Adjoining Declassification and Attack Models by Abstract Interpretation
- 1 January 2005
- book chapter
- Published by Springer Nature
Abstract
No abstract availableKeywords
This publication has 23 references indexed in Scilit:
- Proving Abstract Non-interferencePublished by Springer Nature ,2004
- Abstract non-interference: parameterizing non-interference by abstract interpretationPublished by Association for Computing Machinery (ACM) ,2004
- Static Analysis for Secrecy and Non-interference in Networks of ProcessesPublished by Springer Nature ,2001
- Incompleteness, Counterexamples, and Refinements in Abstract Model-CheckingPublished by Springer Nature ,2001
- Refining and compressing abstract domainsPublished by Springer Nature ,1997
- A unifying view of abstract domain designACM Computing Surveys, 1996
- A Classification of Security Properties for Process Algebras1Journal of Computer Security, 1995
- Information transmission in computational systemsACM SIGOPS Operating Systems Review, 1977
- Certification of programs for secure information flowCommunications of the ACM, 1977
- A lattice model of secure information flowCommunications of the ACM, 1976