A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is
II Preface erties. In particular, revocation of key entries was identified here as an interesting challenge for non-interference approaches. A final workshop session for the challenge had been planned at ETAPS (along with the VerifyThis program verification competition). Since ETAPS has been postponed, we met and exchanged online. During the online meeting, the different solutions were briefly explained, and we discussed the approaches, how they can benefit from one another and how furtherdoi:10.5445/ir/1000119426 fatcat:2uyds54vnfhczidjhvnsywsjte