This HTML5 document contains 30 embedded RDF statements represented using HTML+Microdata notation.

The embedded RDF content will be recognized by any processor of HTML5 Microdata.

Namespace Prefixes

PrefixIRI
dctermshttp://purl.org/dc/terms/
yago-reshttp://yago-knowledge.org/resource/
dbohttp://dbpedia.org/ontology/
n18http://dbpedia.org/resource/File:
foafhttp://xmlns.com/foaf/0.1/
n7https://global.dbpedia.org/id/
dbthttp://dbpedia.org/resource/Template:
rdfshttp://www.w3.org/2000/01/rdf-schema#
freebasehttp://rdf.freebase.com/ns/
n5http://commons.wikimedia.org/wiki/Special:FilePath/
rdfhttp://www.w3.org/1999/02/22-rdf-syntax-ns#
owlhttp://www.w3.org/2002/07/owl#
wikipedia-enhttp://en.wikipedia.org/wiki/
dbphttp://dbpedia.org/property/
dbchttp://dbpedia.org/resource/Category:
provhttp://www.w3.org/ns/prov#
xsdhhttp://www.w3.org/2001/XMLSchema#
wikidatahttp://www.wikidata.org/entity/
dbrhttp://dbpedia.org/resource/

Statements

Subject Item
dbr:Security_type_system
rdfs:label
Security type system
rdfs:comment
In computer science, a type system can be described as a syntactic framework which contains a set of rules that are used to assign a type property (int, boolean, char etc.) to various components of a computer program, such as variables or functions. A security type system works in a similar way, only with a main focus on the security of the computer program, through information flow control. Thus, the various components of the program are assigned security types, or labels. The aim of a such system is to ultimately be able to verify that a given program conforms to the type system rules and satisfies non-interference. Security type systems is one of many security techniques used in the field of language-based security, and is tightly connected to information flow and information flow polic
foaf:depiction
n5:Information_Flow_Policy_Confidentiality_Lattice.png
dcterms:subject
dbc:Type_systems dbc:Computer_security
dbo:wikiPageID
44688078
dbo:wikiPageRevisionID
1113475768
dbo:wikiPageWikiLink
dbr:Language-based_security dbr:Non-interference_(security) dbr:Lattice_(order) dbr:Hasse_diagram dbc:Computer_security dbr:Information_flow dbr:Type_system dbr:Computer_science n18:Information_Flow_Policy_Confidentiality_Lattice.png dbc:Type_systems
owl:sameAs
n7:2Andw wikidata:Q22908607 yago-res:Security_type_system freebase:m.012gc4zw
dbp:wikiPageUsesTemplate
dbt:Inline dbt:Sfrac dbt:Center dbt:Reflist
dbo:thumbnail
n5:Information_Flow_Policy_Confidentiality_Lattice.png?width=300
dbo:abstract
In computer science, a type system can be described as a syntactic framework which contains a set of rules that are used to assign a type property (int, boolean, char etc.) to various components of a computer program, such as variables or functions. A security type system works in a similar way, only with a main focus on the security of the computer program, through information flow control. Thus, the various components of the program are assigned security types, or labels. The aim of a such system is to ultimately be able to verify that a given program conforms to the type system rules and satisfies non-interference. Security type systems is one of many security techniques used in the field of language-based security, and is tightly connected to information flow and information flow policies. In simple terms, a security type system can be used to detect if there exists any kind of violation of confidentiality or integrity in a program, i.e. the programmer wants to detect if the program is in line with the information flow policy or not.
prov:wasDerivedFrom
wikipedia-en:Security_type_system?oldid=1113475768&ns=0
dbo:wikiPageLength
7889
foaf:isPrimaryTopicOf
wikipedia-en:Security_type_system