Login / Signup
Dependent Type Theory for Verification of Information Flow and Access Control Policies.
Aleksandar Nanevski
Anindya Banerjee
Deepak Garg
Published in:
ACM Trans. Program. Lang. Syst. (2013)
Keyphrases
</>
information flow
access control policies
access control systems
information flows
social networks
access control
conflict resolution
communication networks
formal methods
model checking
information security
supply chain
database
databases
decision making
security policies