Login / Signup
Combining Different Proof Techniques for Verifying Information Flow Security.
Heiko Mantel
Henning Sudbrock
Tina Kraußer
Published in:
LOPSTR (2006)
Keyphrases
</>
information flow
information security
flow analysis
information flows
social networks
communication networks
flow graph
supply chain
security issues
multi threaded
functional modules
security requirements
database
decision making
information propagation
information systems
multi context systems