Author:
Manzino Cecilia,de Latorre Gonzalo
Publisher
Springer Nature Switzerland
Reference17 articles.
1. Lampson, B. W.: Protection. In: Proceedings of the 5th Princeton Conference on Information Sciences and Systems, Princeton (1971). Reprinted in ACM Operating Systems Review, vol. 8, no. 1, pp 18–24 (1974)
2. Denning, D.E.: A lattice model of secure information flow. ACM 19(5), 236–243 (1976)
3. Goguen, J.A., Meseguer, J.: Security policies and security models. In: Proceedings of the IEEE Symposium on Security and Privacy, pp. 11–20 (1982)
4. Lecture Notes in Computer Science;D Volpano,1997
5. Myers, A.C., Zheng, L., Zdancewic, S., Chong, S., Nystrom, N.: Jif: java information flow. Software release (2001). http://www.cs.cornell.edu/jif