Login / Signup
Verification of Information Flow and Access Control Policies with Dependent Types.
Aleksandar Nanevski
Anindya Banerjee
Deepak Garg
Published in:
IEEE Symposium on Security and Privacy (2011)
Keyphrases
</>
information flow
access control policies
conflict resolution
access control
information flows
information security
communication networks
flow graph
social networks
distributed environment
access control systems
supply chain
fine grained
database systems