共 43 条
[2]
[Anonymous], 2021, TECHN COMM MAR ROB
[3]
[Anonymous], 2000, J UNIVERS COMPUT SCI
[4]
[Anonymous], 2003, Electronic Notes in Theoretical Computer Science, DOI DOI 10.1016/J.ENTCS.2004.02.006
[5]
Intransitive non-interference for cryptographic purposes
[J].
2003 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS,
2003,
:140-152
[6]
Bodei C, 2001, LECT NOTES COMPUT SC, V2127, P27
[8]
A proof system for information flow security
[J].
LOGIC BASED PROGRAM SYNTHESIS AND TRANSFORMATION,
2003, 2664
:199-218
[9]
Bossi A, 2003, LECT NOTES COMPUT SC, V2575, P223