共 41 条
- [1] AMTOFT T, 2006, P S PRINC PROGR LANG
- [2] [Anonymous], MATH OPERATIONS RES
- [3] [Anonymous], LATTE
- [4] [Anonymous], P 14 ACM C COMP COMM
- [5] Ash R., 1990, Information Theory
- [6] BALL T, 2001, ACM SIGPLAN NOTICES, V36
- [7] Expressive declassification policies and modular static enforcement [J]. PROCEEDINGS OF THE 2008 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, 2008, : 339 - +
- [8] Secure information flow by self-composition [J]. 17TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS, 2004, : 100 - 114
- [9] Cachin Christian, 1997, Entropy measures and unconditional security in cryptography
- [10] Compositional Shape Analysis by means of Bi-Abduction [J]. ACM SIGPLAN NOTICES, 2009, 44 (01) : 289 - 300