Cited By
View all- Seki H(2014)Extending Co-logic Programs for Branching-Time Model CheckingLogic-Based Program Synthesis and Transformation10.1007/978-3-319-14125-1_8(127-144)Online publication date: 11-Dec-2014
- Thuraisingham B(2013)An Infrastructure for a Secure CloudDeveloping and Securing the Cloud10.1201/b15433-50(543-561)Online publication date: 10-Oct-2013
- Rastogi AChaudhuri AJohnson R(2012)Types and Access Controls for Cross-Domain Security in FlashProgramming Languages and Systems10.1007/978-3-642-35182-2_7(82-97)Online publication date: 2012
- Show More Cited By