-
1
-
-
84872312669
-
-
43-54, Franconia, New Hampshire, June 1991.
-
P.G. Allen, "A Comparison of NonInterference and NonDeducibility using CSP," Proc. Fourth IEEE Computer Security Foundations Workshop, pp. 43-54, Franconia, New Hampshire, June 1991.
-
A Comparison of NonInterference and NonDeducibility Using CSP, Proc. Fourth IEEE Computer Security Foundations Workshop, Pp.
-
-
Allen, P.G.1
-
3
-
-
0021870594
-
-
37, pp. 77-121, 1985.
-
J.A. Bergstra and J.W. Klop, "Algebra of Communicating Processes with Abstraction," Theoretical Computer Science, vol. 37, pp. 77-121, 1985.
-
And J.W. Klop, Algebra of Communicating Processes with Abstraction, Theoretical Computer Science, Vol.
-
-
Bergstra, J.A.1
-
4
-
-
0021465083
-
-
31, no. 3, pp. 560-599, July 1984.
-
S.D. Brookes, C.A.R. Hoare, and A.W. Roscoe, "A Theory of Communicating Sequential Processes," J. ACM, vol. 31, no. 3, pp. 560-599, July 1984.
-
C.A.R. Hoare, and A.W. Roscoe, A Theory of Communicating Sequential Processes, J. ACM, Vol.
-
-
Brookes, S.D.1
-
5
-
-
0027342054
-
-
15 no. 1, pp. 36-72, Jan. 1993.
-
R. Cleaveland, J. Parrow, and B. Steffen, "The Concurrency Workbench: A Semantics Based Tool for the Verification of Concurrent Systems," ACM Trans. Programming Languages and Systems, vol. 15 no. 1, pp. 36-72, Jan. 1993.
-
J. Parrow, and B. Steffen, the Concurrency Workbench: A Semantics Based Tool for the Verification of Concurrent Systems, ACM Trans. Programming Languages and Systems, Vol.
-
-
Cleaveland, R.1
-
6
-
-
0029711948
-
-
116-122. IEEE CSPress, June 1996.
-
R. Focardi, "Comparing Two Information Flow Security Properties," Proc. Ninth IEEE Computer Security Foundation Workshop, (CSFW'96), M. Merritt, ed., pp. 116-122. IEEE CSPress, June 1996.
-
Comparing Two Information Flow Security Properties, Proc. Ninth IEEE Computer Security Foundation Workshop, (CSFW'96), M. Merritt, Ed., Pp.
-
-
Focardi, R.1
-
8
-
-
84974776068
-
-
3, no. 1, pp. 5-33, 1994/1995.
-
R. Focardi and R. Gorrieri, "A Classification of Security Properties for Process Algebras," J. Computer Security, vol. 3, no. 1, pp. 5-33, 1994/1995.
-
And R. Gorrieri, A Classification of Security Properties for Process Algebras, J. Computer Security, Vol.
-
-
Focardi, R.1
-
9
-
-
35848941984
-
-
33-36, DARPA, Mar. 1997.
-
R. Focardi and R. Gorrieri, "Non Interference: Past, Present and Future," Proc. Foundations for Secure Mobile Code Workshop, pp. 33-36, DARPA, Mar. 1997.
-
And R. Gorrieri, Non Interference: Past, Present and Future, Proc. Foundations for Secure Mobile Code Workshop, Pp.
-
-
Focardi, R.1
-
16
-
-
0025432462
-
-
86, pp. 43-68, May 1990.
-
P. Kanellakis and S.A. Smolka, "CCS Expressions, Finite State Processes, and Three Problems of Equivalence," Information & Computation 86, pp. 43-68, May 1990.
-
And S.A. Smolka, CCS Expressions, Finite State Processes, and Three Problems of Equivalence, Information & Computation
-
-
Kanellakis, P.1
-
17
-
-
0016972709
-
-
19, no. 7, pp. 561-572, 1976.
-
R. Keller, "Formal Verification of Parallel Programs," Comm. ACM, vol. 19, no. 7, pp. 561-572, 1976.
-
Formal Verification of Parallel Programs, Comm. ACM, Vol.
-
-
Keller, R.1
-
19
-
-
44049113210
-
-
100, pp. 1-77, 1992.
-
R. Milner, J. Parrow, and D. Walker, "A Calculus of Mobile Processes," Information & Computation 100, pp. 1-77, 1992.
-
J. Parrow, and D. Walker, A Calculus of Mobile Processes, Information & Computation
-
-
Milner, R.1
-
20
-
-
0018048246
-
-
21, no. 12, pp. 993-999, 1978.
-
R. Needham and M. Schroeder, "Using Encryption for Authentication in Large Networks of Computers," Comm. ACM, vol. 21, no. 12, pp. 993-999, 1978.
-
And M. Schroeder, Using Encryption for Authentication in Large Networks of Computers, Comm. ACM, Vol.
-
-
Needham, R.1
-
21
-
-
0020845493
-
-
34, pp. 83-133, 1984.
-
R. De Nicola and M. Hennessy, "Testing Equivalences for Processes," Theoretical Computer Science, vol. 34, pp. 83-133, 1984.
-
Nicola and M. Hennessy, Testing Equivalences for Processes, Theoretical Computer Science, Vol.
-
-
De R1
-
25
-
-
35848957531
-
-
1994 (ESORICS'94), pp. 33-53, Lecture Notes in Computer Science 875. Springer-Verlag, 1994.
-
A.W. Roscoe, J.C.P. Woodcock, and L. Wulf, "Noninterference through Determinism," Proc. European Symp. Research in Computer Security 1994 (ESORICS'94), pp. 33-53, Lecture Notes in Computer Science 875. Springer-Verlag, 1994.
-
J.C.P. Woodcock, and L. Wulf, Noninterference Through Determinism, Proc. European Symp. Research in Computer Security
-
-
Roscoe, A.W.1
-
27
-
-
0015773009
-
-
1-9, Austin, Texas, 1973.
-
L.J. Stockmeyer and A.R. Meyer, "Word Problems Requiring Exponential Time," Proc. Fifth ACM Symp. Theory of Computing, pp. 1-9, Austin, Texas, 1973.
-
And A.R. Meyer, Word Problems Requiring Exponential Time, Proc. Fifth ACM Symp. Theory of Computing, Pp.
-
-
Stockmeyer, L.J.1
-
28
-
-
0025438147
-
-
569-580, June 1990.
-
C.R. Tsai, V.D. Gligor, and C.S. Chandersekaran, "On the Identification of Covert Storage Channels in Secure Systems," IEEE Trans. Software Eng., pp. 569-580, June 1990.
-
V.D. Gligor, and C.S. Chandersekaran, on the Identification of Covert Storage Channels in Secure Systems, IEEE Trans. Software Eng., Pp.
-
-
Tsai, C.R.1
|