Amanote Research

Amanote Research

    RegisterSign In

Refactoring Programs to Secure Information Flows

doi 10.1145/1134744.1134758
Full Text
Open PDF
Abstract

Available in full text

Date

January 1, 2006

Authors
Scott F. SmithMark Thober
Publisher

ACM Press


Related search

Proof-Carrying Code Based Tool for Secure Information Flow of Assembly Programs

Journal of Computer Science
Computer NetworksSoftwareArtificial IntelligenceCommunications
2009English

A Case Against Indirect Jumps for Secure Programs

2019English

Span Programs and General Secure Multi-Party Computation

BRICS Report Series
1997English

Engineering Secure Information Systems

English

Using Information Flow Methods to Secure Cyber-Physical Systems

IFIP Advances in Information and Communication Technology
Computer NetworksInformation SystemsManagementCommunications
2015English

Determination of Refactoring Place in Modern Methodologies of Information Systems Development

Scientific notes of Taurida National V.I. Vernadsky University. Series: Technical Sciences
2019English

Secure Organ Transplant Information System

Facta Universitatis, Series: Automatic Control and Robotics
2018English

Using a Many-Objective Approach to Investigate Automated Refactoring

Information and Software Technology
Computer Science ApplicationsInformation SystemsSoftware
2019English

Comparing Approaches to Analyze Refactoring Activity on Software Repositories

Journal of Systems and Software
HardwareInformation SystemsArchitectureSoftware
2013English

Amanote Research

Note-taking for researchers

Follow Amanote

© 2025 Amaplex Software S.P.R.L. All rights reserved.

Privacy PolicyRefund Policy