DOI: 10.31274/rtd-180813-10644
|View full text |Cite
|
Sign up to set email alerts
|

Highly-structured software for network systems and its protection

Abstract: 4.1.1 Access matrix model 4.1.2 Information flow model 4.1.3 Restrictions of the access matrix model 4.1.4 Problems of applying existing information flow models to the RM system 4.2 Overview of the Information Flow Control Mechanism 83 iv 4.2.1 Introduction 83 4.2.2 Handling implicit flows 94 4.2.3 Some remarks on probes and dynamically bound state variables 4.3 The Compile-Time Algorithm 4.3.1 Reduction rules 4.3.2 Generation of information flow templates 4.4 The Run-Time Algorithm 4.5 Program Examples 130 4.… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...

Citation Types

0
0
0

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
references
References 32 publications
0
0
0
Order By: Relevance