Miro: visual specification of security
- 1 January 1990
- journal article
- Published by Institute of Electrical and Electronics Engineers (IEEE) in IEEE Transactions on Software Engineering
- Vol. 16 (10) , 1185-1197
- https://doi.org/10.1109/32.60298
Abstract
No abstract availableThis publication has 13 references indexed in Scilit:
- Visual languages and the conflict between single assignment and iterationPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2003
- Micro toolsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2003
- On visual formalismsCommunications of the ACM, 1988
- Reasoning About Security ModelsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1987
- The ITC distributed file systemPublished by Association for Computing Machinery (ACM) ,1985
- A comment on the ‘basic security theorem’ of Bell and LaPadulaInformation Processing Letters, 1985
- Analysis of a Kemel VerificationPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1984
- Group-Theoretic Algorithms and Graph IsomorphismLecture Notes in Computer Science, 1982
- Isomorphism of graphs of bounded valence can be tested in polynomial timePublished by Institute of Electrical and Electronics Engineers (IEEE) ,1980
- The graph isomorphism diseaseJournal of Graph Theory, 1977