共 50 条
[31]
Using Dependence Graphs to Assist Verification and Testing of Information-Flow Properties
[J].
TESTS AND PROOFS, TAP 2018,
2018, 10889
:83-102
[33]
Verification-based Test Case Generation for Information-Flow Properties
[J].
SAC '19: PROCEEDINGS OF THE 34TH ACM/SIGAPP SYMPOSIUM ON APPLIED COMPUTING,
2019,
:2231-2238
[35]
Points of Failure: A Systematic Review of information-flow using Medication Use Cases
[J].
PROCEEDINGS OF THE 53RD ANNUAL HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES,
2020,
:3862-3870
[37]
Information Flow Control Using the Java']Java Virtual Machine Tool Interface (JVMTI)
[J].
FIFTH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY: ARES 2010, PROCEEDINGS,
2010,
:689-695
[38]
Information Flow-Based Security Construction for Compositional Interface Automata
[J].
TRUSTED COMPUTING AND INFORMATION SECURITY, CTCIS 2019,
2020, 1149
:31-43
[39]
Model Checking the Information Flow Security of Real-Time Systems
[J].
ENGINEERING SECURE SOFTWARE AND SYSTEMS, ESSOS 2018,
2018, 10953
:27-43
[40]
Information Flow Security Models for Cloud Computing
[J].
CMC-COMPUTERS MATERIALS & CONTINUA,
2020, 65 (03)
:2687-2705