共 50 条
- [31] Verifying Secure Information Flow in Federated Clouds 2014 IEEE 6TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGY AND SCIENCE (CLOUDCOM), 2014, : 78 - 85
- [32] Information Flow Control for Secure Cloud Computing IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2014, 11 (01): : 76 - 89
- [34] Secure information flow with random assignment and encryption Proc. Fourth ACM Workshop Formal Methods Secur. Eng. FMSE Conf.Comput. Commun. Secur., 2006, (33-44):
- [35] Stream Processing with Secure Information Flow Constraints DATA AND APPLICATIONS SECURITY AND PRIVACY XXIX, 2015, 9149 : 311 - 329
- [36] A uniform type structure for secure information flow ACM TRANSACTIONS ON PROGRAMMING LANGUAGES AND SYSTEMS, 2007, 29 (06):
- [37] Engineering Policies for Secure Interorganizational Information Flow 2011 15TH IEEE INTERNATIONAL ENTERPRISE DISTRIBUTED OBJECT COMPUTING CONFERENCE WORKSHOPS (EDOC 2011), 2011, : 438 - 447
- [38] Secure Refactoring with Java']Java Information Flow DATA PRIVACY MANAGEMENT, AND SECURITY ASSURANCE, 2016, 9481 : 264 - 272