BACK TO INDEX
Publications about 'information flow'
|
-
G. Le Guernic and Thomas Jensen.
Monitoring Information Flow.
In Andrei Sabelfeld, editor,
Proceedings of the 2005 Workshop on Foundations of Computer Security (FCS'05),
pages 19--30,
June 2005.
DePaul University.
Note: LICS'05 Affiliated Workshop.
[Abstract] [bibtex-entry]
-
J.-P. Banâtre,
C. Bryce,
and D. Le Métayer.
An Approach to information security in distributed systems.
In Proceedings of the 5th IEEE International Workshop on Future Trends in Distributed Computing Systems,
pages 384-394,
1995.
[WWW
] [Abstract] [bibtex-entry]
-
J.-P. Banâtre,
C. Bryce,
and D. Le Métayer.
Compile-time detection of information flow in sequential programs.
In Proc. European Symposium on Research in Computer Security,
volume 875 of LNCS,
1994.
Springer Verlag.
[WWW
] Keyword(s): formal verification,
program analysis,
verification tools,
computer security,
information flow.
[Abstract] [bibtex-entry]
-
G. Le Guernic,
A. Banerjee,
and D. Schmidt.
Automaton-based Non-interference Monitoring.
Technical report 2006-1,
Department of Computing and Information Sciences, College of Engineering, Kansas State University,
234 Nichols Hall, Manhattan, KS 66506, USA,
April 2006.
[Abstract] [bibtex-entry]
BACK TO INDEX
Disclaimer:
This material is presented to ensure timely dissemination of
scholarly and technical work. Copyright and all rights therein
are retained by authors or by other copyright holders.
All person copying this information are expected to adhere to
the terms and constraints invoked by each author's copyright.
In most cases, these works may not be reposted
without the explicit permission of the copyright holder.
Les documents contenus dans ces répertoires sont rendus disponibles
par les auteurs qui y ont contribué en vue d'assurer la diffusion
à temps de travaux savants et techniques sur une base non-commerciale.
Les droits de copie et autres droits sont gardés par les auteurs
et par les détenteurs du copyright, en dépit du fait qu'ils présentent
ici leurs travaux sous forme électronique. Les personnes copiant ces
informations doivent adhérer aux termes et contraintes couverts par
le copyright de chaque auteur. Ces travaux ne peuvent pas être
rendus disponibles ailleurs sans la permission explicite du détenteur
du copyright.
Last modified: Mon Feb 26 15:35:08 2007
Author: ferre.
This document was translated from BibTEX by
bibtex2html