Formal verification of secure information flow in cloud computing
- Submitting institution
-
De Montfort University
- Unit of assessment
- 11 - Computer Science and Informatics
- Output identifier
- 11166
- Type
- D - Journal article
- DOI
-
10.1016/j.jisa.2016.03.002
- Title of journal
- Journal of Information Security and Applications
- Article number
- -
- First page
- 103
- Volume
- 27-28
- Issue
- -
- ISSN
- 2214-2126
- Open access status
- Technical exception
- Month of publication
- -
- Year of publication
- 2016
- URL
-
-
- Supplementary information
-
-
- Request cross-referral to
- -
- Output has been delayed by COVID-19
- No
- COVID-19 affected output statement
- -
- Forensic science
- No
- Criminology
- No
- Interdisciplinary
- No
- Number of additional authors
-
-
- Research group(s)
-
-
- Citation count
- 11
- Proposed double-weighted
- No
- Reserve for an output with double weighting
- No
- Additional information
- This article is an extension of a conference paper, published in IEEE Cloud Computing Technology and Science (CloudCom) which is one of the top conference in cloud computing. This methodology has been used by RedHat Newcastle to analyse workflow security in distributed systems.
- Author contribution statement
- -
- Non-English
- No
- English abstract
- -