Sciweavers
Explore
Publications
Books
Software
Tutorials
Presentations
Lectures Notes
Datasets
Labs
Conferences
Community
Upcoming
Conferences
Top Ranked Papers
Most Viewed Conferences
Conferences by Acronym
Conferences by Subject
Conferences by Year
Tools
PDF Tools
Image Tools
Text Tools
OCR Tools
Symbol and Emoji Tools
On-screen Keyboard
Latex Math Equation to Image
Smart IPA Phonetic Keyboard
Community
Sciweavers
About
Terms of Use
Privacy Policy
Cookies
26
search results - page 6 / 6
»
bell 2004
Sort
relevance
views
votes
recent
update
View
thumb
title
138
click to vote
SIGADA
2004
Springer
141
views
Programming Languages
»
more
SIGADA 2004
»
Enforcing security and safety models with an information flow analysis tool
15 years 8 months ago
Download
www.suslik.org
Existing security models require that information of a given security level be prevented from “leaking” into lower-security information. High-security applications must be dem...
Roderick Chapman, Adrian Hilton
claim paper
Read More »
« Prev
« First
page 6 / 6
Last »
Next »