A flow-sensitive analysis of privacy properties
暂无分享,去创建一个
[1] Flemming Nielson,et al. Static validation of security protocols , 2005, J. Comput. Secur..
[2] François Pottier. A simple view of type-secure information flow in the /spl pi/-calculus , 2002, Proceedings 15th IEEE Computer Security Foundations Workshop. CSFW-15.
[3] Geoffrey Smith,et al. Secure information flow in a multi-threaded imperative language , 1998, POPL '98.
[4] Andrew C. Myers,et al. A decentralized model for information flow control , 1997, SOSP.
[5] Flemming Nielson,et al. Static Analysis for the pi-Calculus with Applications to Security , 2001, Inf. Comput..
[6] Heiko Mantel,et al. Static Confidentiality Enforcement for Distributed Programs , 2002 .
[7] Robin Milner,et al. Communicating and mobile systems - the Pi-calculus , 1999 .
[8] Flemming Nielson,et al. Principles of Program Analysis , 1999, Springer Berlin Heidelberg.
[9] Martín Abadi,et al. Computer-Assisted Verification of a Protocol for Certified Email , 2003, SAS.
[10] Flemming Nielson,et al. Pathway analysis for BioAmbients , 2008, J. Log. Algebraic Methods Program..
[11] Flemming Nielson,et al. Information Flow Analysis for VHDL , 2005, PaCT.
[12] Flemming Nielson,et al. Data Flow Analysis for CCS , 2006, Program Analysis and Compilation.
[13] Flemming Nielson,et al. Validating firewalls using flow logics , 2002, Theor. Comput. Sci..
[14] Robin Milner,et al. A Calculus of Mobile Processes, II , 1992, Inf. Comput..