Publisher
Springer Berlin Heidelberg
Reference40 articles.
1. Lecture Notes in Computer Science;M. Backes,2002
2. Backes, M., Pfitzmann, B.: Intransitive non-interference for cryptographic purposes. In: Proc. 24th IEEE Symposium on Security & Privacy, pp. 140–152 (2003)
3. Backes, M., Pfitzmann, B., Waidner, M.: Secure asynchronous reactive systems. IACR Cryptology ePrint Archive 2004/082 (March 2004)
4. Bell, D., LaPadula, L.: Secure computer systems: Unified exposition and multics interpretation. Computer Science Technical Report ESD-TR-75-306, The Mitre Corporation (1976)
5. Clark, D., Hunt, S., Malacaria, P.: Quantitative analysis of the leakage of confidential data. In: A Comparative Study of Very Large Data Bases. Electronic Notes in Theoretical Computer Science, vol. 59. Elsevier, Amsterdam (2002)
Cited by
8 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献