Amanote Research
Register
Sign In
Refactoring Programs to Secure Information Flows
doi 10.1145/1134744.1134758
Full Text
Open PDF
Abstract
Available in
full text
Date
January 1, 2006
Authors
Scott F. Smith
Mark Thober
Publisher
ACM Press
Related search
Proof-Carrying Code Based Tool for Secure Information Flow of Assembly Programs
Journal of Computer Science
Computer Networks
Software
Artificial Intelligence
Communications
A Case Against Indirect Jumps for Secure Programs
Span Programs and General Secure Multi-Party Computation
BRICS Report Series
Engineering Secure Information Systems
Using Information Flow Methods to Secure Cyber-Physical Systems
IFIP Advances in Information and Communication Technology
Computer Networks
Information Systems
Management
Communications
Determination of Refactoring Place in Modern Methodologies of Information Systems Development
Scientific notes of Taurida National V.I. Vernadsky University. Series: Technical Sciences
Secure Organ Transplant Information System
Facta Universitatis, Series: Automatic Control and Robotics
Using a Many-Objective Approach to Investigate Automated Refactoring
Information and Software Technology
Computer Science Applications
Information Systems
Software
Comparing Approaches to Analyze Refactoring Activity on Software Repositories
Journal of Systems and Software
Hardware
Information Systems
Architecture
Software