Author of the publication

Trust-Based Enforcement of Security Policies.

, , , , , and . TGC, volume 8902 of Lecture Notes in Computer Science, page 176-191. Springer, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Validating firewalls using flow logics., , and . Theor. Comput. Sci., 283 (2): 381-418 (2002)Two-Level Semantics and Code Generation., and . Theor. Comput. Sci., (1988)A Kleene Analysis of Mobile Ambients., , and . ESOP, volume 1782 of Lecture Notes in Computer Science, page 305-319. Springer, (2000)Static Analysis for Secrecy and Non-interference in Networks of Processes., , , and . PaCT, volume 2127 of Lecture Notes in Computer Science, page 27-41. Springer, (2001)Broadcast, Denial-of-Service, and Secure Communication., , and . IFM, volume 7940 of Lecture Notes in Computer Science, page 412-427. Springer, (2013)Formal Security Analysis of the MaCAN Protocol., , , and . IFM, volume 8739 of Lecture Notes in Computer Science, page 241-255. Springer, (2014)From Flow Logic to Static Type Systems for Coordination Languages., , , , , , and . COORDINATION, volume 5052 of Lecture Notes in Computer Science, page 100-116. Springer, (2008)A Calculus for Quality., , and . FACS, volume 7684 of Lecture Notes in Computer Science, page 188-204. Springer, (2012)Polymorphic Subtyping for Effect Analysis: The Static Semantics., , and . LOMAPS, volume 1192 of Lecture Notes in Computer Science, page 141-171. Springer, (1996)Polymorphic Subtyping for Effect Analysis: The Dynamic Semantics., , , and . LOMAPS, volume 1192 of Lecture Notes in Computer Science, page 172-206. Springer, (1996)