scientific article; zbMATH DE number 1759625
From MaRDI portal
Publication:4536616
zbMATH Open0999.68149MaRDI QIDQ4536616FDOQ4536616
Authors: Jan Jürjens
Publication date: 28 November 2002
Title of this publication is not available (Why is that?)
Recommendations
Data encryption (aspects in computer science) (68P25) Cryptography (94A60) Models and methods for concurrent and distributed computing (process algebras, bisimulation, transition nets, etc.) (68Q85)
Cited In (20)
- Title not available (Why is that?)
- Information flow security and recursive systems.
- The complexity of synchronous notions of information flow security
- The complexity of synchronous notions of information flow security
- Coordinating processes with secure spaces
- Non-termination and secure information flow
- Secured information flow for asynchronous sequential processes
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Transforming processes to check and ensure information flow security
- Information-flow control on ARM and POWER multicore processors
- Probabilistic information flow security in dynamic context
- Model-based security engineering: managed co-evolution of security knowledge and software models
- On the prevention of fraud and privacy exposure in process information flow
- Preservation of probabilistic information flow under refinement
- Semantic models for the security of sequential and concurrent programs
- Information flow, distributed systems, and refinement, by example
- Information flow testing
- Addressing covert termination and timing channels in concurrent information flow systems
This page was built for publication:
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4536616)