@dblp

A Per Model of Secure Information Flow in Sequential Programs.

, and . ESOP, volume 1576 of Lecture Notes in Computer Science, page 40-58. Springer, (1999)

Links and resources

Tags