-
1
-
-
0013158911
-
-
http://www.beowuff.org/.
-
-
-
-
2
-
-
0013065940
-
-
http://www.seti.org/.
-
-
-
-
3
-
-
0013067226
-
-
http://www.distributed.net/.
-
-
-
-
4
-
-
0013067931
-
-
http://www.popularpower.com/.
-
-
-
-
7
-
-
0016949746
-
A lattice model of information flow
-
May
-
D. E. Denning. A lattice model of information flow. Communications of the ACM, 19(5):236-243, May 1976.
-
(1976)
Communications of the ACM
, vol.19
, Issue.5
, pp. 236-243
-
-
Denning, D.E.1
-
8
-
-
84974577536
-
Information flow vs. resource access in the asynchronous pi-calculus
-
27th International Colloquium on Automata, Languages and Programming (ICALP '2000). Springer-Verlag, Berlin Germany, July. A longer version appeared as Computer Science Technical Report 2000:03, School of Cognitive and Computing Sciences, University of Sussex
-
M. Hennessy and J. Riely. Information flow vs. resource access in the asynchronous pi-calculus. In 27th International Colloquium on Automata, Languages and Programming (ICALP '2000), Lecture Notes in Computer Science. Springer-Verlag, Berlin Germany, July 2000. A longer version appeared as Computer Science Technical Report 2000:03, School of Cognitive and Computing Sciences, University of Sussex.
-
(2000)
Lecture Notes in Computer Science
-
-
Hennessy, M.1
Riely, J.2
-
9
-
-
84947269249
-
Secure information flow as typed process behaviour
-
G. Smolka, editor, Held as Part of the Joint European Conferences on Theory and Practice of Software (ETAPS 2000), (Berlin, Germany, March/April 2000), of lncs. sv
-
K. Honda, V. Vasconcelos, and N. Yoshida. Secure information flow as typed process behaviour. In G. Smolka, editor, Programming Languages and Systems: Proceedings of the 9th European Symposium on Programming (ESOP 2000), Held as Part of the Joint European Conferences on Theory and Practice of Software (ETAPS 2000), (Berlin, Germany, March/April 2000), volume 1782 of lncs, pages 180-199. sv, 2000.
-
(2000)
Programming Languages and Systems: Proceedings of the 9th European Symposium on Programming (ESOP 2000)
, vol.1782
, pp. 180-199
-
-
Honda, K.1
Vasconcelos, V.2
Yoshida, N.3
-
10
-
-
0034714632
-
Type reconstruction for linear pi-calculus with I/O subtyping
-
An extended abstract appeared in the Proceedings of SAS '97, LNCS 1302
-
A. Igarashi and N. Kobayashi. Type reconstruction for linear pi-calculus with I/O subtyping. Journal of Information and Computation, 161(1):1-44, 2000. An extended abstract appeared in the Proceedings of SAS '97, LNCS 1302.
-
(2000)
Journal of Information and Computation
, vol.161
, Issue.1
, pp. 1-44
-
-
Igarashi, A.1
Kobayashi, N.2
-
12
-
-
0013116981
-
Boolean unification - The story so far
-
C. Kirchner, editor. Academic Press
-
U. Martin and T. Nipkow. Boolean unification - the story so far. In C. Kirchner, editor, Unification, pages 437-456. Academic Press, 1990.
-
(1990)
Unification
, pp. 437-456
-
-
Martin, U.1
Nipkow, T.2
-
13
-
-
0000511698
-
The polyadic π-calculus: A tutorial
-
F. L. Hamer, W. Brauer, and H. Schwichtenberg, editors. Springer-Verlag
-
R. Milner. The polyadic π-calculus: A tutorial. In F. L. Hamer, W. Brauer, and H. Schwichtenberg, editors, Logic and Algebra of Specification. Springer-Verlag, 1993.
-
(1993)
Logic and Algebra of Specification
-
-
Milner, R.1
-
14
-
-
44049113210
-
A calculus of mobile processes, I
-
Sept.
-
R. Milner, J. Parrow, and D. Walker. A calculus of mobile processes, I. Information and Computation, 100(1):1-40, Sept. 1992.
-
(1992)
Information and Computation
, vol.100
, Issue.1
, pp. 1-40
-
-
Milner, R.1
Parrow, J.2
Walker, D.3
-
15
-
-
44049114041
-
A calculus of mobile processes, II
-
Sept.
-
R. Milner, J. Parrow, and D. Walker. A calculus of mobile processes, II. Information and Computation, 100(1):41-77, Sept. 1992.
-
(1992)
Information and Computation
, vol.100
, Issue.1
, pp. 41-77
-
-
Milner, R.1
Parrow, J.2
Walker, D.3
-
16
-
-
0001800257
-
Safe, untrusted agents using proof-carrying code
-
G. Vigna, editor, Mobile Agents and Security. Springer-Verlag
-
G. C. Necula and P. Lee. Safe, untrusted agents using proof-carrying code. In G. Vigna, editor, Mobile Agents and Security, volume 1419 of Lecture Notes in Computer Science. Springer-Verlag, 1998.
-
(1998)
Lecture Notes in Computer Science
, vol.1419
-
-
Necula, G.C.1
Lee, P.2
-
17
-
-
1442284555
-
Can you trust your Data?
-
M. I. S. P. D. Mosses and M. Nielsen, editors, Proceedings of the TAPSOFT/FASE'95 Conference, Aarhus, Denmark, may. Springer-Verlag
-
P. Ørbæk. Can you Trust your Data? In M. I. S. P. D. Mosses and M. Nielsen, editors, Proceedings of the TAPSOFT/FASE'95 Conference, volume 915 of LNCS of Springer Lecture Notes in Computer Science, pages 575-590, Aarhus, Denmark, may 1995. Springer-Verlag.
-
(1995)
LNCS of Springer Lecture Notes in Computer Science
, vol.915
, pp. 575-590
-
-
Ørbæk, P.1
-
18
-
-
84955596529
-
Trust in the λ-calculus
-
A. Mycroft, editor, SAS'95: Static Analysis. Springer-Verlag
-
J. Palsberg and P. Ørbæk. Trust in the λ-calculus. In A. Mycroft, editor, SAS'95: Static Analysis, volume 983 of Lecture Notes in Computer Science, pages 314-330. Springer-Verlag, 1995.
-
(1995)
Lecture Notes in Computer Science
, vol.983
, pp. 314-330
-
-
Palsberg, J.1
Ørbæk, P.2
-
19
-
-
84957869855
-
A per model of secure information flow in sequential programs
-
A. Sabelfeld and D. Sands. A per model of secure information flow in sequential programs. Lecture Notes in Computer Science, 1576:40-58, 1999.
-
(1999)
Lecture Notes in Computer Science
, vol.1576
, pp. 40-58
-
-
Sabelfeld, A.1
Sands, D.2
-
20
-
-
0013114992
-
From pi-calculus to higher-order pi-calculus-and back
-
Springer Verlag, LNCS 668
-
D. Sangiorgi. From pi-calculus to higher-order pi-calculus-and back. In TAPSOFT. Springer Verlag, LNCS 668, 1993.
-
(1993)
TAPSOFT
-
-
Sangiorgi, D.1
-
23
-
-
0030370740
-
A sound type system for secure flow analysis
-
Dec.
-
D. Volpano, G. Smith, and C. Irvine. A sound type system for secure flow analysis. Journal of Computer Security, 4(3):167-187, Dec. 1996.
-
(1996)
Journal of Computer Security
, vol.4
, Issue.3
, pp. 167-187
-
-
Volpano, D.1
Smith, G.2
Irvine, C.3
-
25
-
-
0013068230
-
Linear, strictness and usage logics
-
M. E. Houle and P. Eades, editors, Townsville, Jan. 29-30. Australian Computer Science Communications
-
D. A. Wright. Linear, strictness and usage logics. In M. E. Houle and P. Eades, editors, Proceedings of Conference on Computing: The Australian Theory Symposium, pages 73-80, Townsville, Jan. 29-30 1996. Australian Computer Science Communications.
-
(1996)
Proceedings of Conference on Computing: The Australian Theory Symposium
, pp. 73-80
-
-
Wright, D.A.1
|