Author of the publication

Analyzing Security-Enhanced Linux Policy Specifications.

, , and . POLICY, page 158-. IEEE Computer Society, (2003)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Analyzing Security-Enhanced Linux Policy Specifications., , and . POLICY, page 158-. IEEE Computer Society, (2003)Applying Formal Methods to an Information Security Device: An Experience Report., , and . HASE, page 81-88. IEEE Computer Society, (1999)Can We Build an Automatic Program Verifier? Invariant Proofs and Other Challenges.. VSTTE, volume 4171 of Lecture Notes in Computer Science, page 308-317. Springer, (2005)Partial Implementations of Abstract Data Types: Theory and Practice. University of Illinois Urbana-Champaign, USA, (1988)Extended abstract: organizing automaton specifications to achieve faithful representation., and . MEMOCODE, page 245-246. IEEE Computer Society, (2005)SCR: A Practical Approach to Building a High Assurance COMSEC System., , and . ACSAC, page 109-118. IEEE Computer Society, (1999)Towards a Formal Verification of a Floating Point Coprocessor and its Composition with a Central Processing Unit., , , and . TPHOLs, volume A-20 of IFIP Transactions, page 427-447. North-Holland/Elsevier, (1992)Mechanizing a Programming Logic for the Concurrent Programming Language microSR in HOL., , , , , , and . HUG, volume 780 of Lecture Notes in Computer Science, page 29-42. Springer, (1993)Direct generation of invariants for reactive models., , , and . MEMOCODE, page 119-130. IEEE, (2012)Human-Style Theorem Proving Using PVS., and . TPHOLs, volume 1275 of Lecture Notes in Computer Science, page 33-48. Springer, (1997)