Using traces based on procedure calls to reason about composability
- 2 January 2003
- conference paper
- Published by Institute of Electrical and Electronics Engineers (IEEE)
Abstract
No abstract availableKeywords
This publication has 13 references indexed in Scilit:
- On the derivation of secure componentsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2003
- The reliable specification of softwarePublished by Institute of Electrical and Electronics Engineers (IEEE) ,2003
- On the refinement of non-interferencePublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- A hookup theorem for multilevel securityIEEE Transactions on Software Engineering, 1990
- Security models and information flowPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1990
- A Method for Automatically Translating Trace Specifications into PrologPublished by Defense Technical Information Center (DTIC) ,1988
- Specifications for Multi-Level Security and a Hook-UpPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1987
- The trace specification of communications protocolsIEEE Transactions on Computers, 1985
- A Formal Method for the Abstract Specification of SoftwareJournal of the ACM, 1984
- Unwinding and Inference ControlPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1984