A formal protection model of security in centralized, parallel, and distributed systems
ACM Transactions on Computer Systems (TOCS)
ACM SIGSOFT Software Engineering Notes - Proceedings of VERkshop III -- a formal verification workshop
Algorithmic Verification of Noninterference Properties
Electronic Notes in Theoretical Computer Science (ENTCS)
An open-source cryptographic coprocessor
SSYM'00 Proceedings of the 9th conference on USENIX Security Symposium - Volume 9
High level specification of non-interference security policies in partitioned MLS systems
CNIS '07 Proceedings of the Fourth IASTED International Conference on Communication, Network and Information Security
Achieving information flow security through monadic control of effects
Journal of Computer Security - 18th IEEE Computer Security Foundations Symposium (CSF 18)
A comparison of semantic models for noninterference
Theoretical Computer Science
Security framework for integrated networks
MILCOM'03 Proceedings of the 2003 IEEE conference on Military communications - Volume II
Automated information flow analysis of virtualized infrastructures
ESORICS'11 Proceedings of the 16th European conference on Research in computer security
On the correctness of operating system kernels
TPHOLs'05 Proceedings of the 18th international conference on Theorem Proving in Higher Order Logics
Carrying goals to newcastle: a tribute to brian randell
Dependable and Historic Computing
Enforcing user-space privilege separation with declarative architectures
Proceedings of the seventh ACM workshop on Scalable trusted computing
Information flow in systems with schedulers, Part I: Definitions
Theoretical Computer Science
Client-controlled cryptography-as-a-service in the cloud
ACNS'13 Proceedings of the 11th international conference on Applied Cryptography and Network Security
Hi-index | 0.00 |