Login / Signup

Proofs Methods for Bisimulation Based Information Flow Security.

Riccardo FocardiCarla PiazzaSabina Rossi
Published in: VMCAI (2002)
Keyphrases
  • information flow
  • information security
  • databases
  • data mining
  • markov chain
  • intrusion detection
  • security issues