BOOK-CHAPTER

A Proof System for Information Flow Security

Annalisa BossiRiccardo FocardiCarla PiazzaSabina Rossi

Year: 2003 Lecture notes in computer science Pages: 199-218   Publisher: Springer Science+Business Media
Keywords:
Computer science Information flow Exploit Property (philosophy) Local property Isolation (microbiology) Theoretical computer science Component (thermodynamics) Distributed computing State (computer science) Model checking Computer security Algorithm Mathematics

Metrics

15
Cited By
1.87
FWCI (Field Weighted Citation Impact)
32
Refs
0.85
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Citation History

Topics

Security and Verification in Computing
Physical Sciences →  Computer Science →  Artificial Intelligence
Advanced Malware Detection Techniques
Physical Sciences →  Computer Science →  Signal Processing
Access Control and Trust
Social Sciences →  Social Sciences →  Sociology and Political Science

Related Documents

JOURNAL ARTICLE

Information flow model of integrated security system

ValineviciusZilysEidukas

Journal:   Information Technology Interfaces Year: 2004 Pages: 567-572
JOURNAL ARTICLE

Information flow in the Security Management System

Marzena Graboń-ChałupczakWojciech Chałupczak

Journal:   Logistics and Transport Year: 2019 Vol: 42 (2)Pages: 21-26
BOOK-CHAPTER

Construction of Computer Network Security Information Leak-Proof Management System

Zejian Dong

Lecture notes on data engineering and communications technologies Year: 2022 Pages: 257-264
© 2026 ScienceGate Book Chapters — All rights reserved.