Security Type Checking for MILS-AADL Specifications

Conference object OPEN
Pol, Kevin; Noll, Thomas;
(2015)

Information flow policies are widely used for specifying confidentiality and integrity requirements of security-critical systems. In contrast to access control policies and security protocols, they impose global constraints on the information flow and thus provide end-t... View more
Share - Bookmark

  • Download from
    ZENODO via ZENODO (Conference object, 2015)
  • Cite this publication