共 50 条
- [31] Dynamic dependency monitoring to secure information flow 20TH IEEE COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSFS20), PROCEEDINGS, 2007, : 203 - +
- [33] Handling encryption in an analysis for secure information flow PROGRAMMING LANGUAGES AND SYSTEMS, 2003, 2618 : 159 - 173
- [34] A Secure Information Flow Architecture for Web Services 2008 IEEE INTERNATIONAL CONFERENCE ON SERVICES COMPUTING, PROCEEDINGS, VOL 1, 2008, : 182 - 189
- [36] Verifying Secure Information Flow in Federated Clouds 2014 IEEE 6TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGY AND SCIENCE (CLOUDCOM), 2014, : 78 - 85
- [37] Information Flow Control for Secure Cloud Computing IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2014, 11 (01): : 76 - 89
- [39] Secure information flow with random assignment and encryption Proc. Fourth ACM Workshop Formal Methods Secur. Eng. FMSE Conf.Comput. Commun. Secur., 2006, (33-44):
- [40] Stream Processing with Secure Information Flow Constraints DATA AND APPLICATIONS SECURITY AND PRIVACY XXIX, 2015, 9149 : 311 - 329