Applying the Opacified Computation Model to Enforce Information Flow Policies in IoT Applications

Amir Rahmati, Earlence Fernandes, Atul Prakash. Applying the Opacified Computation Model to Enforce Information Flow Policies in IoT Applications. In IEEE Cybersecurity Development, SecDev 2016, Boston, MA, USA, November 3-4, 2016. pages 88-93, IEEE, 2016. [doi]

@inproceedings{RahmatiFP16,
  title = {Applying the Opacified Computation Model to Enforce Information Flow Policies in IoT Applications},
  author = {Amir Rahmati and Earlence Fernandes and Atul Prakash},
  year = {2016},
  doi = {10.1109/SecDev.2016.031},
  url = {https://doi.org/10.1109/SecDev.2016.031},
  researchr = {https://researchr.org/publication/RahmatiFP16},
  cites = {0},
  citedby = {0},
  pages = {88-93},
  booktitle = {IEEE Cybersecurity Development, SecDev 2016, Boston, MA, USA, November 3-4, 2016},
  publisher = {IEEE},
  isbn = {978-1-5090-5589-0},
}