Login / Signup
Verifying a Secure Information Flow Analyzer.
David A. Naumann
Published in:
TPHOLs (2005)
Keyphrases
</>
information flow
flow analysis
social networks
information flows
communication networks
supply chain
information security
flow graph
functional modules
reactive systems
database
data acquisition
key management
decision making
model checking