A bottom-up approach to verifiable embedded system information flow security
Keyword(s):
2011 ◽
Vol 39
(3)
◽
pp. 189-200
◽