Information flow analysis for fail-secure devices

被引:0
|
作者
机构
[1] Rae, Andrew
[2] Fidge, Colin
来源
Rae, A. (arae@itee.uq.edu.au) | 1600年 / Oxford University Press卷 / 48期
关键词
Fault tolerant computer systems;
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [11] Java bytecode dependence analysis for secure information flow
    Bian, Gaowei
    Nakayama, Ken
    Kobayashi, Yoshitake
    Maekawa, Mamoru
    International Journal of Network Security, 2007, 4 (01) : 59 - 68
  • [12] Secure information sharing in social agent interactions using information flow analysis
    Bijani, Shahriar
    Robertson, David
    Aspinall, David
    ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE, 2018, 70 : 52 - 66
  • [13] Secure information flow connections
    Bhardwaj, Chandrika
    Prasad, Sanjiva
    JOURNAL OF LOGICAL AND ALGEBRAIC METHODS IN PROGRAMMING, 2022, 127
  • [14] Arrows for secure information flow
    Li, Peng
    Zdancewic, Steve
    THEORETICAL COMPUTER SCIENCE, 2010, 411 (19) : 1974 - 1994
  • [15] Information flow in secure contexts
    Bossi, Annalisa
    Macedonio, Damiano
    Piazza, Carla
    Rossi, Sabina
    JOURNAL OF COMPUTER SECURITY, 2005, 13 (03) : 391 - 422
  • [16] Information Flow Secure CAmkES
    Goyal, Amit
    Garg, Akshat
    Gour, Digvijaysingh
    Shyamasundar, R. K.
    Sivakumar, G.
    PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON INTERNET OF THINGS, BIG DATA AND SECURITY (IOTBDS), 2021, : 237 - 244
  • [17] Secure information flow and CPS
    Zdancewic, S
    Myers, AC
    PROGRAMMING LANGUAGES AND SYSTEMS, PROCEEDINGS, 2001, 2028 : 46 - 61
  • [18] Compositionality of Secure Information Flow
    Palamidessi, Catuscia
    MATHEMATICS OF PROGRAM CONSTRUCTION, PROCEEDINGS, 2010, 6120 : 19 - 19
  • [19] Quantitative analysis of secure information flow via Probabilistic Semantics
    Mu, Chunyan
    Clark, David
    2009 INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY (ARES), VOLS 1 AND 2, 2009, : 49 - 57
  • [20] Secure Information Flow Analysis Using the PRISM Model Checker
    Noroozi, Ali A.
    Salehi, Khayyam
    Karimpour, Jaber
    Isazadeh, Ayaz
    INFORMATION SYSTEMS SECURITY (ICISS 2019), 2019, 11952 : 154 - 172