Home
Journals
Archaeology International
Architecture_MPS
Europe and the World: A law review
Film Education Journal
History Education Research Journal
International Journal of Development Education and Global Learning
International Journal of Social Pedagogy
Jewish Historical Studies: A Journal of English-Speaking Jewry
Journal of Bentham Studies
London Review of Education
Radical Americas
Research for All
The Journal of the Sylvia Townsend Warner Society
The London Journal of Canadian Studies
About
About UCL Press
Who we are
Contact us
My ScienceOpen
Sign in
Register
Dashboard
Search
Home
Journals
Archaeology International
Architecture_MPS
Europe and the World: A law review
Film Education Journal
History Education Research Journal
International Journal of Development Education and Global Learning
International Journal of Social Pedagogy
Jewish Historical Studies: A Journal of English-Speaking Jewry
Journal of Bentham Studies
London Review of Education
Radical Americas
Research for All
The Journal of the Sylvia Townsend Warner Society
The London Journal of Canadian Studies
About
About UCL Press
Who we are
Contact us
My ScienceOpen
Sign in
Register
Dashboard
Search
35
views
12
references
Top references
cited by
13
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
4,265
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
Security in Pervasive Computing
A Theorem Proving Approach to Analysis of Secure Information Flow
other
Author(s):
Ádám Darvas
,
Reiner Hähnle
,
David Sands
Publication date
(Print):
2005
Publisher:
Springer Berlin Heidelberg
Read this book at
Publisher
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Management Information Systems
Most cited references
12
Record
: found
Abstract
: not found
Article
: not found
Language-based information-flow security
A. Sabelfeld
,
A.C. Myers
(2003)
0
comments
Cited
125
times
– based on
0
reviews
Review now
Bookmark
Record
: found
Abstract
: not found
Article
: not found
Certification of programs for secure information flow
Peter J. Denning
,
Dorothy Denning
(1977)
0
comments
Cited
68
times
– based on
0
reviews
Review now
Bookmark
Record
: found
Abstract
: not found
Book
: not found
Dynamic Logic
David Harel
,
Dexter Kozen
,
Jerzy Tiuryn
(2000)
0
comments
Cited
54
times
– based on
0
reviews
Bookmark
All references
Author and book information
Book Chapter
Publication date (Print):
2005
Pages
: 193-209
DOI:
10.1007/978-3-540-32004-3_20
SO-VID:
59edd779-56b3-478d-b334-3b2b5e252b8f
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 164
Privacy for Profitable Location Based Services
pp. 70
Challenge-Response Based RFID Authentication Protocol for Distributed Database Environment
pp. 179
On the Anonymity of Periodic Location Samples
pp. 193
A Theorem Proving Approach to Analysis of Secure Information Flow
Similar content
4,265
Graph Representations for Higher-Order Logic and Theorem Proving
Authors:
Aditya Paliwal
,
Sarah Loos
,
Markus N. Rabe
…
Static semantic analysis and theorem proving for CASL
Authors:
Till Mossakowski
,
Kolyang
,
Bernd Krieg-Brückner
CardioMEMS: Proving that Failure is not the only option for HF patients
Authors:
Carolyn Nissley
,
Justin D. Roberts
,
Lisa D. Rathman
…
See all similar
Cited by
13
Preserving Secrecy Under Refinement
Authors:
Rajeev Alur
,
Pavol Černý
,
Steve Zdancewic
Secure information flow by self-composition
Authors:
GILLES BARTHE
,
PEDRO D'ARGENIO
,
TAMARA REZK
From Coupling Relations to Mated Invariants for Checking Information Flow
Authors:
David Naumann
See all cited by