Heuristics for Safety and Security Constraints
DOI10.1016/j.entcs.2007.02.018zbMath1277.68250OpenAlexW2050411875WikidataQ59416352 ScholiaQ59416352MaRDI QIDQ2864162
Hanne Riis Nielson, Flemming Nielson
Publication date: 6 December 2013
Published in: Electronic Notes in Theoretical Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.entcs.2007.02.018
static analysissecurity propertiesleast fixed-point logicflow logicBell-Lapadula mandatory access control
Semantics in the theory of computing (68Q55) Specification and verification (program logics, model checking, etc.) (68Q60) Problem solving in the context of artificial intelligence (heuristics, search strategies, etc.) (68T20)
Uses Software
Cites Work
This page was built for publication: Heuristics for Safety and Security Constraints