The Secret Art of Computer Programming
暂无分享,去创建一个
[1] Yoram Moses,et al. A Refinement Theory that Supports Reasoning About Knowledge and Time , 2001, LPAR.
[2] Heiko Mantel,et al. Preserving information flow properties under refinement , 2001, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.
[3] Annabelle McIver,et al. Sums and Lovers: Case Studies in Security, Compositionality and Refinement , 2009, FM.
[4] Carroll Morgan. The Shadow Knows: Refinement of Ignorance in Sequential Programs , 2006, MPC.
[5] Annabelle McIver,et al. Abstraction, Refinement and Proof for Probabilistic Systems , 2004, Monographs in Computer Science.
[6] Takayasu Ito,et al. Theoretical Computer Science: Exploring New Frontiers of Theoretical Informatics , 2001, Lecture Notes in Computer Science.
[7] Frank Wolter,et al. Monodic fragments of first-order temporal logics: 2000-2001 A.D , 2001, LPAR.
[8] James P. Titus,et al. Security and Privacy , 1967, 2022 IEEE Future Networks World Forum (FNWF).
[9] Carroll Morgan. The Shadow Knows: Refinement and security in sequential programs , 2009, Sci. Comput. Program..
[10] José Meseguer,et al. Unwinding and Inference Control , 1984, 1984 IEEE Symposium on Security and Privacy.
[11] Martín Abadi,et al. Reconciling Two Views of Cryptography (The Computational Soundness of Formal Encryption) , 2007, Journal of Cryptology.
[12] Eyal Kushilevitz,et al. Private information retrieval , 1998, JACM.
[13] K. Rustan M. Leino,et al. A semantic approach to secure information flow , 2000, Sci. Comput. Program..
[14] Martín Abadi,et al. Reconciling Two Views of Cryptography (The Computational Soundness of Formal Encryption)* , 2000, Journal of Cryptology.
[15] Jean-Raymond Abrial,et al. The B-book - assigning programs to meanings , 1996 .
[16] Ralph-Johan Back,et al. Correctness preserving program refinements: Proof theory and applications , 1980 .
[17] Carroll Morgan,et al. Programming from specifications , 1990, Prentice Hall International Series in computer science.
[18] David Sands,et al. A Per Model of Secure Information Flow in Sequential Programs , 1999, ESOP.
[19] Carroll Morgan,et al. Programming from specifications (2nd ed.) , 1994 .
[20] Jeremy L. Jacob,et al. Security specifications , 1988, Proceedings. 1988 IEEE Symposium on Security and Privacy.