Non-interference through determinism*

Abstract
This paper is a revised version of [16]. The notation has been slightly modified to make it compatible with that used in related publications [13, 14]. The standard approach to the specification of a secure system is to present a (usually state-based

This publication has 0 references indexed in Scilit: