Security Type Checking for MILS-AADL Specifications

Conference object, Other literature type OPEN
Pol, Kevin; Noll, Thomas;
(2015)
  • Publisher: Zenodo
  • Related identifiers: doi: 10.5281/zenodo.47989
  • Subject: information flow | information flow | MILS components | Security | type system

Information flow policies are widely used for specifying confidentiality and integrity requirements of security-critical systems. In contrast to access control policies and security protocols, they impose global constraints on the information flow and thus provide end-t... View more
Share - Bookmark

  • Download from
    ZENODO via ZENODO (Conference object, 2015)
  • Cite this publication