共 50 条
- [1] Dependent Type Theory for Verification of Information Flow and Access Control Policies ACM TRANSACTIONS ON PROGRAMMING LANGUAGES AND SYSTEMS, 2013, 35 (02):
- [2] Secure Information Flow Verification with Mutable Dependent Types PROCEEDINGS OF THE 2017 54TH ACM/EDAC/IEEE DESIGN AUTOMATION CONFERENCE (DAC), 2017,
- [3] Session Types for Access and Information Flow Control CONCUR 2010 - CONCURRENCY THEORY, 2010, 6269 : 237 - +
- [4] Verification and enforcement of access control policies Formal Methods in System Design, 2013, 43 : 450 - 492
- [7] Dynamic Access Control Policies: Specification and Verification COMPUTER JOURNAL, 2013, 56 (04): : 440 - 463
- [9] Verification of Access Control Policies for REA Business Processes 2009 IEEE 33RD INTERNATIONAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE, VOLS 1 AND 2, 2009, : 1095 - 1100