Information flow analysis for fail-secure devices

被引:0
|
作者
机构
[1] Rae, Andrew
[2] Fidge, Colin
来源
Rae, A. (arae@itee.uq.edu.au) | 1600年 / Oxford University Press卷 / 48期
关键词
Fault tolerant computer systems;
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [1] Information flow analysis for fail-secure devices
    Rae, A
    Fidge, C
    COMPUTER JOURNAL, 2005, 48 (01): : 17 - 26
  • [2] Fail-Secure Access Control
    Tsankov, Petar
    Marinovic, Srdjan
    Dashti, Mohammad Torabi
    Basin, David
    CCS'14: PROCEEDINGS OF THE 21ST ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2014, : 1157 - 1168
  • [3] Fail-Safe, Fail-Secure Experiments for Small UAS and UAM Traffic in Urban Airspace
    Siewert, Sam
    Sampigethaya, Krishna
    Buchholz, Jonathan
    Rizor, Steve
    2019 IEEE/AIAA 38TH DIGITAL AVIONICS SYSTEMS CONFERENCE (DASC), 2019,
  • [4] In my Wish List, an Automated Tool for Fail-Secure Design Analysis: an Alloy-Based Feasibility Draft
    Le Guernic, Gurvan
    ELECTRONIC PROCEEDINGS IN THEORETICAL COMPUTER SCIENCE, 2014, (150): : 50 - 55
  • [5] Principles of secure information flow analysis
    Smith, Geoffrey
    Malware Detection, 2007, : 291 - 307
  • [6] Handling encryption in an analysis for secure information flow
    Laud, P
    PROGRAMMING LANGUAGES AND SYSTEMS, 2003, 2618 : 159 - 173
  • [7] A Method of Secure Information Flow Based on Data Flow Analysis
    Yao, Jianbo
    SOFTWARE ENGINEERING AND KNOWLEDGE ENGINEERING: THEORY AND PRACTICE, VOL 1, 2012, 114 : 597 - 606
  • [8] Semantics and program analysis of computationally secure information flow
    Laud, P
    PROGRAMMING LANGUAGES AND SYSTEMS, PROCEEDINGS, 2001, 2028 : 77 - 91
  • [9] A Framework for Secure Information Flow Analysis in Web Applications
    Adaimy, Ralph
    El-Hajj, Wassim
    Ben Brahim, Ghassen
    Hajj, Hazem
    Safa, Haidar
    2015 IEEE 29th International Conference on Advanced Information Networking and Applications (IEEE AINA 2015), 2015, : 434 - 441
  • [10] A theorem proving approach to analysis of secure information flow
    Darvas, A
    Hähnle, R
    Sands, D
    SECURITY IN PERVASIVE COMPUTING, PROCEEDINGS, 2005, 3450 : 193 - 209