Login / Signup
Toward Automated Information-Flow Integrity Verification for Security-Critical Applications.
Umesh Shankar
Trent Jaeger
Reiner Sailer
Published in:
NDSS (2006)
Keyphrases
</>
information flow
integrity verification
information security
social networks
flow analysis
communication networks
copyright protection
information flows
supply chain
multi context systems
flow graph
databases
information hiding
information systems
case study