-
1
-
-
84957668700
-
Secrecy by typing in security protocols
-
Proceedings of TACS'97. Springer Verlag, New York
-
ABADI, M. 1997. Secrecy by typing in security protocols. In Proceedings of TACS'97. Lecture Notes in Computer Science, vol. 1281. Springer Verlag, New York, pp. 611-637.
-
(1997)
Lecture Notes in Computer Science
, vol.1281
, pp. 611-637
-
-
Abadi, M.1
-
2
-
-
0003400251
-
Secure computer system: Unified exposition and multics interpretation
-
MITRE Corporation
-
BELL, D. E. AND LAPADULA, L. J. 1995. Secure computer system: Unified exposition and multics interpretation. Tech. rep. MTR-2997. MITRE Corporation.
-
(1995)
Tech. Rep. MTR-2997
-
-
Bell, D.E.1
Lapadula, L.J.2
-
3
-
-
84945976575
-
Control flow analysis for the π-calculus
-
Proceedings of CONCUR'98. Springer-Verlag, New York
-
BODEI, C., DEGANO, P., NIELSON, F., AND NIELSON, H. R. 1998. Control flow analysis for the π-calculus. In Proceedings of CONCUR'98. Lecture Notes in Computer Science, vol. 1466. Springer-Verlag, New York, pp. 84-98.
-
(1998)
Lecture Notes in Computer Science
, vol.1466
, pp. 84-98
-
-
Bodei, C.1
Degano, P.2
Nielson, F.3
Nielson, H.R.4
-
4
-
-
84937705299
-
Static analysis of processes for no read-up and no write-down
-
Proceedings of the Foundations of Software Science and Computation Structures (FOSSACS'99). Springer-Verlag, New York
-
BODEI, C., DEGANO, P., NIELSON, F., AND NIELSON, H. R. 1999. Static analysis of processes for no read-up and no write-down. In Proceedings of the Foundations of Software Science and Computation Structures (FOSSACS'99). Lecture Notes in Computer Science, vol. 1578. Springer-Verlag, New York, pp. 120-134.
-
(1999)
Lecture Notes in Computer Science
, vol.1578
, pp. 120-134
-
-
Bodei, C.1
Degano, P.2
Nielson, F.3
Nielson, H.R.4
-
5
-
-
0003403203
-
Asynchrony and the π-calculus
-
INRIA-Sophia Antipolis
-
BOUDOL, G. 1992. Asynchrony and the π-calculus. Tech. Rep. 1702. INRIA-Sophia Antipolis.
-
(1992)
Tech. Rep. 1702
-
-
Boudol, G.1
-
6
-
-
84879520825
-
Noninterference for concurrent programs
-
Proceedings of ICALP'01. Springer-Verlag, New York
-
BOUDOL, G. AND CASTELLANI, I. 2001. Noninterference for concurrent programs. In Proceedings of ICALP'01. Lecture Notes in Computer Science, vol. 2076. Springer-Verlag, New York, pp. 382-395.
-
(2001)
Lecture Notes in Computer Science
, vol.2076
, pp. 382-395
-
-
Boudol, G.1
Castellani, I.2
-
7
-
-
84887084615
-
Testing theories for asynchronous languages
-
Proceedings of the 18th Conference on Foundations of Software Technology and Theoretical Computer Science (Chennai, India, Dec. 17-19). Springer-Verlag, New York
-
CASTELLANI, I. AND HENNESSY, M. 1998. Testing theories for asynchronous languages. In Proceedings of the 18th Conference on Foundations of Software Technology and Theoretical Computer Science (Chennai, India, Dec. 17-19). Lecture Notes in Computer Science, vol. 1530. Springer-Verlag, New York.
-
(1998)
Lecture Notes in Computer Science
, vol.1530
-
-
Castellani, I.1
Hennessy, M.2
-
9
-
-
0017517624
-
Certification of programs for secure information flow
-
DENNING, D. 1977. Certification of programs for secure information flow. Commun. ACM 20, 504-513.
-
(1977)
Commun. ACM
, vol.20
, pp. 504-513
-
-
Denning, D.1
-
11
-
-
84974776068
-
A classification of security properties for process algebras
-
FOCARDI, R. AND GORRIERI, R. 1995. A classification of security properties for process algebras. J. Comput. Sec. 3, 1.
-
(1995)
J. Comput. Sec.
, vol.3
, pp. 1
-
-
Focardi, R.1
Gorrieri, R.2
-
12
-
-
0001439194
-
The compositional security checker: A tool for the verification of information flow security properties
-
FOCARDI, R. AND GORRIERI, R. 1997a. The compositional security checker: A tool for the verification of information flow security properties. IEEE Trans. Softw. Eng. 23.
-
(1997)
IEEE Trans. Softw. Eng.
, pp. 23
-
-
Focardi, R.1
Gorrieri, R.2
-
14
-
-
84955565479
-
A calculus of mobile agents
-
CONCUR: Proceedings of the International Conference on Concurrency Theory (Pisa, Italy, Aug.) U. Montanari and V. Sassone, eds. Springer-Verlag, New York
-
FOURNET, C., GONTHIER, G., LEVY, J. J., MARGANGET, L., AND REMY, D. 1996. A calculus of mobile agents. In CONCUR: Proceedings of the International Conference on Concurrency Theory (Pisa, Italy, Aug.) U. Montanari and V. Sassone, eds. Lecture Notes in Computer Science, vol. 1119, Springer-Verlag, New York, pp. 406-421.
-
(1996)
Lecture Notes in Computer Science
, vol.1119
, pp. 406-421
-
-
Fournet, C.1
Gonthier, G.2
Levy, J.J.3
Marganget, L.4
Remy, D.5
-
16
-
-
0031701347
-
The SLam calculus: Programming with secrecy and integrity
-
(San Diego, Calif., Jan.). ACM, New York
-
HEINTZ, N. AND RIECKE, J. G. 1998. The SLam calculus: Programming with secrecy and integrity. In Conference Record of the ACM Symposium on Principles of Programming Languages (San Diego, Calif., Jan.). ACM, New York.
-
(1998)
Conference Record of the ACM Symposium on Principles of Programming Languages
-
-
Heintz, N.1
Riecke, J.G.2
-
17
-
-
0037170503
-
Resource access control in systems of mobile agents
-
HENNESSY, M. AND RIELY, J. 2002. Resource access control in systems of mobile agents. Inf. Comput. 173, 82-120.
-
(2002)
Inf. Comput.
, vol.173
, pp. 82-120
-
-
Hennessy, M.1
Riely, J.2
-
18
-
-
85022894365
-
On asynchronous communication semantics
-
Proceedings of the ECOOP '91 Workshop on Object-Based Concurrent Computing, P. Wegner, M. Tokoro, O. Nierstrasz, eds. Springer-Verlag, New York
-
HONDA, K. AND TOKORO, M. 1992. On asynchronous communication semantics. In Proceedings of the ECOOP '91 Workshop on Object-Based Concurrent Computing, P. Wegner, M. Tokoro, O. Nierstrasz, eds. Lecture Notes in Computer Science, vol. 612. Springer-Verlag, New York.
-
(1992)
Lecture Notes in Computer Science
, vol.612
-
-
Honda, K.1
Tokoro, M.2
-
19
-
-
0001332424
-
Secure information flow as typed process behaviour
-
Springer-Verlag, New York
-
HONDA, K., VASCONCELOS, V., AND YOSHIDA-HONDA, N. 2000. Secure information flow as typed process behaviour. In Proceedings of European Symposium on Programming (ESOP) 2000. Springer-Verlag, New York.
-
(2000)
Proceedings of European Symposium on Programming (ESOP) 2000
-
-
Honda, K.1
Vasconcelos, V.2
Yoshida-Honda, N.3
-
21
-
-
0027607364
-
Mobile logics for mobile processes
-
MILNER, R., PARROW, J., AND WALKER, D. 1993. Mobile logics for mobile processes. Theoret. Comput. Sci. 114, 149-171.
-
(1993)
Theoret. Comput. Sci.
, vol.114
, pp. 149-171
-
-
Milner, R.1
Parrow, J.2
Walker, D.3
-
22
-
-
0001518312
-
Typing and subtyping for mobile processes
-
PIERCE, B. AND SANGIORGI, D. 1996. Typing and subtyping for mobile processes. Math. Struct. Comput. Sci. 6, 5, 409-454. (Extended abstract in LICS '93).
-
(1996)
Math. Struct. Comput. Sci.
, vol.6
, Issue.5
, pp. 409-454
-
-
Pierce, B.1
Sangiorgi, D.2
-
23
-
-
0041152689
-
-
PIERCE, B. AND SANGIORGI, D. 1996. Typing and subtyping for mobile processes. Math. Struct. Comput. Sci. 6, 5, 409-454. (Extended abstract in LICS '93).
-
LICS '93
-
-
-
24
-
-
0002464962
-
Pict: A programming language based on the pi-calculus
-
Gorden Plotkin, Colin Stirling, and Mads Tofte, eds. MIT Press, Cambridge, Mass.
-
PIERCE, B. C. AND TURNER, D. N. 2000. Pict: A programming language based on the pi-calculus. In Proof, Language and Interacting: Essays in Honour of Robin Milner, Gorden Plotkin, Colin Stirling, and Mads Tofte, eds. MIT Press, Cambridge, Mass., pp. 455-494.
-
(2000)
Proof, Language and Interacting: Essays in Honour of Robin Milner
, pp. 455-494
-
-
Pierce, B.C.1
Turner, D.N.2
-
25
-
-
84976840591
-
An axiomatic approach to information flow in programs
-
REITMAS, R. AND ANDREWS, G. 1980. An axiomatic approach to information flow in programs. ACM Trans. Prog. Lang. Syst. 2, 1, 56-76.
-
(1980)
ACM Trans. Prog. Lang. Syst.
, vol.2
, Issue.1
, pp. 56-76
-
-
Reitmas, R.1
Andrews, G.2
-
27
-
-
0001868056
-
Non-interference through determinism
-
European Symposium on Research in Computer Security. Springer-Verlag, New York
-
ROSCOE, A. W., WOODCOCK, J. C. P., AND WULF, L. 1994. Non-interference through determinism. In European Symposium on Research in Computer Security. Lecture Notes in Computer Science, vol. 875. Springer-Verlag, New York.
-
(1994)
Lecture Notes in Computer Science
, vol.875
-
-
Roscoe, A.W.1
Woodcock, J.C.P.2
Wulf, L.3
-
29
-
-
0031648455
-
Secure information flow in a multi-threaded imperative language
-
(San Diego, Calif., Jan.). ACM, New York
-
SMITH, G. AND VOLPANO, D. 1998. Secure information flow in a multi-threaded imperative language. In Conference Record of the ACM Symposium on Principles of Programming Languages (San Diego, Calif., Jan.). ACM, New York.
-
(1998)
Conference Record of the ACM Symposium on Principles of Programming Languages
-
-
Smith, G.1
Volpano, D.2
-
31
-
-
84947920982
-
Graph types for monadic mobile processes
-
Proceedings of the Foundations of Software Technology and Theoretical Computer Science (FSTTCS). Springer-Verlag, New York
-
YOSHIDA, N. 1996. Graph types for monadic mobile processes. In Proceedings of the Foundations of Software Technology and Theoretical Computer Science (FSTTCS). Lecture Notes in Computer Science, vol. 1180. Springer-Verlag, New York, pp. 371-386.
-
(1996)
Lecture Notes in Computer Science
, vol.1180
, pp. 371-386
-
-
Yoshida, N.1
|