Author of the publication

An Experience Using Two Covert Channel Analysis Techniques on a Real System Design.

, , , and . IEEE Symposium on Security and Privacy, page 14-24. IEEE Computer Society, (1986)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Introduction to a Formally Defined Hardware Description Language., , and . TPCD, volume A-10 of IFIP Transactions, page 3-35. North-Holland, (1992)Coding for a Believable Specification to Implementation Mapping., and . IEEE Symposium on Security and Privacy, page 140-149. IEEE Computer Society, (1987)Verified Compilation in micro-Gypsy.. Symposium on Testing, Analysis, and Verification, page 20-26. ACM, (1989)Secure Ada Target: Issues, System Design, and Verification., , , and . IEEE Symposium on Security and Privacy, page 176-183. IEEE Computer Society, (1985)Introducing Abstractions via Rewriting.. CHARME, volume 3725 of Lecture Notes in Computer Science, page 402-405. Springer, (2005)A preliminary evaluation of verifiability in Ada., , and . ACM Annual Conference, page 218-224. ACM, (1980)Formal Methods versus Software Engineering: Is There a Conflict?. Symposium on Testing, Analysis, and Verification, page 188-189. ACM, (1991)A State-Based Approach to Non-Interference., and . CSFW, page 11-21. IEEE Computer Society, (1994)Mathematical Modeling and Analysis of an External Memory Manager., and . FME, volume 1313 of Lecture Notes in Computer Science, page 237-257. Springer, (1997)Toward Verified Execution Environments., , and . IEEE Symposium on Security and Privacy, page 106-115. IEEE Computer Society, (1987)