共 19 条
[1]
Agrawal S., 2016, P 29 IEEE C IN PRESS
[2]
Alur R, 2006, LECT NOTES COMPUT SC, V4052, P107
[3]
[Anonymous], 2014, Lecture Notes in Computer Science
[4]
Balliu M., 2011, P 2011 WORKSH PROGR, P6
[5]
Secure information flow by self-composition
[J].
17TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS,
2004,
:100-114
[8]
Dimitrova Rayna, 2012, Leveraging Applications of Formal Methods, Verification and Validation. Technologies for Mastering Change. Technologies for Mastering Change. Proceedings of the 5th International Symposium, ISoLA 2012, P342, DOI 10.1007/978-3-642-34026-0_26
[9]
Dimitrova R, 2012, LECT NOTES COMPUT SC, V7148, P169, DOI 10.1007/978-3-642-27940-9_12
[10]
Finkbeiner B., 2016, P ATVA 2016