Automated Analysis of Java Methods for Confidentiality
Cerny P, Alur R. 2009. Automated Analysis of Java Methods for Confidentiality. CAV: Computer Aided Verification, LNCS, , 173–187.
Download
No fulltext has been uploaded. References only!
DOI
Conference Paper
| Published
Author
Cerny, PavolISTA;
Alur, Rajeev
Series Title
LNCS
Publishing Year
Date Published
2009-07-01
Publisher
Springer
Page
173 - 187
Conference
CAV: Computer Aided Verification
IST-REx-ID
Cite this
Cerny P, Alur R. Automated Analysis of Java Methods for Confidentiality. In: Springer; 2009:173-187. doi:1548
Cerny, P., & Alur, R. (2009). Automated Analysis of Java Methods for Confidentiality (pp. 173–187). Presented at the CAV: Computer Aided Verification, Springer. https://doi.org/1548
Cerny, Pavol, and Rajeev Alur. “Automated Analysis of Java Methods for Confidentiality,” 173–87. Springer, 2009. https://doi.org/1548.
P. Cerny and R. Alur, “Automated Analysis of Java Methods for Confidentiality,” presented at the CAV: Computer Aided Verification, 2009, pp. 173–187.
Cerny P, Alur R. 2009. Automated Analysis of Java Methods for Confidentiality. CAV: Computer Aided Verification, LNCS, , 173–187.
Cerny, Pavol, and Rajeev Alur. Automated Analysis of Java Methods for Confidentiality. Springer, 2009, pp. 173–87, doi:1548.