共 50 条
- [2] Static Analysis Method of Secure Privacy Information Flow for Service Composition [J]. Huang, Zhi-Qiu (zqhuang@nuaa.edu.cn), 1739, Chinese Academy of Sciences (29):
- [3] Handling encryption in an analysis for secure information flow [J]. PROGRAMMING LANGUAGES AND SYSTEMS, 2003, 2618 : 159 - 173
- [6] Towards Quantified Data Analysis of Information Flow Tracking for Secure System Design [J]. IEEE ACCESS, 2018, 6 : 1822 - 1831
- [7] An analysis of EEGS based on information flow with SD method [J]. 1998 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN, AND CYBERNETICS, VOLS 1-5, 1998, : 4115 - 4119
- [8] Secure Outsourcing of Network Flow Data Analysis [J]. 2013 IEEE INTERNATIONAL CONGRESS ON BIG DATA, 2013, : 431 - +
- [9] Semantics and program analysis of computationally secure information flow [J]. PROGRAMMING LANGUAGES AND SYSTEMS, PROCEEDINGS, 2001, 2028 : 77 - 91
- [10] Information flow analysis for fail-secure devices [J]. Rae, A. (arae@itee.uq.edu.au), 1600, Oxford University Press (48):