-
1
-
-
84957807650
-
Safe ambients: Control flow analysis and security
-
P. Degano, F. Levi, C. Bodei. Safe Ambients: Control Flow Analysis and Security. In proceedings of ASIAN'00, LNCS 1961, 2000, pages 199-214.
-
(2000)
Proceedings of ASIAN'00, LNCS
, vol.1961
, pp. 199-214
-
-
Degano, P.1
Levi, F.2
Bodei, C.3
-
2
-
-
84937705299
-
Static analysis of processes for No read-up and no-write-down
-
In Proc. FoSSaCS'99, Springer-Verlag
-
C. Bodei, P. Degano, F. Nielson, and, H. R. Nielson. Static Analysis of Processes for No Read-Up and No-Write-Down. In In Proc. FoSSaCS'99, volume 1578 of Lecture Notes in Computer Science, pages 120-134, Springer-Verlag, 1999.
-
(1999)
Lecture Notes in Computer Science
, vol.1578
, pp. 120-134
-
-
Bodei, C.1
Degano, P.2
Nielson, F.3
Nielson, H.R.4
-
4
-
-
84947919695
-
Mobile ambients
-
Proc. FoSSaCS'98, Springer-Verlag
-
L. Cardelli and A. Gordon. "Mobile Ambients". In Proc. FoSSaCS'98, volume 1378 of Lecture Notes in Computer Science, pages 140-155, Springer-Verlag, 1998.
-
(1998)
Lecture Notes in Computer Science
, vol.1378
, pp. 140-155
-
-
Cardelli, L.1
Gordon, A.2
-
5
-
-
84974776068
-
"a Classification of Security Properties for Process Algebras"
-
Focardi R., Gorrieri R. "A Classification of Security Properties for Process Algebras" Journal of Computer Security. 3:(1):1995;5-33
-
(1995)
Journal of Computer Security
, vol.3
, Issue.1
, pp. 5-33
-
-
Focardi, R.1
Gorrieri, R.2
-
6
-
-
0001439194
-
"the Compositional Security Checker: A Tool for the Verification of Information Flow Security Properties
-
Focardi R., Gorrieri R. "The Compositional Security Checker: A Tool for the Verification of Information Flow Security Properties. IEEE Transactions on Software Engineering. Vol. 23:(No. 9):September 1997
-
(1997)
IEEE Transactions on Software Engineering
, vol.23
, Issue.9
-
-
Focardi, R.1
Gorrieri, R.2
-
7
-
-
0033725594
-
Information flow analysis in a discrete time process algebra
-
(P. Syverson ed), IEEE CS Press
-
R. Focardi, R. Gorrieri, F. Martinelli, "Information Flow Analysis in a Discrete Time Process Algebra", in Proc. of 13th IEEE Computer Security Foundations Workshop (CSFW13), (P. Syverson ed), IEEE CS Press, 170-184, 2000.
-
(2000)
Proc. of 13th IEEE Computer Security Foundations Workshop (CSFW13)
, pp. 170-184
-
-
Focardi, R.1
Gorrieri, R.2
Martinelli, F.3
-
8
-
-
84957649493
-
Abstract interpretation of mobile ambients
-
Proc. Static Analysis Symposium SAS'99, Springer-Verlag
-
R. R. Hansen, J. G. Jensen, F. Nielson, and H. R. Nielson, Abstract Interpretation of Mobile Ambients. In Proc. Static Analysis Symposium SAS'99, volume 1694 of Lecture Notes in Computer Science, pages 134-148, Springer-Verlag, 1999.
-
(1999)
Lecture Notes in Computer Science
, vol.1694
, pp. 134-148
-
-
Hansen, R.R.1
Jensen, J.G.2
Nielson, F.3
Nielson, H.R.4
-
9
-
-
84974577536
-
Information flow vs. Resource access in the asynchronous Pi-calculus
-
M. Hennessy, J. Riely. "Information Flow vs. Resource Access in the Asynchronous Pi-Calculus". ICALP 2000: 415-427.
-
ICALP 2000
, pp. 415-427
-
-
Hennessy, M.1
Riely, J.2
-
10
-
-
0031648455
-
Secure information flow in a multi-threaded imperative language
-
G. Smith, D.M. Volpano, "Secure Information Flow in a Multi-Threaded Imperative Language". In Proc. of POPL 1998: 355-364.
-
Proc. of POPL 1998
, pp. 355-364
-
-
Smith, G.1
Volpano, D.M.2
|