Compiling Information-Flow Security to Minimal Trusted Computing Bases
From MaRDI portal
Publication:3000581
Recommendations
Cites work
Cited in
(6)- Automated Verification of Dynamic Root of Trust Protocols
- Cryptographically sound implementations for typed information-flow security
- Using security policies to write secure software
- scientific article; zbMATH DE number 1832235 (Why is no real title available?)
- A verified information-flow architecture
- Foundations of Software Science and Computation Structures
This page was built for publication: Compiling Information-Flow Security to Minimal Trusted Computing Bases
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3000581)