Anindya Banerjee, Heiko Mantel, David Naumann, and Andrei Sabelfeld. 03411 Final Report – Language Based Security. In Language-Based Security. Dagstuhl Seminar Proceedings, Volume 3411, pp. 1-5, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2005)
@InProceedings{banerjee_et_al:DagSemProc.03411.1,
author = {Banerjee, Anindya and Mantel, Heiko and Naumann, David and Sabelfeld, Andrei},
title = {{03411 Final Report – Language Based Security}},
booktitle = {Language-Based Security},
pages = {1--5},
series = {Dagstuhl Seminar Proceedings (DagSemProc)},
ISSN = {1862-4405},
year = {2005},
volume = {3411},
editor = {Anindya Banerjee and Heiko Mantel and David Naumann and Andrei Sabelfeld},
publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik},
address = {Dagstuhl, Germany},
URL = {https://drops.dagstuhl.de/entities/document/10.4230/DagSemProc.03411.1},
URN = {urn:nbn:de:0030-drops-1724},
doi = {10.4230/DagSemProc.03411.1},
annote = {Keywords: Access control , information flow , noninterference , downgrading protocol analysis}
}
Anindya Banerjee, Heiko Mantel, David Naumann, and Andrei Sabelfeld. 03411 Abstracts Collection – Language Based Security. In Language-Based Security. Dagstuhl Seminar Proceedings, Volume 3411, pp. 1-20, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2005)
@InProceedings{banerjee_et_al:DagSemProc.03411.2,
author = {Banerjee, Anindya and Mantel, Heiko and Naumann, David and Sabelfeld, Andrei},
title = {{03411 Abstracts Collection – Language Based Security}},
booktitle = {Language-Based Security},
pages = {1--20},
series = {Dagstuhl Seminar Proceedings (DagSemProc)},
ISSN = {1862-4405},
year = {2005},
volume = {3411},
editor = {Anindya Banerjee and Heiko Mantel and David Naumann and Andrei Sabelfeld},
publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik},
address = {Dagstuhl, Germany},
URL = {https://drops.dagstuhl.de/entities/document/10.4230/DagSemProc.03411.2},
URN = {urn:nbn:de:0030-drops-1731},
doi = {10.4230/DagSemProc.03411.2},
annote = {Keywords: Access control , information flow , noninterference , downgrading protocol analysis}
}