共 46 条
[21]
Krohn Maxwell, 2007, 21 ACM S OP SYST PRI
[22]
Li Peng, 2006, 19 IEEE COMP SEC FDN
[23]
A Theory of Information-Flow Labels
[J].
2013 IEEE 26TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF),
2013,
:3-17
[24]
Myers A. C., 1999, Conference Record of POPL '99. 26th ACM SIGPLAN-SIGACT. Symposium on Principles of Programming Languages, P228, DOI 10.1145/292540.292561
[27]
Verification of Information Flow and Access Control Policies with Dependent Types
[J].
2011 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2011),
2011,
:165-179
[28]
PINSKY S, 1995, P IEEE S SECUR PRIV, P102, DOI 10.1109/SECPRI.1995.398926
[29]
Information flow inference for ML
[J].
ACM TRANSACTIONS ON PROGRAMMING LANGUAGES AND SYSTEMS,
2003, 25 (01)
:117-158