Cited By
View all- Seifermann SHeinrich RWerle DReussner R(2022)Detecting violations of access control and information flow policies in data flow diagramsJournal of Systems and Software10.1016/j.jss.2021.111138184:COnline publication date: 1-Feb-2022
- Xu MJin ZZhang FCui F(2020)Information Flow-Based Security Construction for Compositional Interface AutomataTrusted Computing and Information Security10.1007/978-981-15-3418-8_3(31-43)Online publication date: 20-Feb-2020
- Tuma KScandariato RBalliu M(2019)Flaws in Flows: Unveiling Design Flaws via Information Flow Analysis2019 IEEE International Conference on Software Architecture (ICSA)10.1109/ICSA.2019.00028(191-200)Online publication date: Mar-2019
- Show More Cited By