ASIAN   2006 Algorithms
Wall of Fame | Most Viewed ASIAN-2006 Paper
153views Algorithms» more  ASIAN 2006»
13 years 9 months ago
Automata-Based Confidentiality Monitoring
Abstract Non-interference is typically used as a baseline security policy to formalize confidentiality of secret information manipulated by a program. In contrast to static checkin...
Gurvan Le Guernic, Anindya Banerjee, Thomas P. Jen...
Disclaimer and Copyright Notice
Sciweavers respects the rights of all copyright holders and in this regard, authors are only allowed to share a link to their preprint paper on their own website. Every contribution is associated with a desciptive image. It is the sole responsibility of the authors to ensure that their posted image is not copyright infringing. This service is compliant with IEEE copyright.
1Download preprint from source153
2Download preprint from source152
3Download preprint from source140
4Download preprint from source140
5Download preprint from source139
6Download preprint from source134
7Download preprint from source133
8Download preprint from source131
9Download preprint from source126
10Download preprint from source118
11Download preprint from source116
12Download preprint from source104
13Download preprint from source103
14Download preprint from source98
15Download preprint from source91
16Download preprint from source80
17Download preprint from source76