-
1
-
-
0001772130
-
Secrecy by typing in security protocols
-
September 1999
-
Abadi, M. (1999), Secrecy by typing in security protocols, J. ACM 46(5), 749-786, September 1999. Extended Abstract, in "Proceedings of Theoretical Aspects of Computer Software 1997," pp. 611-638, Springer-Verlag, Berlin/New York. [Extended version to appear in J. ACM]
-
(1999)
J. ACM
, vol.46
, Issue.5
, pp. 749-786
-
-
Abadi, M.1
-
2
-
-
0001772130
-
-
Springer-Verlag, Berlin/New York. [Extended version to appear in J. ACM]
-
Abadi, M. (1999), Secrecy by typing in security protocols, J. ACM 46(5), 749-786, September 1999. Extended Abstract, in "Proceedings of Theoretical Aspects of Computer Software 1997," pp. 611-638, Springer-Verlag, Berlin/New York. [Extended version to appear in J. ACM]
-
(1997)
Proceedings of Theoretical Aspects of Computer Software 1997
, pp. 611-638
-
-
-
3
-
-
84878558984
-
Protection in programming-language translations
-
"Proceedings of ICALP'98," Springer-Verlag, Berlin/New York
-
Abadi, M. (1998), Protection in programming-language translations, in "Proceedings of ICALP'98," Lecture Notes in Computer Science, Vol. 1443, pp. 868-883, Springer-Verlag, Berlin/New York.
-
(1998)
Lecture Notes in Computer Science
, vol.1443
, pp. 868-883
-
-
Abadi, M.1
-
4
-
-
0003092378
-
A calculus for cryptographic protocols - The Spi calculus
-
Abadi, M., and Gordon, A. D. (1999), A calculus for cryptographic protocols-The Spi calculus, Inform. and Comput. 148(1), 1-70.
-
(1999)
Inform. and Comput.
, vol.148
, Issue.1
, pp. 1-70
-
-
Abadi, M.1
Gordon, A.D.2
-
5
-
-
84957064722
-
An asynchronous model of locality failure, and process mobility
-
"Proceedings of COORDINATION'97," Springer-Verlag, Berlin/New York
-
Amadio, R. M. (1997), An asynchronous model of locality failure, and process mobility, in "Proceedings of COORDINATION'97," Lecture Notes in Computer Science, Vol. 1282, pp. 374-391. Springer-Verlag, Berlin/New York.
-
(1997)
Lecture Notes in Computer Science
, vol.1282
, pp. 374-391
-
-
Amadio, R.M.1
-
7
-
-
0003973586
-
-
Ph.D. thesis, TD-2/00 Department of Computer Science, University of Pisa
-
Bodei, C. (2001), "Security Issues in Process Calculi," Ph.D. thesis, TD-2/00 Department of Computer Science, University of Pisa.
-
(2001)
Security Issues in Process Calculi
-
-
Bodei, C.1
-
8
-
-
84945976575
-
Control flow analysis for the π-calculus
-
"Proceedings of CONCUR'98," Springer-Verlag, Berlin/New York
-
Bodei, C., Degano, P., Nielson F., and RiisNielsen, H. (1998), Control flow analysis for the π-calculus, in "Proceedings of CONCUR'98," Lecture Notes in Computer Science, Vol. 1466, pp. 84-98, Springer-Verlag, Berlin/New York.
-
(1998)
Lecture Notes in Computer Science
, vol.1466
, pp. 84-98
-
-
Bodei, C.1
Degano, P.2
Nielsen, F.3
Riisnielson, H.4
-
9
-
-
84937705299
-
Static analysis of processes for no read-up and no write down
-
"Proceedings of FoSSaCS'99," Springer-Verlag, Berlin/New York
-
Bodei, C., Degano, P., Nielson, F., and Riis Nielsen H. (1999), Static analysis of processes for no read-up and no write down, in "Proceedings of FoSSaCS'99," Lecture Notes in Computer Science, vol. 1578, pp. 120-134, Springer-Verlag, Berlin/New York.
-
(1999)
Lecture Notes in Computer Science
, vol.1578
, pp. 120-134
-
-
Bodei, C.1
Degano, P.2
Nielson, F.3
Riis Nielsen, H.4
-
10
-
-
84947919695
-
Mobile ambients
-
"Proceedings of FoSSaCS'98," Springer-Verlag, Berlin/New York
-
Cardelli, L., and Gordon, A. D. (1998), Mobile ambients, in "Proceedings of FoSSaCS'98," Lecture Notes in Computer Science, Vol. 1378, pp. 140-155, Springer-Verlag, Berlin/New York.
-
(1998)
Lecture Notes in Computer Science
, vol.1378
, pp. 140-155
-
-
Cardelli, L.1
Gordon, A.D.2
-
11
-
-
0030681155
-
Types as abstract interpretations
-
Assoc. Comput. Mach. Press, New York
-
Cousot, P. (1997), Types as abstract interpretations, in "Proceedings of POPL'97," pp. 316-331, Assoc. Comput. Mach. Press, New York.
-
(1997)
Proceedings of POPL'97
, pp. 316-331
-
-
Cousot, P.1
-
12
-
-
0018294932
-
Systematic design of program analysis frameworks
-
Assoc. Comput. Mach. Press, New York
-
Cousot, P., and Cousot, R. (1979), Systematic design of program analysis frameworks, in "Proceedings of POPL'79," pp. 269-282, Assoc. Comput. Mach. Press, New York.
-
(1979)
Proceedings of POPL'79
, pp. 269-282
-
-
Cousot, P.1
Cousot, R.2
-
13
-
-
0031601027
-
Proving trust in systems of second-order processes
-
IEEE Comput Soc., Los Alamitoes, CA
-
Dam, M. (1998), Proving trust in systems of second-order processes (extended abstract), in "Proceedings of HICSS 31," Vol. VII, pp. 255-264, IEEE Comput Soc., Los Alamitoes, CA.
-
(1998)
Proceedings of HICSS 31
, vol.7
, pp. 255-264
-
-
Dam, M.1
-
14
-
-
0000413440
-
Types for access control
-
De Nicola, R., Ferrari, G., and Pugliese, R., Venneri, E. (2000), Types for access control, Theoret. Comput. Sci. 240(1), 215-254.
-
(2000)
Theoret. Comput. Sci.
, vol.240
, Issue.1
, pp. 215-254
-
-
De Nicola, R.1
Ferrari, G.2
Pugliese, R.3
Venneri, E.4
-
17
-
-
0001439194
-
The compositional security checker: A tool for the verification of information flow security properties
-
Focardi, R., and Gorrieri, R. (1997), The compositional security checker: A tool for the verification of information flow security properties, IEEE Trans. Software Eng. 23(9).
-
(1997)
IEEE Trans. Software Eng.
, vol.23
, Issue.9
-
-
Focardi, R.1
Gorrieri, R.2
-
18
-
-
84957891695
-
Implicit typing à la ML for the join calculus
-
"Proceedings of CONCUR'97," Springer-Verlag, Berlin/New York
-
Fournet, C., Laneve, C., Maranget, L., and Remy, D. (1997), Implicit typing à la ML for the join calculus, in "Proceedings of CONCUR'97," Lecture Notes in Computer Science, Vol. 1243, pp. 196-212, Springer-Verlag, Berlin/New York.
-
(1997)
Lecture Notes in Computer Science
, vol.1243
, pp. 196-212
-
-
Fournet, C.1
Laneve, C.2
Maranget, L.3
Remy, D.4
-
19
-
-
0030645011
-
Systematic realisation of control flow analysis CML
-
Assoc. Comput. Mach. Press, New York
-
Gasser, K. L. S., Nielsen, F., and Nielsen, H. R. (1997), Systematic realisation of control flow analysis CML, in "Proceedings of ICFP' 97," pp. 38-51, Assoc. Comput. Mach. Press, New York.
-
(1997)
Proceedings of ICFP' 97
, pp. 38-51
-
-
Gasser, K.L.S.1
Nielsen, F.2
Nielsen, H.R.3
-
20
-
-
0020299523
-
Security policy and security models
-
IEEE Press, New York
-
Goguen, J. A., and Meseguer, J. (1982), Security policy and security models, in "Proceedings of the 1982 IEEE Symposium on Research on Security and Privacy," pp. 11-20, IEEE Press, New York.
-
(1982)
Proceedings of the 1982 IEEE Symposium on Research on Security and Privacy
, pp. 11-20
-
-
Goguen, J.A.1
Meseguer, J.2
-
21
-
-
0021177508
-
Unwinding and inference control
-
IEEE Comput. Soc., Los Alamitos, CA
-
Goguen, J. A., and Meseguer, J. (1984), Unwinding and inference control, in "Proceedings of the Symposium on Security and Privacy," pp. 75-87, IEEE Comput. Soc., Los Alamitos, CA.
-
(1984)
Proceedings of the Symposium on Security and Privacy
, pp. 75-87
-
-
Goguen, J.A.1
Meseguer, J.2
-
22
-
-
84957649493
-
Abstract interpretation of mobile ambients
-
"Proceedings of SAS' 99," Springer-Verlag, Berlin/New York
-
Hansen, R. R., Jenson, J. G., Nielsen, F., and Nielsen, H. R. (1999), Abstract interpretation of mobile ambients, in "Proceedings of SAS' 99," Lecture Notes in Computer Science, Vol. 1694, pp. 135-148, Springer-Verlag, Berlin/New York.
-
(1999)
Lecture Notes in Computer Science
, vol.1694
, pp. 135-148
-
-
Hansen, R.R.1
Jenson, J.G.2
Nielsen, F.3
Nielsen, H.R.4
-
23
-
-
0031701347
-
The SLam calculus: Programming with secrecy and integrity
-
Assoc. Comput. Mech. Press, New York
-
Heintze, N., and Riecke, J. G. (1998), The SLam calculus: Programming with secrecy and integrity, in "Proceedings of POPL '98," pp. 365-377, Assoc. Comput. Mech. Press, New York.
-
(1998)
Proceedings of POPL '98
, pp. 365-377
-
-
Heintze, N.1
Riecke, J.G.2
-
24
-
-
0015672289
-
A note on the confinement problem
-
Lampson, B. W. (1973), A note on the confinement problem, Comm. Assoc. Comput. Mach. 16(10), 613-615.
-
(1973)
Comm. Assoc. Comput. Mach.
, vol.16
, Issue.10
, pp. 613-615
-
-
Lampson, B.W.1
-
26
-
-
0004220511
-
-
Addison-Wesley, Reading, MA
-
Lindholm, T., and Yellin, F. (1996), "The Java Virtual Machine Specification," Addison-Wesley, Reading, MA.
-
(1996)
The Java Virtual Machine Specification
-
-
Lindholm, T.1
Yellin, F.2
-
30
-
-
44049113210
-
A calculus of mobile processes (I and II)
-
Milner, R., Parrow, J., and Walker, D. (1992), A calculus of mobile processes (I and II), Inform. and Comput. 100(1), 1-77.
-
(1992)
Inform. and Comput.
, vol.100
, Issue.1
, pp. 1-77
-
-
Milner, R.1
Parrow, J.2
Walker, D.3
-
31
-
-
0027607364
-
Modal logics for mobile processes
-
Milner, R., Parrow, J., and Walker, D. (1993), Modal logics for mobile processes, Theoret. Comput. Sci. 114(1), 49-171.
-
(1993)
Theoret. Comput. Sci.
, vol.114
, Issue.1
, pp. 49-171
-
-
Milner, R.1
Parrow, J.2
Walker, D.3
-
32
-
-
0003818126
-
-
Springer-Verlag, Berlin/New York
-
Nielsen, F., Nielsen, H. R., and Hankin C. (1999), "Principles of Program Analysis, Springer-Verlag, Berlin/New York.
-
(1999)
Principles of Program Analysis
-
-
Nielsen, F.1
Nielsen, H.R.2
Hankin, C.3
-
33
-
-
35048826704
-
Validating firewalls in mobile ambients
-
"Proc. Concur'99"
-
Nielsen, F., Nielsen, H. R., Hansen, R. R., and Jensen, J. G. (1999), Validating firewalls in mobile ambients, in "Proc. Concur'99," Lecture Notes in Computer Science, Vol. 1664, pp. 463-477.
-
(1999)
Lecture Notes in Computer Science
, vol.1664
, pp. 463-477
-
-
Nielsen, F.1
Nielsen, H.R.2
Hansen, R.R.3
Jensen, J.G.4
-
34
-
-
84945268253
-
Control-flow analysis in cubic time
-
"Proceedings of ESOP 2001," Springer-Verlag, Berlin/New York
-
Nielsen, F., and Seidl, H. (2001), Control-Flow Analysis in Cubic Time, in "Proceedings of ESOP 2001," LNCS, Vol. 2028, pp. 252-268, Springer-Verlag, Berlin/New York.
-
(2001)
LNCS
, vol.2028
, pp. 252-268
-
-
Nielsen, F.1
Seidl, H.2
-
35
-
-
3042874802
-
Trust in the λ-calculus
-
Ørbæk, P., and Palsberg, J. (1997), Trust in the λ-calculus, J. Funct. Programming 7(6), 557-591.
-
(1997)
J. Funct. Programming
, vol.7
, Issue.6
, pp. 557-591
-
-
Ørbæk, P.1
Palsberg, J.2
-
37
-
-
0001518312
-
Typing and sub-typing for mobile processes
-
Pierce, B. C., and Sangiorgi, D. (1996), Typing and sub-typing for mobile processes, Math. Structures Comput. Sci. 6(5) 409-454.
-
(1996)
Math. Structures Comput. Sci.
, vol.6
, Issue.5
, pp. 409-454
-
-
Pierce, B.C.1
Sangiorgi, D.2
-
38
-
-
0031675817
-
A typed language for distributed mobile processes
-
Assoc. Comput. Math. Press, New York
-
Riely, J., and Hennessy, M. (1998), A typed language for distributed mobile processes, in "Proceedings of POPL'98," pp. 378-390, Assoc. Comput. Math. Press, New York.
-
(1998)
Proceedings of POPL'98
, pp. 378-390
-
-
Riely, J.1
Hennessy, M.2
-
39
-
-
0032646395
-
Trust and partial typing in open systems of mobile agents
-
Assoc. Comput. Mach. Press, New York
-
Riely, J., and Hennessy, M. (1999), Trust and partial typing in open systems of mobile agents, in "Proceedings of the 26th Symposium on Principles of Programming Languages (POPL' 99)," pp. 93-104, Assoc. Comput. Mach. Press, New York.
-
(1999)
Proceedings of the 26th Symposium on Principles of Programming Languages (POPL' 99)
, pp. 93-104
-
-
Riely, J.1
Hennessy, M.2
-
40
-
-
84878539063
-
Global/local subtyping and capability inference for a distributed π-calculus
-
"Proceedings of ICALP'98," Springer-Verlag, Berlin/New York
-
Sewell, P. (1998), Global/local subtyping and capability inference for a distributed π-calculus, in "Proceedings of ICALP'98," Lecture Notes in Computer Science, Vol. 1443, pp. 695-706, Springer-Verlag, Berlin/New York.
-
(1998)
Lecture Notes in Computer Science
, vol.1443
, pp. 695-706
-
-
Sewell, P.1
-
41
-
-
84956693522
-
Control flow analysis in Scheme
-
ACM SIGPLAN Notices
-
Shivers, O. (1988), Control flow analysis in Scheme, in "Proceedings of PLDI'88," Vol. 7(1), ACM SIGPLAN Notices.
-
(1988)
Proceedings of PLDI'88
, vol.7
, Issue.1
-
-
Shivers, O.1
-
42
-
-
84878643881
-
Abstract interpretation of the π-calculus
-
"Analysis and Verification of Multiple Agent Languages," Springer-Verlag, Berlin/New York
-
Venet, A. (1997), Abstract interpretation of the π-calculus, in "Analysis and Verification of Multiple Agent Languages," Lecture Notes in Computer Science, Vol. 1192, pp. 51-75, Springer-Verlag, Berlin/New York.
-
(1997)
Lecture Notes in Computer Science
, vol.1192
, pp. 51-75
-
-
Venet, A.1
-
43
-
-
84905055376
-
Automatic determination of communications topologies in mobile systems
-
"Proceedings of SAS'98," Springer-Verlag, Berlin/New York
-
Venet, A. (1998), Automatic determination of communications topologies in mobile systems, in "Proceedings of SAS'98," Lecture Notes in Computer Science Vol. 1503, pp. 152-167, Springer-Verlag, Berlin/New York.
-
(1998)
Lecture Notes in Computer Science
, vol.1503
, pp. 152-167
-
-
Venet, A.1
-
44
-
-
0031648455
-
Secure information flow in a multi-threaded imperative language
-
Assoc. Comput. Math. Press, New York
-
Volpano, D., and Smith, G. (1998), Secure information flow in a multi-threaded imperative language, in "Proceedings of POPL'98," pp. 355-364, Assoc. Comput. Math. Press, New York.
-
(1998)
Proceedings of POPL'98
, pp. 355-364
-
-
Volpano, D.1
Smith, G.2
-
45
-
-
0001905093
-
A sound type system for secure flow analysis
-
Volpano, D., Smith, G., and Irvine, C. (1996), A sound type system for secure flow analysis, J. Comput. Security 4, 4-21.
-
(1996)
J. Comput. Security
, vol.4
, pp. 4-21
-
-
Volpano, D.1
Smith, G.2
Irvine, C.3
|