Home
Publishing
DrugRxiv
Drug Repurposing
Network Medicine
About
REPO4EU
Meet the team
Drug Repurposing Research Collection
Conference
Blog
My ScienceOpen
Sign in
Register
Dashboard
Search
Home
Publishing
DrugRxiv
Drug Repurposing
Network Medicine
About
REPO4EU
Meet the team
Drug Repurposing Research Collection
Conference
My ScienceOpen
Sign in
Register
Dashboard
Search
34
views
12
references
Top references
cited by
13
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
3,197
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
Security in Pervasive Computing
A Theorem Proving Approach to Analysis of Secure Information Flow
other
Author(s):
Ádám Darvas
,
Reiner Hähnle
,
David Sands
Publication date
(Print):
2005
Publisher:
Springer Berlin Heidelberg
Read this book at
Publisher
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Management Information Systems
Most cited references
12
Record
: found
Abstract
: not found
Article
: not found
Language-based information-flow security
A. Sabelfeld
,
A.C. Myers
(2003)
0
comments
Cited
125
times
– based on
0
reviews
Review now
Bookmark
Record
: found
Abstract
: not found
Article
: not found
Certification of programs for secure information flow
Peter J. Denning
,
Dorothy Denning
(1977)
0
comments
Cited
68
times
– based on
0
reviews
Review now
Bookmark
Record
: found
Abstract
: not found
Book
: not found
Dynamic Logic
David Harel
,
Dexter Kozen
,
Jerzy Tiuryn
(2000)
0
comments
Cited
54
times
– based on
0
reviews
Bookmark
All references
Author and book information
Book Chapter
Publication date (Print):
2005
Pages
: 193-209
DOI:
10.1007/978-3-540-32004-3_20
SO-VID:
59edd779-56b3-478d-b334-3b2b5e252b8f
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 164
Privacy for Profitable Location Based Services
pp. 70
Challenge-Response Based RFID Authentication Protocol for Distributed Database Environment
pp. 179
On the Anonymity of Periodic Location Samples
pp. 193
A Theorem Proving Approach to Analysis of Secure Information Flow
Similar content
3,197
Privacy as Personality Right: Why the ECtHR’s Focus on Ulterior Interests Might Prove Indispensable in the Age of “Big Data”
Authors:
Bart Van der Sloot
,
B. van der Sloot
“Tobacco Smoking as a Possible Etiologic Factor in Bronchiogenic Carcinoma: A Study of Six Hundred and Eighty-four Proved Cases,”
Authors:
Wynder and Ernest L.
,
Graham Evarts A
Kashiwadiagen nov (Physciaceae lichen-forming Ascomycota) proved by phylogenetic analysis of the Eastern Asian Physciaceae
Authors:
S Kondratyuk
,
L Lökös
,
J. KIM
…
See all similar
Cited by
13
Preserving Secrecy Under Refinement
Authors:
Rajeev Alur
,
Pavol Černý
,
Steve Zdancewic
Secure information flow by self-composition
Authors:
GILLES BARTHE
,
PEDRO D'ARGENIO
,
TAMARA REZK
From Coupling Relations to Mated Invariants for Checking Information Flow
Authors:
David Naumann
See all cited by