A logic of composition for information flow predicates
暂无分享,去创建一个
[1] Bowen Alpern,et al. Defining Liveness , 1984, Inf. Process. Lett..
[2] Daryl McCullough,et al. Specifications for Multi-Level Security and a Hook-Up , 1987, 1987 IEEE Symposium on Security and Privacy.
[3] J. Meseguer,et al. Security Policies and Security Models , 1982, 1982 IEEE Symposium on Security and Privacy.
[4] John Rushby,et al. User guide for the pvs specification and verification system (beta release) , 1991 .
[5] John McLean,et al. A general theory of composition for trace sets closed under selective interleaving functions , 1994, Proceedings of 1994 IEEE Computer Society Symposium on Research in Security and Privacy.
[6] William A. Wulf,et al. Formal specification of information flow security policies and their enforcement in security critical systems , 1994, Proceedings The Computer Security Foundations Workshop VII.
[7] Lawrence Snyder,et al. Formal Models of Capability-Based Protection Systems , 1981, IEEE Transactions on Computers.
[8] William A. Wulf,et al. Specification and verification of security policies , 1996 .
[9] Martín Abadi,et al. Composing Specifications , 1989, REX Workshop.