BOOK-CHAPTER

Combining Different Proof Techniques for Verifying Information Flow Security

Heiko MantelHenning SudbrockTina Kraußer

Year: 2007 Lecture notes in computer science Pages: 94-110   Publisher: Springer Science+Business Media
Keywords:
Computer science Information flow Proof of concept Theoretical computer science Programming language Computer security

Metrics

19
Cited By
1.14
FWCI (Field Weighted Citation Impact)
42
Refs
0.80
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Citation History

Topics

Security and Verification in Computing
Physical Sciences →  Computer Science →  Artificial Intelligence
Advanced Malware Detection Techniques
Physical Sciences →  Computer Science →  Signal Processing
Network Security and Intrusion Detection
Physical Sciences →  Computer Science →  Computer Networks and Communications

Related Documents

JOURNAL ARTICLE

Verifying information flow goals in Security-Enhanced Linux

Joshua D. GuttmanAmy L. HerzogJohn D. RamsdellClement William Skorupka

Journal:   Journal of Computer Security Year: 2005 Vol: 13 (1)Pages: 115-134
JOURNAL ARTICLE

Combining management and information flow techniques

Huan Neng Chiu

Journal:   Management Decision Year: 1995 Vol: 33 (4)Pages: 52-64
BOOK-CHAPTER

A Proof System for Information Flow Security

Annalisa BossiRiccardo FocardiCarla PiazzaSabina Rossi

Lecture notes in computer science Year: 2003 Pages: 199-218
BOOK-CHAPTER

Verifying Abstract Information Flow Properties in Fault Tolerant Security Devices

Tim McCombLuke Wildman

Lecture notes in computer science Year: 2006 Pages: 621-638
© 2026 ScienceGate Book Chapters — All rights reserved.