-
1
-
-
0030643343
-
A calculus for cryptographic protocols: The spi calculus
-
[Abadi, Gordon 97] Full version available as tech. rep. 414, Univ. Cambridge Computer Lab.
-
[Abadi, Gordon 97] Abadi, M., and Gordon A. D.: "A calculus for cryptographic protocols: The spi calculus"; Proc. 4th ACM Conference on Computer and Communications Security (1997), 36-47. Full version available as tech. rep. 414, Univ. Cambridge Computer Lab.
-
(1997)
Proc. 4th ACM Conference on Computer and Communications Security
, pp. 36-47
-
-
Abadi, M.1
Gordon, A.D.2
-
2
-
-
84964476742
-
iKP - A family of secure electronic payment protocols
-
[Bellare et al. 95]
-
[Bellare et al. 95] Bellare, M., Garay, J., Hauser, R., Herzberg, A., Krawczyk, H., Steiner, M., Tsudik, G., and Waidner, M.: "iKP - a family of secure electronic payment protocols"; First USENIX Workshop on Electronic Commerce (1995).
-
(1995)
First USENIX Workshop on Electronic Commerce
-
-
Bellare, M.1
Garay, J.2
Hauser, R.3
Herzberg, A.4
Krawczyk, H.5
Steiner, M.6
Tsudik, G.7
Waidner, M.8
-
3
-
-
84947919695
-
Mobile ambients
-
[Cardelli, Gordon 98] Maurice Nivat, editor, Proceedings of FoSSaCS '98, Springer
-
[Cardelli, Gordon 98] Cardelli, L, Gordon, A.G.: "Mobile ambients"; In Maurice Nivat, editor, Proceedings of FoSSaCS '98, volume 1378 of LNCS, Springer (1998), 140-155.
-
(1998)
LNCS
, vol.1378
, pp. 140-155
-
-
Cardelli, L.1
Gordon, A.G.2
-
4
-
-
84974776068
-
A classification of security properties for process algebras
-
[Focardi, Gorrieri 95]
-
[Focardi, Gorrieri 95] Focardi, R., Gorrieri, R.: "A classification of security properties for process algebras"; J. of Computer Security, 3,1 (1994/1995), 5-33.
-
(1994)
J. of Computer Security
, vol.3
, Issue.1
, pp. 5-33
-
-
Focardi, R.1
Gorrieri, R.2
-
5
-
-
84958046259
-
A uniform approach for the definition of security properties
-
[Focardi, Martinelli 99] J. Wing, J. Woodcock, and J. Davies, editors, FM'99-Formal Methods, Springer
-
[Focardi, Martinelli 99] Focardi, R., Martinelli, R.: "A uniform approach for the definition of security properties"; In J. Wing, J. Woodcock, and J. Davies, editors, FM'99-Formal Methods, volume 1708 of LNCS, Springer (1999), 794-813.
-
(1999)
LNCS
, vol.1708
, pp. 794-813
-
-
Focardi, R.1
Martinelli, R.2
-
6
-
-
0020299523
-
Security policies and security models
-
[Goguen, Meseguer 82] IEEE Computer Society, Oakland, CA
-
[Goguen, Meseguer 82] Goguen, J.A., Meseguer J.: "Security policies and security models" ; Proceedings of the IEEE Symp. on Research in Security and Privacy, IEEE Computer Society, Oakland, CA (1982), 11-20.
-
(1982)
Proceedings of the IEEE Symp. on Research in Security and Privacy
, pp. 11-20
-
-
Goguen, J.A.1
Meseguer, J.2
-
7
-
-
84937423482
-
Unwinding and inference control
-
[Goguen, Meseguer 84] IEEE Computer Society, Oakland, CA
-
[Goguen, Meseguer 84] Goguen, J.A., Meseguer J.: "Unwinding and inference control"; Proceedings of the IEEE Symp. on Research in Security and Privacy, IEEE Computer Society, Oakland, CA (1984), 75-285.
-
(1984)
Proceedings of the IEEE Symp. on Research in Security and Privacy
, pp. 75-285
-
-
Goguen, J.A.1
Meseguer, J.2
-
8
-
-
0023292465
-
Extending the noninterference version of MLS for SAT
-
[Haigh, Young 87]
-
[Haigh, Young 87] Haigh, J.T., Young, W.D.: "Extending the noninterference version of MLS for SAT"; IEEE Trans, on Software Engineering, 13, 2 (1987), 141-150.
-
(1987)
IEEE Trans, on Software Engineering
, vol.13
, Issue.2
, pp. 141-150
-
-
Haigh, J.T.1
Young, W.D.2
-
11
-
-
84983001862
-
Type-safe execution of mobile agents in anonymous networks
-
[Hennessy, Riely 99] Jan Vitek and Christian Damsgaard Jensen, editors, Proceedings of MOS '98, Springer Full version as CogSci Report 3/98, University of Sussex, Brighton
-
[Hennessy, Riely 99] Hennessy, M., Riely, J.: "Type-safe execution of mobile agents in anonymous networks"; In Jan Vitek and Christian Damsgaard Jensen, editors, Proceedings of MOS '98, volume 1603 of LNCS, Springer (1999). Full version as CogSci Report 3/98, University of Sussex, Brighton.
-
(1999)
LNCS
, vol.1603
-
-
Hennessy, M.1
Riely, J.2
-
12
-
-
0023231848
-
Specifications for multi-level security and hook-up property
-
[McCullough 87] IEEE Computer Society, Oakland, CA
-
[McCullough 87] McCullough, D.: "Specifications for multi-level security and hook-up property"; Proceedings of the IEEE Symp. on Research in Security and Privacy, IEEE Computer Society, Oakland, CA (1987), 161-166.
-
(1987)
Proceedings of the IEEE Symp. on Research in Security and Privacy
, pp. 161-166
-
-
McCullough, D.1
-
13
-
-
0023829319
-
Noninterference and the composability of security properties
-
[McCullough 88] IEEE Computer Society, Oakland, CA IEEE Computer Society.
-
[McCullough 88] McCullough, D.: "Noninterference and the composability of security properties"; Proceedings of the IEEE Symp. on Research in Security and Privacy, IEEE Computer Society, Oakland, CA (1988), IEEE Computer Society.177-186.
-
(1988)
Proceedings of the IEEE Symp. on Research in Security and Privacy
, pp. 177-186
-
-
McCullough, D.1
-
14
-
-
0003307796
-
Security models
-
[McLean 94] J. Marciniak, editor, John Wyley & Sons
-
[McLean 94] McLean, J.: "Security models"; In J. Marciniak, editor, Encyclopedia of Software Engineering, John Wyley & Sons (1994), 1136-1145.
-
(1994)
Encyclopedia of Software Engineering
, pp. 1136-1145
-
-
McLean, J.1
-
16
-
-
0027342054
-
The concurrency workbench: A semantics based tool for the verification of concurrent processes
-
[Parrow et al. 93]
-
[Parrow et al. 93] Parrow, J., Cleaveland, R., Steffen, B.: "The concurrency workbench: a semantics based tool for the verification of concurrent processes"; ACM Transactions on Programming Languages and Systems, 15, 1 (1993), 36-72.
-
(1993)
ACM Transactions on Programming Languages and Systems
, vol.15
, Issue.1
, pp. 36-72
-
-
Parrow, J.1
Cleaveland, R.2
Steffen, B.3
-
17
-
-
0029228214
-
Absorbing covers and intransitive non-interference
-
[Pinsky 95] IEEE Computer Society, Oakland, CA
-
[Pinsky 95] Pinsky, S.: "Absorbing covers and intransitive non-interference"; Proceedings of the IEEE Symp. on Research in Security and Privacy, IEEE Computer Society, Oakland, CA (1995), 102-113
-
(1995)
Proceedings of the IEEE Symp. on Research in Security and Privacy
, pp. 102-113
-
-
Pinsky, S.1
-
18
-
-
0032671780
-
What is intransitive noninterference?
-
[Roscoe, Goldsmith, 99] Mordano, Italy
-
[Roscoe, Goldsmith, 99] Roscoe, A.W., Goldsmith, M.H.: "What is intransitive noninterference?" In Proceedings of the Twelfth IEEE Computer Security Foundations Workshop (CSFW-12), Mordano, Italy (1999).
-
(1999)
Proceedings of the Twelfth IEEE Computer Security Foundations Workshop (CSFW-12)
-
-
Roscoe, A.W.1
Goldsmith, M.H.2
-
19
-
-
0032646572
-
Process algebra and noninterference
-
[Ryan, Schneider 99] Mordano, Italy
-
[Ryan, Schneider 99] Ryan, P.Y.A., Schneider, S.A.: "Process algebra and noninterference"; In Proceedings of the Twelfth IEEE Computer Security Foundations Workshop (CSFW-12), Mordano, Italy (1999).
-
(1999)
Proceedings of the Twelfth IEEE Computer Security Foundations Workshop (CSFW-12)
-
-
Ryan, P.Y.A.1
Schneider, S.A.2
-
20
-
-
0003502331
-
Noninterference, transitivity and channel-control security policies
-
[Rushby 92] SRI International, Menlo Park CA, USA
-
[Rushby 92] Rushby, J.: "Noninterference, transitivity and channel-control security policies"; Technical Report CSL-92-02, SRI International, Menlo Park CA, USA (1992).
-
(1992)
Technical Report CSL-92-02
-
-
Rushby, J.1
-
22
-
-
84956985232
-
Seal: A framework for secure mobile computation
-
[Vitek, Castagna 99] H.E. Bai, B. Belkhouche, and L. Cardelli, editors, Internet Programming Languages, Springer
-
[Vitek, Castagna 99] Vitek, J., Castagna, G.: "Seal: A framework for secure mobile computation"; In H.E. Bai, B. Belkhouche, and L. Cardelli, editors, Internet Programming Languages, volume 1686 of LNCS, Springer (1999).
-
(1999)
LNCS
, vol.1686
-
-
Vitek, J.1
Castagna, G.2
|