2011
DOI: 10.1016/j.jsc.2011.05.003
|View full text |Cite
|
Sign up to set email alerts
|

Formal enforcement of security policies on concurrent systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2012
2012
2017
2017

Publication Types

Select...
3
2
1

Relationship

1
5

Authors

Journals

citations
Cited by 11 publications
(1 citation statement)
references
References 8 publications
0
1
0
Order By: Relevance
“…Recently, program rewriting [14], [15], [22], [23] techniques show their promising future, since they gather advantages of previous techniques. The basic idea is to rewrite an untrusted program statically so that the new generated version respects some security requirements.…”
Section: Recent Work Of Clarkson and Schneider Introducesmentioning
confidence: 99%
“…Recently, program rewriting [14], [15], [22], [23] techniques show their promising future, since they gather advantages of previous techniques. The basic idea is to rewrite an untrusted program statically so that the new generated version respects some security requirements.…”
Section: Recent Work Of Clarkson and Schneider Introducesmentioning
confidence: 99%