Pages that link to "Item:Q5936652"
From MaRDI portal
The following pages link to A per model of secure information flow in sequential programs (Q5936652):
Displaying 10 items.
- Compositional refinement in agent-based security protocols (Q432140) (← links)
- Adjunctions on the lattices of partitions and of partial partitions (Q607553) (← links)
- Idempotent block splitting on partial partitions. I: Isotone operators (Q634752) (← links)
- A temporal logic for asynchronous hyperproperties (Q832224) (← links)
- The shadow knows: refinement and security in sequential programs (Q923889) (← links)
- Linearity and bisimulation (Q997996) (← links)
- Optimality and condensing of information flow through linear refinement (Q2464935) (← links)
- Information Flow Analysis for Valued-Indexed Data Security Compartments (Q2830034) (← links)
- Modelling declassification policies using abstract domain completeness (Q3103614) (← links)
- What You Lose is What You Leak: Information Leakage in Declassification Policies (Q5262929) (← links)