<--- Back to Details
First PageDocument Content
Security / Computer network security / Computer security / Crime prevention / Electronic commerce / National security / Mathematical proof / Information flow / Modal logic / Logic / Computing / Mathematical logic
Date: 2013-01-05 00:32:20
Security
Computer network security
Computer security
Crime prevention
Electronic commerce
National security
Mathematical proof
Information flow
Modal logic
Logic
Computing
Mathematical logic

doi:j.pmcj

Add to Reading List

Source URL: systemsresilience.org

Download Document from Source Website

File Size: 660,04 KB

Share Document on Facebook

Similar Documents

Formal methods / Software engineering / Computing / Logic in computer science / Non-interference / Exception handling / Formal verification / Refinement / Thread / Futures and promises / Covert channel / Application programming interface

Nickel: A Framework for Design and Verification of Information Flow Control Systems Helgi Sigurbjarnarson, Luke Nelson, Bruno Castro-Karney, James Bornholt, Emina Torlak, Xi Wang University of Washington

DocID: 1xVUp - View Document

Aircraft instruments / Standards / Covert channel / Steganography / ARINC 653 / ARINC / Verification / Human behavior / Technology / User interface design / Design

Nickel A Framework for Design and Verification of Information Flow Control Systems Helgi Sigurbjarnarson, Luke Nelson, Bruno Castro-Karney, James Bornholt, Emina Torlak, and Xi Wang

DocID: 1xV5v - View Document

Mathematical logic / Logic / Mathematics / Predicate logic / Formal methods / Semantics / Edsger W. Dijkstra / Predicate transformer semantics / First-order logic / FO / Quantifier / Equality

A Semantic Approach to Secure Information Flow K. Rustan M. Leino1 and Rajeev Joshi2 1 DEC SRC, Palo Alto, CA 94301, USA

DocID: 1xUnb - View Document

arXiv:1608.01654v2 [cs.PL] 7 NovHypercollecting Semantics and its Application to Static Analysis of Information Flow Mounir Assaf

DocID: 1xTMD - View Document

Metaphysics / Humanities / Terminology / Archaeological theory / Data collection / Evidence law / Museology / Provenance / Seeds / Causality / Inode / System call

Rain: Refinable Attack Investigation with On-demand Inter-Process Information Flow Tracking

DocID: 1xTBL - View Document