Crossref Citations
This article has been cited by the following publications. This list is generated based on data provided by
Crossref.
Barthe, Gilles
and
Nieto, Leonor Prensa
2004.
Formally verifying information flow type systems for concurrent and thread systems.
p.
13.
Jeffrey, Alan
and
Rathke, Julian
2005.
Programming Languages and Systems.
Vol. 3444,
Issue. ,
p.
423.
Sabelfeld, A.
and
Sands, D.
2005.
Dimensions and Principles of Declassification.
p.
255.
Barthe, Gilles
and
Rezk, Tamara
2005.
Non-interference for a JVM-like language.
p.
103.
Jacobs, Bart
Pieters, Wolter
and
Warnier, Martijn
2005.
Statically checking confidentiality via dynamic labels.
p.
50.
Banerjee, Anindya
and
Naumann, David A.
2005.
Construction and Analysis of Safe, Secure, and Interoperable Smart Devices.
Vol. 3362,
Issue. ,
p.
27.
Naumann, David A.
2005.
Theorem Proving in Higher Order Logics.
Vol. 3603,
Issue. ,
p.
211.
Barthe, Gilles
and
Dufay, Guillaume
2005.
Foundations of Security Analysis and Design III.
Vol. 3655,
Issue. ,
p.
133.
Barnett, Mike
Naumann, David A.
Schulte, Wolfram
and
Sun, Qi
2006.
Emerging Trends in Information and Communication Security.
Vol. 3995,
Issue. ,
p.
321.
Broberg, Niklas
and
Sands, David
2006.
Programming Languages and Systems.
Vol. 3924,
Issue. ,
p.
180.
Amtoft, Torben
Bandhakavi, Sruthi
and
Banerjee, Anindya
2006.
A logic for information flow in object-oriented programs.
p.
91.
Naumann, David A.
2006.
Computer Security – ESORICS 2006.
Vol. 4189,
Issue. ,
p.
279.
Naumann, David A.
and
Barnett, Mike
2006.
Towards imperative modules: Reasoning about invariants and sharing of mutable state.
Theoretical Computer Science,
Vol. 365,
Issue. 1-2,
p.
143.
Hedin, D.
and
Sands, D.
2006.
Noninterference in the Presence of Non-Opaque Pointers.
p.
217.
Amtoft, Torben
Bandhakavi, Sruthi
and
Banerjee, Anindya
2006.
A logic for information flow in object-oriented programs.
ACM SIGPLAN Notices,
Vol. 41,
Issue. 1,
p.
91.
Hicks, Boniface
King, Dave
McDaniel, Patrick
and
Hicks, Michael
2006.
Trusted declassification:.
p.
65.
Barthe, G.
Naumann, D.
and
Rezk, T.
2006.
Deriving an information flow checker and certifying compiler for Java.
p.
13 pp..
Boudol, Gérard
and
Kolundžija, Marija
2007.
Computer Network Security.
Vol. 1,
Issue. ,
p.
85.
Naumann, David A.
2007.
Observational purity and encapsulation.
Theoretical Computer Science,
Vol. 376,
Issue. 3,
p.
205.
Barthe, Gilles
Beringer, Lennart
Crégut, Pierre
Grégoire, Benjamin
Hofmann, Martin
Müller, Peter
Poll, Erik
Puebla, Germán
Stark, Ian
and
Vétillard, Eric
2007.
Trustworthy Global Computing.
Vol. 4661,
Issue. ,
p.
10.
Discussions
No Discussions have been published for this article.