-
2
-
-
0011837296
-
Information flow security in mobile ambients
-
Proceedings of International Workshop on Concurrency and Coordination (ConCoord '01), Amsterdam: Elsevier, July 6-8
-
Cortesi A., Focardi R. Information flow security in mobile ambients. In: Proceedings of International Workshop on Concurrency and Coordination (ConCoord '01), Electronic Notes on Theoretical Computer Science, ENTCS, vol. 54. Amsterdam: Elsevier, July 6-8, 2001.
-
(2001)
Electronic Notes on Theoretical Computer Science, ENTCS
, vol.54
-
-
Cortesi, A.1
Focardi, R.2
-
3
-
-
84947919695
-
Mobile ambients
-
Nivat M., editor. Proceedings of Foundations of Software Science and Computation Structures (FoSSaCS) Berlin, Germany, Springer, March
-
Cardelli L., Gordon A.D. Mobile ambients. In: Nivat M, editor. Proceedings of Foundations of Software Science and Computation Structures (FoSSaCS), Lecture Notes in Computer Science, vol. 1378, Berlin, Germany, Springer, March 1998, p. 140-55.
-
(1998)
Lecture Notes in Computer Science
, vol.1378
, pp. 140-155
-
-
Cardelli, L.1
Gordon, A.D.2
-
4
-
-
84937705299
-
Static analysis of processes for no read-up and no write-down
-
Proceedings of FoSSaCS '99. Berlin: Springer
-
Bodei C., Degano P., Nielson F., Nielson H.R. Static analysis of processes for No read-up and No write-down. In: Proceedings of FoSSaCS '99, Lecture Notes in Computer Science, No. 1578. Berlin: Springer, 1999. p. 120-34.
-
(1999)
Lecture Notes in Computer Science
, vol.1578
, pp. 120-134
-
-
Bodei, C.1
Degano, P.2
Nielson, F.3
Nielson, H.R.4
-
6
-
-
84974776068
-
A classification of security properties for process algebras
-
Focardi R., Gorrieri R. A classification of security properties for process algebras. Journal of Computer Security. 3(1):1995;5-33.
-
(1995)
Journal of Computer Security
, vol.3
, Issue.1
, pp. 5-33
-
-
Focardi, R.1
Gorrieri, R.2
-
7
-
-
0001439194
-
The compositional security checker: A tool for the verification of information flow security properties
-
Focardi R., Gorrieri R. The compositional security checker. a tool for the verification of information flow security properties IEEE Transactions on Software Engineering. 23(9):1997;550-571.
-
(1997)
IEEE Transactions on Software Engineering
, vol.23
, Issue.9
, pp. 550-571
-
-
Focardi, R.1
Gorrieri, R.2
-
8
-
-
84974577536
-
Information flow vs. resource access in the asynchronous pi-calculus
-
Montanari U., Rolim J., Welzl E., editors. Proceedings of the International Colloquium on Automata Languages and Programming, Berlin, Geneva: Springer, August
-
Hennessy M., Riely J. Information flow vs. resource access in the asynchronous pi-calculus. In: Montanari U, Rolim J, Welzl E, editors. Proceedings of the International Colloquium on Automata Languages and Programming, Lecture Notes in Computer Science, vol. 1853. Berlin, Geneva: Springer, August 2000, p. 415-27.
-
(2000)
Lecture Notes in Computer Science
, vol.1853
, pp. 415-427
-
-
Hennessy, M.1
Riely, J.2
-
9
-
-
0031648455
-
Secure information flow in a multi-threaded imperative language
-
San Diego, California, New York, NY
-
Smith G., Volpano D. Secure information flow in a multi-threaded imperative language. In: Conference Record of POPL 98: The 25TH ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, San Diego, California, New York, NY, 1998. p. 355-64.
-
(1998)
Conference Record of POPL 98: The 25TH ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages
, pp. 355-364
-
-
Smith, G.1
Volpano, D.2
-
10
-
-
84978997669
-
Boxed ambients
-
Proceedings of the Fourth International Conference on Theoretical Aspects of Computer Science (TACS '01) Berlin: Springer
-
Bugliesi M., Castagna G., Crafa S. Boxed ambients. In: Proceedings of the Fourth International Conference on Theoretical Aspects of Computer Science (TACS '01), Lecture Notes in Computer Science, vol. 2215. Berlin: Springer, 2000. p. 38-63.
-
(2000)
Lecture Notes in Computer Science
, vol.2215
, pp. 38-63
-
-
Bugliesi, M.1
Castagna, G.2
Crafa, S.3
-
12
-
-
84957649493
-
Abstract interpretation of mobile ambients
-
A. Cortesi, & G. File'. Proceedings of Static Analysis Symposium (SAS '99) Berlin: Springer
-
Hansen R.R., Jensen J.G., Nielson F., Nielson H.R. Abstract interpretation of mobile ambients. Cortesi A., File' G. Proceedings of Static Analysis Symposium (SAS '99). Lecture Notes in Computer Science. No. 1694:1999;134-148 Springer, Berlin.
-
(1999)
Lecture Notes in Computer Science
, vol.1694
, pp. 134-148
-
-
Hansen, R.R.1
Jensen, J.G.2
Nielson, F.3
Nielson, H.R.4
-
13
-
-
0011836421
-
Abstract interpretation of mobile ambients
-
Cortesi A., File' G, editors. to appear
-
Nielson F., Hansen R.R., Nielson H.R. Abstract interpretation of mobile ambients. In: Cortesi A, File' G, editors. Science of computer programming (Special Issue on Static Analysis), to appear.
-
Science of computer programming (Special Issue on Static Analysis)
-
-
Nielson, F.1
Hansen, R.R.2
Nielson, H.R.3
-
14
-
-
84945976575
-
Control flow analysis for the π -calculus
-
Proceedings of CONCUR '98, Berlin: Springer
-
Bodei C., Degano P., Nielson F., Nielson H.R. Control flow analysis for the π -calculus. In: Proceedings of CONCUR '98, Lecture Notes in Computer Science, No. 1466. Berlin: Springer, 1998. p. 84-98.
-
(1998)
Lecture Notes in Computer Science
, vol.1466
, pp. 84-98
-
-
Bodei, C.1
Degano, P.2
Nielson, F.3
Nielson, H.R.4
-
15
-
-
84879087677
-
Ambient groups and mobility types
-
Van Leeuwen J., Watanabe O., Hagiya M., Mosses P.D., Ito T., editors. Theoretical computer science: exploring new frontiers of theoretical informatics. Proceedings of the International IFIP Conference TCS 2000 (Sendai, Japan), New York, Berlin: IFIP, Springer, August
-
Cardelli L., Ghelli G., Gordon A.D. Ambient groups and mobility types. In: Van Leeuwen J., Watanabe O., Hagiya M., Mosses P.D., Ito T., editors. Theoretical computer science: exploring new frontiers of theoretical informatics. Proceedings of the International IFIP Conference TCS 2000 (Sendai, Japan), Lecture Notes in Computer Science, vol. 1872. New York, Berlin: IFIP, Springer, August 2000. p. 333-47.
-
(2000)
Lecture Notes in Computer Science
, vol.1872
, pp. 333-347
-
-
Cardelli, L.1
Ghelli, G.2
Gordon, A.D.3
-
16
-
-
84957803043
-
Security types for mobile safe ambients
-
He J, Sato M, editors. Proceedings of Advances in Computing Science - ASIAN '00 (Sixth Asian Computing Science Conference, Penang, Malaysia), Berlin, Springer, December
-
Dezani-Ciancaglini M., Salvo I. Security types for mobile safe ambients. In: He J., Sato M., editors. Proceedings of Advances in Computing Science - ASIAN '00 (Sixth Asian Computing Science Conference, Penang, Malaysia), Lecture Notes in Computer Science, vol. 1961, Berlin, Springer, December 2000, p. 215-36.
-
(2000)
Lecture Notes in Computer Science
, vol.1961
, pp. 215-236
-
-
Dezani-Ciancaglini, M.1
Salvo, I.2
-
17
-
-
84957807650
-
Safe ambients: Control flow analysis and security
-
He J., Sato M., editors. Proceedings of Advances in Computing Science - ASIAN '00 (Sixth Asian Computing Science Conference, Penang, Malaysia), Berlin, Springer, December
-
Degano P., Levi F., Bodei C. Safe ambients: control flow analysis and security. In: He J, Sato M, editors. Proceedings of Advances in Computing Science - ASIAN '00 (Sixth Asian Computing Science Conference, Penang, Malaysia), Lecture Notes in Computer Science, vol. 1961, Berlin, Springer, December 2000, p. 199-214.
-
(2000)
Lecture Notes in Computer Science
, vol.1961
, pp. 199-214
-
-
Degano, P.1
Levi, F.2
Bodei, C.3
|