The Secret Art of Computer Programming
DOI10.1007/978-3-642-03466-4_3zbMATH Open1250.68092OpenAlexW1565956665MaRDI QIDQ3393399FDOQ3393399
Authors: Annabelle McIver
Publication date: 20 August 2009
Published in: Theoretical Aspects of Computing - ICTAC 2009 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-03466-4_3
Recommendations
Information storage and retrieval of data (68P20) Mathematical aspects of software engineering (specification, verification, metrics, requirements, etc.) (68N30) Specification and verification (program logics, model checking, etc.) (68Q60) Authentication, digital signatures and secret sharing (94A62)
Cited In (8)
- Title not available (Why is that?)
- Compositional noninterference from first principles
- Program semantics and verification technique for AI-centred programs
- The shadow knows: refinement and security in sequential programs
- Preserving Secrecy Under Refinement
- Title not available (Why is that?)
- How to brew-up a refinement ordering
- Abstractions of non-interference security: probabilistic versus possibilistic
This page was built for publication: The Secret Art of Computer Programming
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3393399)