Article,

Non-interference through Determinism.

, , and .
Journal of Computer Security, 4 (1): 27-54 (1996)

Meta data

Tags

Users

  • @dblp

Comments and Reviews