Login / Signup
Secure Information Flow Verification with Mutable Dependent Types.
Andrew Ferraiuolo
Weizhe Hua
Andrew C. Myers
G. Edward Suh
Published in:
DAC (2017)
Keyphrases
</>
information flow
flow analysis
social networks
communication networks
information flows
cryptographic protocols
information security
security analysis
supply chain
functional modules
flow graph
database systems
model checking
information diffusion
reactive systems