Cited By
View all- Ghosal SShyamasundar RJuristo N(2021)An axiomatic approach to detect information leaks in concurrent programsProceedings of the 43rd International Conference on Software Engineering: New Ideas and Emerging Results10.1109/ICSE-NIER52604.2021.00015(31-35)Online publication date: 25-May-2021
- Zeng WKoutny MWatson PGermanos V(2016)Formal verification of secure information flow in cloud computingJournal of Information Security and Applications10.1016/j.jisa.2016.03.00227:C(103-116)Online publication date: 1-Apr-2016
- Rafnsson WGarg DSabelfeld A(2016)Progress-Sensitive Security for SPARKProceedings of the 8th International Symposium on Engineering Secure Software and Systems - Volume 963910.1007/978-3-319-30806-7_2(20-37)Online publication date: 6-Apr-2016
- Show More Cited By