publisher>New York, NY, USA: ACM</publisher><subject>Applied sciences ; Assertion checking ; Assertions ; Computer science; control theory; systems ; Designing software ; Development frameworks and environments ; Exact sciences and technology ; Functional verification ; Hardware ; Hardware validation ; Information systems ; Information systems applications ; Program reasoning ; Semantics and reasoning ; Software ; Software and its engineering ; Software creation and management ; Software defect analysis ; Software design techniques ; Software development process management ; Software engineering ; Software implementation planning ; Software notations and tools ; Software testing and debugging ; Software verification and validation ; Theory of computation</subject><ispartof>ACM transactions on programming languages and systems, 1985-01, Vol.7 (1), p.37-61</ispartof><rights>ACM</rights><rights>1986 INIST-CNRS</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-a371t-4b22126d3fe9774360c0071e1926bf8cf12afeac577f6e31b9a17da608a790e13</citedby><cites>FETCH-LOGICAL-a371t-4b22126d3fe9774360c0071e1926bf8cf12afeac577f6e31b9a17da608a790e13</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://dl.acm.org/doi/pdf/10.1145/2363.2366$$EPDF$$P50$$Gacm$$H</linktopdf><link.rule.ids>314,776,780,2276,27901,27902,40172,75971</link.rule.ids><backlink>$$Uhttp://pascal-francis.inist.fr/vibad/index.php?action=getRecordDetail&idt=8402386$$DView record in Pascal Francis$$Hfree_for_read</backlink></links><search><creatorcontrib>Bergeretti, Jean-Francois</creatorcontrib><creatorcontrib>Carré, Bernard A.</creatorcontrib><title>Information-flow and data-flow analysis of while-programs</title><title>ACM transactions on programming languages and systems</title><addtitle>ACM TOPLAS</addtitle><description>Until recently, information-flow analysis has been used primarily to verify that information transmission between program variables cannot violate security requirements. Here, the notion of information flow is explored as an aid to program development and validation. Information-flow relations are presented for while-programs, which identify those program statements whose execution may cause information to be transmitted from or to particular input, internal, or output values. It is shown with examples how these flow relations can be helpful in writing, testing, and updating programs; they also usefully extend the class of errors which can be detected automatically in the "static analysis" of a program.</description><subject>Applied sciences</subject><subject>Assertion checking</subject><subject>Assertions</subject><subject>Computer science; control theory; systems</subject><subject>Designing software</subject><subject>Development frameworks and environments</subject><subject>Exact sciences and technology</subject><subject>Functional verification</subject><subject>Hardware</subject><subject>Hardware validation</subject><subject>Information systems</subject><subject>Information systems applications</subject><subject>Program reasoning</subject><subject>Semantics and reasoning</subject><subject>Software</subject><subject>Software and its engineering</subject><subject>Software creation and management</subject><subject>Software defect analysis</subject><subject>Software design techniques</subject><subject>Software development process management</subject><subject>Software engineering</subject><subject>Software implementation planning</subject><subject>Software notations and tools</subject><subject>Software testing and debugging</subject><subject>Software verification and validation</subject><subject>Theory of computation</subject><issn>0164-0925</issn><issn>1558-4593</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>1985</creationdate><recordtype>article</recordtype><recordid>eNqNkM1LAzEQxYMoWKsHT173IIKH1Eyy-TpK8QsKXvS8TLOJruxHTbaU_vfu2tqzlzcM85v34BFyCWwGkMs7LpSYDaKOyASkNDSXVhyTCQOVU2a5PCVnKX0xxsBIMyH2pQ1dbLCvupaGuttk2JZZiT3-bVhvU5WyLmSbz6r2dBW7j4hNOicnAevkL_ZzSt4fH97mz3Tx-vQyv19QFBp6mi85B65KEbzVOheKOcY0eLBcLYNxATgGj05qHZQXsLQIukTFDGrLPIgpudn5DsHfa5_6oqmS83WNre_WqeDGSgXsH2CuFNdGDuDtDnSxSyn6UKxi1WDcFsCKscVibHEUNbDXe1NMDusQsXVVOjyYnHFhRuxqh6FrDsdfgx9DV3cu</recordid><startdate>19850102</startdate><enddate>19850102</enddate><creator>Bergeretti, Jean-Francois</creator><creator>Carré, Bernard A.</creator><general>ACM</general><general>Association for Computing Machinery</general><scope>IQODW</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope></search><sort><creationdate>19850102</creationdate><title>Information-flow and data-flow analysis of while-programs</title><author>Bergeretti, Jean-Francois ; Carré, Bernard A.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-a371t-4b22126d3fe9774360c0071e1926bf8cf12afeac577f6e31b9a17da608a790e13</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>1985</creationdate><topic>Applied sciences</topic><topic>Assertion checking</topic><topic>Assertions</topic><topic>Computer science; control theory; systems</topic><topic>Designing software</topic><topic>Development frameworks and environments</topic><topic>Exact sciences and technology</topic><topic>Functional verification</topic><topic>Hardware</topic><topic>Hardware validation</topic><topic>Information systems</topic><topic>Information systems applications</topic><topic>Program reasoning</topic><topic>Semantics and reasoning</topic><topic>Software</topic><topic>Software and its engineering</topic><topic>Software creation and management</topic><topic>Software defect analysis</topic><topic>Software design techniques</topic><topic>Software development process management</topic><topic>Software engineering</topic><topic>Software implementation planning</topic><topic>Software notations and tools</topic><topic>Software testing and debugging</topic><topic>Software verification and validation</topic><topic>Theory of computation</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Bergeretti, Jean-Francois</creatorcontrib><creatorcontrib>Carré, Bernard A.</creatorcontrib><collection>Pascal-Francis</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>ACM transactions on programming languages and systems</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Bergeretti, Jean-Francois</au><au>Carré, Bernard A.</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Information-flow and data-flow analysis of while-programs</atitle><jtitle>ACM transactions on programming languages and systems</jtitle><stitle>ACM TOPLAS</stitle><date>1985-01-02</date><risdate>1985</risdate><volume>7</volume><issue>1</issue><spage>37</spage><epage>61</epage><pages>37-61</pages><issn>0164-0925</issn><eissn>1558-4593</eissn><coden>ATPSDT</coden><abstract>Until recently, information-flow analysis has been used primarily to verify that information transmission between program variables cannot violate security requirements. Here, the notion of information flow is explored as an aid to program development and validation. Information-flow relations are presented for while-programs, which identify those program statements whose execution may cause information to be transmitted from or to particular input, internal, or output values. It is shown with examples how these flow relations can be helpful in writing, testing, and updating programs; they also usefully extend the class of errors which can be detected automatically in the "static analysis" of a program.</abstract><cop>New York, NY, USA</cop><pub>ACM</pub><doi>10.1145/2363.2366</doi><tpages>25</tpages><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | ISSN: 0164-0925 |
ispartof | ACM transactions on programming languages and systems, 1985-01, Vol.7 (1), p.37-61 |
issn | 0164-0925 1558-4593 |
language | eng |
recordid | cdi_proquest_miscellaneous_28956101 |
source | ACM Digital Library Complete |
subjects | Applied sciences Assertion checking Assertions Computer science control theory systems Designing software Development frameworks and environments Exact sciences and technology Functional verification Hardware Hardware validation Information systems Information systems applications Program reasoning Semantics and reasoning Software Software and its engineering Software creation and management Software defect analysis Software design techniques Software development process management Software engineering Software implementation planning Software notations and tools Software testing and debugging Software verification and validation Theory of computation |
title | Information-flow and data-flow analysis of while-programs |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-31T23%3A17%3A05IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Information-flow%20and%20data-flow%20analysis%20of%20while-programs&rft.jtitle=ACM%20transactions%20on%20programming%20languages%20and%20systems&rft.au=Bergeretti,%20Jean-Francois&rft.date=1985-01-02&rft.volume=7&rft.issue=1&rft.spage=37&rft.epage=61&rft.pages=37-61&rft.issn=0164-0925&rft.eissn=1558-4593&rft.coden=ATPSDT&rft_id=info:doi/10.1145/2363.2366&rft_dat=%3Cproquest_cross%3E28956101%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=24662785&rft_id=info:pmid/&rfr_iscdi=true |