Anindya Banerjee, Heiko Mantel, David Naumann, and Andrei Sabelfeld. 03411 Final Report – Language Based Security. In Language-Based Security. Dagstuhl Seminar Proceedings, Volume 3411, pp. 1-5, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2005)
@InProceedings{banerjee_et_al:DagSemProc.03411.1, author = {Banerjee, Anindya and Mantel, Heiko and Naumann, David and Sabelfeld, Andrei}, title = {{03411 Final Report – Language Based Security}}, booktitle = {Language-Based Security}, pages = {1--5}, series = {Dagstuhl Seminar Proceedings (DagSemProc)}, ISSN = {1862-4405}, year = {2005}, volume = {3411}, editor = {Anindya Banerjee and Heiko Mantel and David Naumann and Andrei Sabelfeld}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/DagSemProc.03411.1}, URN = {urn:nbn:de:0030-drops-1724}, doi = {10.4230/DagSemProc.03411.1}, annote = {Keywords: Access control , information flow , noninterference , downgrading protocol analysis} }
Anindya Banerjee, Heiko Mantel, David Naumann, and Andrei Sabelfeld. 03411 Abstracts Collection – Language Based Security. In Language-Based Security. Dagstuhl Seminar Proceedings, Volume 3411, pp. 1-20, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2005)
@InProceedings{banerjee_et_al:DagSemProc.03411.2, author = {Banerjee, Anindya and Mantel, Heiko and Naumann, David and Sabelfeld, Andrei}, title = {{03411 Abstracts Collection – Language Based Security}}, booktitle = {Language-Based Security}, pages = {1--20}, series = {Dagstuhl Seminar Proceedings (DagSemProc)}, ISSN = {1862-4405}, year = {2005}, volume = {3411}, editor = {Anindya Banerjee and Heiko Mantel and David Naumann and Andrei Sabelfeld}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/DagSemProc.03411.2}, URN = {urn:nbn:de:0030-drops-1731}, doi = {10.4230/DagSemProc.03411.2}, annote = {Keywords: Access control , information flow , noninterference , downgrading protocol analysis} }
Feedback for Dagstuhl Publishing