Return to Issue Details Secure Information Flow Based on Data Flow Analysis Download Download PDF