<--- Back to Details
First PageDocument Content
Mathematics / Lattice / Flow network / Control flow / Theoretical computer science / Applied mathematics / Java programming language / Type enforcement / Comparison of C Sharp and Java / Network flow / Information flow / Information theory
Date: 2002-05-07 18:49:34
Mathematics
Lattice
Flow network
Control flow
Theoretical computer science
Applied mathematics
Java programming language
Type enforcement
Comparison of C Sharp and Java
Network flow
Information flow
Information theory

Add to Reading List

Source URL: faculty.nps.edu

Download Document from Source Website

File Size: 676,77 KB

Share Document on Facebook

Similar Documents

Formal methods / Software engineering / Computing / Logic in computer science / Non-interference / Exception handling / Formal verification / Refinement / Thread / Futures and promises / Covert channel / Application programming interface

Nickel: A Framework for Design and Verification of Information Flow Control Systems Helgi Sigurbjarnarson, Luke Nelson, Bruno Castro-Karney, James Bornholt, Emina Torlak, Xi Wang University of Washington

DocID: 1xVUp - View Document

Aircraft instruments / Standards / Covert channel / Steganography / ARINC 653 / ARINC / Verification / Human behavior / Technology / User interface design / Design

Nickel A Framework for Design and Verification of Information Flow Control Systems Helgi Sigurbjarnarson, Luke Nelson, Bruno Castro-Karney, James Bornholt, Emina Torlak, and Xi Wang

DocID: 1xV5v - View Document

Mathematical logic / Logic / Mathematics / Predicate logic / Formal methods / Semantics / Edsger W. Dijkstra / Predicate transformer semantics / First-order logic / FO / Quantifier / Equality

A Semantic Approach to Secure Information Flow K. Rustan M. Leino1 and Rajeev Joshi2 1 DEC SRC, Palo Alto, CA 94301, USA

DocID: 1xUnb - View Document

arXiv:1608.01654v2 [cs.PL] 7 NovHypercollecting Semantics and its Application to Static Analysis of Information Flow Mounir Assaf

DocID: 1xTMD - View Document

Metaphysics / Humanities / Terminology / Archaeological theory / Data collection / Evidence law / Museology / Provenance / Seeds / Causality / Inode / System call

Rain: Refinable Attack Investigation with On-demand Inter-Process Information Flow Tracking

DocID: 1xTBL - View Document