Author:
Ghindici Dorina,Simplot-Ryl Isabelle
Publisher
Springer Berlin Heidelberg
Reference20 articles.
1. Aissa, N.B.H., Ghindici, D., Grimaud, G., Simplot-Ryl, I.: Contracts as a support to static analysis of open systems. In: Proc. of 1st Workshop on Formal Languages and Analysis of Contract-Oriented Software (FLACOS 2007) (2007)
2. Avvenuti, M., Bernardeschi, C., Francesco, N.D.: Java bytecode verification for secure information flow. ACM SIGPLAN Notices 38(12), 20–27 (2003)
3. Bauer, L., Ligatti, J., Walker, D.: Composing security policies with polymer. In: Proc. ACM SIGPLAN Conf. PLDI 2005, pp. 305–314 (2005)
4. Bieber, P., Cazin, J., Girard, P., Lanet, J.-L., Wiels, V., Zanon, G.: Checking secure interactions of smart card applets: extended version. J. Comput. Secur. 10(4), 369–398 (2002)
5. Dam, M., Giambiagi, P.: Confidentiality for mobile code: The case of a simple payment protocol. In: Proc. 13th IEEE CSFW 2000, pp. 233–244 (2000)
Cited by
9 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献