Author:
Jamroga Wojciech,Tabatabaei Masoud
Publisher
Springer International Publishing
Reference28 articles.
1. Allen, P.G.: A comparison of non-interference and non-deducibility using CSP. In: Proceedings of CSFW, pp. 43–54 (1991)
2. Backes, M., Pfitzmann, B.: Intransitive non-interference for cryptographic purposes. In: Proceedings of S&P, pp. 140–152. IEEE (2003)
3. Engelhardt, K., van der Meyden, R., Zhang, C.: Intransitive noninterference in nondeterministic systems. In: Proceedings of CCS, pp. 869–880 (2012)
4. Goguen, J.A., Meseguer, J.: Security policies and security models. In: Proceedings of S&P, pp. 11–20. IEEE Computer Society (1982)
5. Goguen, J.A., Meseguer, J.: Unwinding and inference control. In: IEEE Symposium on Security and Privacy, pp. 75–75. IEEE Computer Society (1984)
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献