𝔖 Bobbio Scriptorium
✦   LIBER   ✦

A bottom-up approach to verifiable embedded system information flow security

✍ Scribed by Ma, Bo; Mu, Dejun; Mao, Baolei; Hu, Wei


Book ID
121851000
Publisher
The Institution of Engineering and Technology
Year
2014
Tongue
English
Weight
259 KB
Volume
8
Category
Article
ISSN
1751-8709

No coin nor oath required. For personal study only.


πŸ“œ SIMILAR VOLUMES


How to Set Up Information Systems: A Non
✍ Simon Bell, Trevor Wood-Harper πŸ“‚ Library πŸ“… 2003 πŸ› Earthscan Publications Ltd. 🌐 English βš– 4 MB

A spectacular dialogue of the deaf has been on-going for many years. Information systems are as misunderstood today as they have been for a decade. The designers who make them, the managers who commission them and the stakeholders who use them consistently fail to communicate with each other resulti

[Lecture Notes in Computer Science] Info
✍ Jajodia, Sushil; Mazumdar, Chandan πŸ“‚ Article πŸ“… 2005 πŸ› Springer Berlin Heidelberg 🌐 German βš– 250 KB

This Book Constitutes The Refereed Proceedings Of The First International Conference On Information Systems Security, Iciss 2005, Held In Calcutta, India In December 2005. The 19 Revised Papers Presented Together With 4 Invited Papers And 5 Ongoing Project Summaries Were Carefully Reviewed And Selec