Automated Analysis of Java Methods for Confidentiality

Cerny P, Alur R. 2009. Automated Analysis of Java Methods for Confidentiality. CAV: Computer Aided Verification, LNCS, , 173–187.

Download
No fulltext has been uploaded. References only!

DOI
Conference Paper | Published
Author
Cerny, PavolISTA; Alur, Rajeev
Series Title
LNCS
Publishing Year
Date Published
2009-07-01
Publisher
Springer
Page
173 - 187
Conference
CAV: Computer Aided Verification
IST-REx-ID

Cite this

Cerny P, Alur R. Automated Analysis of Java Methods for Confidentiality. In: Springer; 2009:173-187. doi:1548
Cerny, P., & Alur, R. (2009). Automated Analysis of Java Methods for Confidentiality (pp. 173–187). Presented at the CAV: Computer Aided Verification, Springer. https://doi.org/1548
Cerny, Pavol, and Rajeev Alur. “Automated Analysis of Java Methods for Confidentiality,” 173–87. Springer, 2009. https://doi.org/1548.
P. Cerny and R. Alur, “Automated Analysis of Java Methods for Confidentiality,” presented at the CAV: Computer Aided Verification, 2009, pp. 173–187.
Cerny P, Alur R. 2009. Automated Analysis of Java Methods for Confidentiality. CAV: Computer Aided Verification, LNCS, , 173–187.
Cerny, Pavol, and Rajeev Alur. Automated Analysis of Java Methods for Confidentiality. Springer, 2009, pp. 173–87, doi:1548.

Export

Marked Publications

Open Data ISTA Research Explorer

Search this title in

Google Scholar