Sciweavers

56 search results - page 12 / 12
» Integrating Network Technique into Distributed Agent-Oriente...
Sort
View
POPL
2008
ACM
14 years 5 months ago
Cryptographically sound implementations for typed information-flow security
In language-based security, confidentiality and integrity policies conveniently specify the permitted flows of information between different parts of a program with diverse levels...
Cédric Fournet, Tamara Rezk