15
views
0
recommends
+1 Recommend
0 collections
    0
    shares
      • Record: found
      • Abstract: not found
      • Book Chapter: not found
      Advances in Cryptology — CRYPTO’ 88 : Proceedings 

      Privacy-Sensitive Information Flow with JML

      other
      , ,
      Springer Berlin Heidelberg

      Read this book at

      Buy book Bookmark
          There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.

          Related collections

          Most cited references15

          • Record: found
          • Abstract: not found
          • Article: not found

          An axiomatic basis for computer programming

          C. Hoare (1969)
            Bookmark
            • Record: found
            • Abstract: not found
            • Article: not found

            Language-based information-flow security

              Bookmark
              • Record: found
              • Abstract: not found
              • Conference Proceedings: not found

              Security Policies and Security Models

                Bookmark

                Author and book information

                Book Chapter
                2005
                : 116-130
                10.1007/11532231_9
                dfbd277c-d377-434b-9c7b-62b9eb16de49
                History

                Comments

                Comment on this book

                Book chapters

                Similar content2,755

                Cited by3