Proceedings of Third Internatinal Conference on Information and Communications Security (ICICS 2001), Lecture Notes in Computer Science 2229, pp.292-303,Xian, China, Nov. 2001.
Type
inproceeding / 国際会議
Date
Nov 21, 2001
ID
358
Society name
ICICS
Files
Citation
@inproceedings{2001ID358,
author = {Kuninobu, Shigeta and Takata, Yoshiaki and Seki, Hiroyuki and Inoue, Katsuro},
booktitle = {Proceedings of {Third} {Internatinal} {Conference} on {Information} and {Communications} {Security} ({ICICS} 2001), {Lecture} {Notes} in {Computer} {Science} 2229, pp.292-303,{Xian}, {China}, {Nov}. 2001.},
year = {2001},
month = {nov 21},
title = {An {Efficient} {Information} {Flow} {Analysis} of {Recursive} {Programs} based on a {Lattice} {Model} of {Security} {Classes}},
}