Banatre et al., "Compile-time detection of information flow in sequential programs," 3.sup. rd European Symposium on Research in Computer Security (ESORICS), Brighton, UK, Nov. 1994. |
Denning et al., "Certification of Programs for Secure Information Flow," ACM Jul. 1977, vol. 20, No. 7, Operating Systems, R. S. Gaines Editor, pp. 504-513. |
Dijkstra, E.W., "States and Their Characterization," A Discipline of Programming, Prentice-Hall 1976, Chapter 2, pp. 10-37. |
Harel, D., "First-Order Dynamic Logic," Lecture Notes in Computer Science, Editor: Goos et al, Springer-Verlag, 1979, pp. 7-2.3. |
Hoare, C.A.R., "An Axiomatic Basis for Computer Programming," Communications of the ACM, vol. 12, No. 10, Oct. 1969. |
Hoare, C.A.R., "Proof of correctness of data representations," Acta Informatica, 1(4), 271-81, Springer-Verlag GmbH 1972. |
Hoare, C.A.R., "An axiomatic basis for computer programming," Comm. ACM 12(10), 576-80, 583, Oct. 1969. |
Kozen et al., "Logics of Programs," Handbook of Theoretical Computer Science, Editor: J. van Leeuwen, Elsevier Science Publishers B.V., 1990. |
Lampson, B.W., "A Note on the Confinement Problem," Comm. Of the ACM Oct. 1971, vol. 16, No. 10, Operating Systems, Editor: C. Weissman, 1973. |
Volpano et al., "A Type-Based Approach to Program Security," Proceedings of TAPSOFT '97, Colloquium on Formal Approaches in Software Engineering, Lille France, Apr. 14-18, 1997. |
The article "Communicating Sequential Processes" by C.A. Hoare in ACM, Aug. 1978. |
The article "An Axiomatic Basis for Computer Programming" by C.A.R. Hoare, in ACM, Oct. 1969. |