Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
ComputingReviews.com
  Dependent type theory for verification of information flow and access control policies
Nanevski A., Banerjee A., Garg D. ACM Transactions on Programming Languages and Systems35(2):1-41,2013.Type:Article
 
  Published By: ACM Press  
 
  Use your personal or institutional subscription to read the
fulltext of the article.
 
       
 
  You can purchase an article without having a subscription.
 
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy