Login / Signup
Checking security policies through an enhanced Control Flow Analysis.
Chiara Bodei
Pierpaolo Degano
Corrado Priami
Published in:
J. Comput. Secur. (2005)
Keyphrases
</>
flow analysis
security policies
access control
network security
information flow
security management
control system
distributed systems
security requirements
forensic analysis
machine learning
storage and retrieval
home network