Toward a mathematical foundation for information flow security
- 10 December 2002
- proceedings article
- Published by Institute of Electrical and Electronics Engineers (IEEE)
Abstract
No abstract availableThis publication has 12 references indexed in Scilit:
- Noninterference and the composability of security propertiesPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2003
- Hookup security for synchronous machinesPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- Information sharing in secure systemsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- Skip lists: a probabilistic alternative to balanced treesCommunications of the ACM, 1990
- Security models and information flowPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1990
- Information flow in nondeterministic systemsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1990
- Specifications for Multi-Level Security and a Hook-UpPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1987
- Covert Channel CapacityPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1987
- Verification of multiprocess probabilistic protocolsDistributed Computing, 1986
- Security Policies and Security ModelsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1982