Confidentiality for mobile code: the case of a simple payment protocol
- 7 November 2002
- conference paper
- Published by Institute of Electrical and Electronics Engineers (IEEE)
Abstract
No abstract availableKeywords
This publication has 8 references indexed in Scilit:
- Efficient representation and validation of proofsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- JFlowPublished by Association for Computing Machinery (ACM) ,1999
- Safe, Untrusted Agents Using Proof-Carrying CodePublished by Springer Nature ,1998
- A sound type system for secure flow analysisJournal of Computer Security, 1996
- A Classification of Security Properties for Process Algebras1Journal of Computer Security, 1995
- The specification and modeling of computer securityComputer, 1990
- Unwinding and Inference ControlPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1984
- Security Policies and Security ModelsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1982