Pages that link to "Item:Q5936652"
From MaRDI portal
The following pages link to A per model of secure information flow in sequential programs (Q5936652):
Displaying 15 items.
- Compositional refinement in agent-based security protocols (Q432140) (← links)
- Adjunctions on the lattices of partitions and of partial partitions (Q607553) (← links)
- Idempotent block splitting on partial partitions. I: Isotone operators (Q634752) (← links)
- A temporal logic for asynchronous hyperproperties (Q832224) (← links)
- The shadow knows: refinement and security in sequential programs (Q923889) (← links)
- Linearity and bisimulation (Q997996) (← links)
- Optimality and condensing of information flow through linear refinement (Q2464935) (← links)
- Information Flow Analysis for Valued-Indexed Data Security Compartments (Q2830034) (← links)
- Modelling declassification policies using abstract domain completeness (Q3103614) (← links)
- Model-Driven Information Flow Security for Component-Based Systems (Q5170740) (← links)
- What You Lose is What You Leak: Information Leakage in Declassification Policies (Q5262929) (← links)
- Deriving Bisimulations by Simplifying Partitions (Q5452714) (← links)
- Quantification of integrity (Q5740622) (← links)
- Timing-Sensitive Information Flow Analysis for Synchronous Systems (Q5862523) (← links)
- Quantifying Probabilistic Information Flow in Computational Reactive Systems (Q5862670) (← links)