Verifying Security
- 1 September 1981
- journal article
- Published by Association for Computing Machinery (ACM) in ACM Computing Surveys
- Vol. 13 (3) , 279-339
- https://doi.org/10.1145/356850.356853
Abstract
No abstract availableKeywords
This publication has 24 references indexed in Scilit:
- An Axiomatic Approach to Information Flow in ProgramsACM Transactions on Programming Languages and Systems, 1980
- Principles of proving concurrent programs in GypsyPublished by Association for Computing Machinery (ACM) ,1979
- Abstract data types and software validationCommunications of the ACM, 1978
- A Report On The Development Of GypsyPublished by Association for Computing Machinery (ACM) ,1978
- Certification of programs for secure information flowCommunications of the ACM, 1977
- Some extensions to algebraic specificationsPublished by Association for Computing Machinery (ACM) ,1977
- A lattice model of secure information flowCommunications of the ACM, 1976
- Computer Security Technology Planning Study. Volume 2Published by Defense Technical Information Center (DTIC) ,1972
- An Assessment of Techniques for Proving Program CorrectnessACM Computing Surveys, 1972
- Assigning meanings to programsPublished by American Mathematical Society (AMS) ,1967