Login / Signup
Cryptographically sound implementations for typed information-flow security.
Cédric Fournet
Tamara Rezk
Published in:
POPL (2008)
Keyphrases
</>
information flow
information security
flow analysis
communication networks
flow graph
social networks
information flows
higher order
multi threaded
supply chain
databases
functional modules
multi context systems
software engineering
security issues
reactive systems
information technology