Login / Signup
Runtime verification using policy-based approach to control information flow.
Mohamed Sarrab
Published in:
Int. J. Secur. Networks (2013)
Keyphrases
</>
information flow
flow analysis
social networks
control system
information flows
information security
communication networks
supply chain
control policy
functional modules
control policies
action selection
real world
database systems
network traffic
team members