Author:
Braghin Chiara,Cortesi Agostino,Focardi Riccardo
Subject
Computer Networks and Communications,Software
Reference20 articles.
1. Control flow analysis of mobile ambients with security boundaries;Braghin,2002
2. Cortesi A, Focardi R. Information flow security in mobile ambients. In: Proceedings of International Workshop on Concurrency and Coordination (ConCoord ’01), Electronic Notes on Theoretical Computer Science, ENTCS, vol. 54. Amsterdam: Elsevier, July 6–8, 2001.
3. Cardelli L, Gordon AD. Mobile ambients. In: Nivat M, editor. Proceedings of Foundations of Software Science and Computation Structures (FoSSaCS), Lecture Notes in Computer Science, vol. 1378, Berlin, Germany, Springer, March 1998, p. 140–55.
4. Bodei C, Degano P, Nielson F, Nielson HR. Static analysis of processes for No read-up and No write-down. In: Proceedings of FoSSaCS ’99, Lecture Notes in Computer Science, No. 1578. Berlin: Springer, 1999. p. 120–34.
5. Focardi R, Gorrieri G, Martinelli F. Information flow analysis in a discrete-time process algebra. In: Proceedings of the 13th Computer Security Foundations Workshop (CSFW). Silver Spring, MD: IEEE Computer Society Press, 2000. p. 170–84.
Cited by
10 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献