scientific article; zbMATH DE number 1759625
From MaRDI portal
Publication:4536616
Recommendations
Cited in
(21)- scientific article; zbMATH DE number 1538026 (Why is no real title available?)
- Information flow security and recursive systems.
- Addressing covert termination and timing channels in concurrent information flow systems
- The complexity of synchronous notions of information flow security
- On the prevention of fraud and privacy exposure in process information flow
- Non-termination and secure information flow
- The complexity of synchronous notions of information flow security
- scientific article; zbMATH DE number 2080841 (Why is no real title available?)
- scientific article; zbMATH DE number 1863164 (Why is no real title available?)
- Coordinating processes with secure spaces
- scientific article; zbMATH DE number 2064465 (Why is no real title available?)
- Value-dependent information-flow security on weak memory models
- Semantic models for the security of sequential and concurrent programs
- Secured information flow for asynchronous sequential processes
- Information flow, distributed systems, and refinement, by example
- Transforming processes to check and ensure information flow security
- Probabilistic information flow security in dynamic context
- Information flow testing
- Model-based security engineering: managed co-evolution of security knowledge and software models
- Information-flow control on ARM and POWER multicore processors
- Preservation of probabilistic information flow under refinement
This page was built for publication:
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4536616)