Cited By
View all- Wolf FMüller PLuo BLiao XXu JKirda ELie D(2024)Verifiable Security Policies for Distributed SystemsProceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security10.1145/3658644.3690303(4-18)Online publication date: 2-Dec-2024
- Menz JHirsch ALi PGarg D(2023)Compositional Security Definitions for Higher-Order Where DeclassificationProceedings of the ACM on Programming Languages10.1145/35860417:OOPSLA1(406-433)Online publication date: 6-Apr-2023
- Kozyri ESchneider F(2020)RIFJournal of Computer Security10.3233/JCS-19131628:2(191-228)Online publication date: 1-Jan-2020
- Show More Cited By