Singleton types are often considered a poor man’s substitute for dependent types. But their generalization in the form of GADTs has found quite a following. The main advantage o...
Current information systems are more and more complex. They require more interactions between different components and users. So, ensuring system security must not be limited to us...
Reference processes are supposed to be the basis for collaboration and mature cooperation in software development. Large business organizations need large and diverse reference pro...
Declassification occurs when the confidentiality of information is weakened; erasure occurs when the confidentiality of information is strengthened, perhaps to the point of comple...
We present a new approach to information flow control (IFC), ploits counterexample-guided abstraction refinement (CEGAR) technology. The CEGAR process is built on top of our existi...