Author:
Biondi Fabrizio,Legay Axel,Nielsen Bo Friis,Wąsowski Andrzej
Funder
MT-LAB
VKR Centre of Excellence for the Modelling of Information Technology
Subject
Software,Theoretical Computer Science,Computational Theory and Mathematics,Logic
Reference35 articles.
1. Security policies and security models;Goguen,1982
2. Non-interference, who needs it?;Ryan,2001
3. Assessing security threats of looping constructs;Malacaria,2007
4. A static analysis for quantifying information flow in a simple imperative language;Clark;J. Comput. Secur.,2007
5. A mathematical theory of communication;Shannon;Bell Syst. Tech. J.,1948
Cited by
12 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献