共 50 条
- [1] Lenient array operations for practical secure information flow [J]. 17TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS, 2004, : 115 - 124
- [3] Arrows for secure information flow [J]. THEORETICAL COMPUTER SCIENCE, 2010, 411 (19) : 1974 - 1994
- [4] Information flow in secure contexts [J]. JOURNAL OF COMPUTER SECURITY, 2005, 13 (03) : 391 - 422
- [5] Information Flow Secure CAmkES [J]. PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON INTERNET OF THINGS, BIG DATA AND SECURITY (IOTBDS), 2021, : 237 - 244
- [6] Secure information flow and CPS [J]. PROGRAMMING LANGUAGES AND SYSTEMS, PROCEEDINGS, 2001, 2028 : 46 - 61
- [7] Compositionality of Secure Information Flow [J]. MATHEMATICS OF PROGRAM CONSTRUCTION, PROCEEDINGS, 2010, 6120 : 19 - 19
- [9] SPLinux*: An Information Flow Secure Linux [J]. 19TH IEEE INTERNATIONAL SYMPOSIUM ON PARALLEL AND DISTRIBUTED PROCESSING WITH APPLICATIONS (ISPA/BDCLOUD/SOCIALCOM/SUSTAINCOM 2021), 2021, : 1603 - 1612
- [10] Secure Information Flow as a Safety Property [J]. FORMAL ASPECTS IN SECURITY AND TRUST, 2009, 5491 : 20 - 34