Author:
Demange Delphine,Sands David
Publisher
Springer Berlin Heidelberg
Reference16 articles.
1. Lecture Notes in Computer Science;A. Askarov,2006
2. Lecture Notes in Computer Science;A. Askarov,2008
3. Askarov, A., Sabelfeld, A.: Gradual release: Unifying declassification, encryption and key release policies. In: Proc. IEEE Symp. on Security and Privacy, pp. 207–221 (May 2007)
4. Barnes, J., Barnes, J.G.: High Integrity Software: The SPARK Approach to Safety and Security. Addison-Wesley Longman Publishing Co., Inc., Amsterdam (2003)
5. Lecture Notes in Computer Science;G. Boudol,2001
Cited by
7 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Friendly Fire;ACM Transactions on Privacy and Security;2021-08-31
2. Securing Cross-App Interactions in IoT Platforms;2019 IEEE 32nd Computer Security Foundations Symposium (CSF);2019-06
3. When Not All Bits Are Equal: Worth-Based Information Flow;Lecture Notes in Computer Science;2014
4. From Exponential to Polynomial-Time Security Typing via Principal Types;Programming Languages and Systems;2011
5. Multi-run Security;Computer Security – ESORICS 2011;2011