共 44 条
[31]
Dimensions and principles of declassification
[J].
18TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS,
2005,
:255-269
[32]
Sabelfeld A, 2004, LECT NOTES COMPUT SC, V3233, P174
[34]
SABELFELD A, 2009, J COMPUTER IN PRESS
[35]
Sabelfeld A., 2009, LNCS
[36]
Dynamic dependency monitoring to secure information flow
[J].
20TH IEEE COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSFS20), PROCEEDINGS,
2007,
:203-+
[37]
SIMONET V, 2003, FLOW CAM SYSTEM SOFT
[38]
Smith S. F., 2006, PLAS 2006. Proceedings of the 2006 Programming Languages and Analysis for Security Workshop, P75, DOI 10.1145/1134744.1134758
[39]
FABLE: A language for enforcing user-defined security policies
[J].
PROCEEDINGS OF THE 2008 IEEE SYMPOSIUM ON SECURITY AND PRIVACY,
2008,
:369-383
[40]
van der Meyden R, 2007, LECT NOTES COMPUT SC, V4734, P235