-
2
-
-
0035838828
-
Static Analysis for the π-calculus with Applications to Security
-
C. Bodei, P. Degano, F. Nielson, and H. Nielson. Static Analysis for the π-calculus with Applications to Security. Information and Computation, 168(1):68-92, 2001.
-
(2001)
Information and Computation
, vol.168
, Issue.1
, pp. 68-92
-
-
Bodei, C.1
Degano, P.2
Nielson, F.3
Nielson, H.4
-
3
-
-
84944047063
-
Transforming Processes to Ensure and Check Information Flow Security
-
H. Kirchner and C. Ringeissen, editors, Int. Conference on Algebraic Methodology and Software Technology (AMAST'02), Springer-Verlag
-
A. Bossi, R. Focardi, C. Piazza, and S. Rossi. Transforming Processes to Ensure and Check Information Flow Security. In H. Kirchner and C. Ringeissen, editors, Int. Conference on Algebraic Methodology and Software Technology (AMAST'02), volume 2422 of LNCS, pages 271-286. Springer-Verlag, 2002.
-
(2002)
LNCS
, vol.2422
, pp. 271-286
-
-
Bossi, A.1
Focardi, R.2
Piazza, C.3
Rossi, S.4
-
4
-
-
35248883450
-
A Proof System for Information Flow Security
-
M. Leuschel, editor, Logic Based Program Development and Transformation, Springer-Verlag, To appear
-
A. Bossi, R. Focardi, C. Piazza, and S. Rossi. A Proof System for Information Flow Security. In M. Leuschel, editor, Logic Based Program Development and Transformation, volume 2664 of LNCS. Springer-Verlag, 2003. To appear.
-
(2003)
LNCS
, vol.2664
-
-
Bossi, A.1
Focardi, R.2
Piazza, C.3
Rossi, S.4
-
5
-
-
84855640602
-
-
Technical Report CS-2003-6, Dipartimento di Informatica, Università Ca' Foscari di Venezia, Italy
-
A. Bossi, D. Macedonio, C. Piazza, and S. Rossi. P-BNDC and Replication. Technical Report CS-2003-6, Dipartimento di Informatica, Università Ca' Foscari di Venezia, Italy, 2003. http://www.dsi.unive.it/ricerca/TR/index.htm.
-
(2003)
P-BNDC and Replication
-
-
Bossi, A.1
Macedonio, D.2
Piazza, C.3
Rossi, S.4
-
7
-
-
35248892359
-
Replication vs. Recursive Definitions in Channel Based Calculi
-
Proc. of Int. Colloquium on Automata, Languages and Programming (ICALP'03). To appear
-
N. Busi, M. Gabbrielli, and G. Zavattaro. Replication vs. Recursive Definitions in Channel Based Calculi. In Proc. of Int. Colloquium on Automata, Languages and Programming (ICALP'03). LNCS, 2003. To appear.
-
(2003)
LNCS
-
-
Busi, N.1
Gabbrielli, M.2
Zavattaro, G.3
-
9
-
-
84988393004
-
Classification of Security Properties (Part I: Information Flow)
-
R. Focardi and R. Gorrieri, editors, Foundations of Security Analysis and Design, Springer-Verlag
-
R. Focardi and R. Gorrieri. Classification of Security Properties (Part I: Information Flow). In R. Focardi and R. Gorrieri, editors, Foundations of Security Analysis and Design, volume 2171 of LNCS. Springer-Verlag, 2001.
-
(2001)
LNCS
, vol.2171
-
-
Focardi, R.1
Gorrieri, R.2
-
10
-
-
84974597207
-
Non Interference for the Analysis of Cryptographic Protocols
-
U. Montanari, J. D. P. Rolim, and E. Welzl, editors, Proc. of Int. Colloquium on Automata, Languages and Programming (ICALP'00), Springer-Verlag
-
R. Focardi, R. Gorrieri, and F. Martinelli. Non Interference for the Analysis of Cryptographic Protocols. In U. Montanari, J. D. P. Rolim, and E. Welzl, editors, Proc. of Int. Colloquium on Automata, Languages and Programming (ICALP'00), volume 1853 of LNCS, pages 744-755. Springer-Verlag, 2000.
-
(2000)
LNCS
, vol.1853
, pp. 744-755
-
-
Focardi, R.1
Gorrieri, R.2
Martinelli, F.3
-
16
-
-
0031645024
-
Partial Model Checking and Theorem Proving for Ensuring Security Properties
-
IEEE Comp. Soc. Press
-
F. Martinelli. Partial Model Checking and Theorem Proving for Ensuring Security Properties. In Proc. of the IEEE Computer Security Foundations Workshop (CSFW'98), pages 44-52. IEEE Comp. Soc. Press, 1998.
-
(1998)
Proc. of the IEEE Computer Security Foundations Workshop (CSFW'98)
, pp. 44-52
-
-
Martinelli, F.1
-
18
-
-
0002426876
-
A General Theory of Composition for a Class of "Possibilistic" Security Properties
-
J. McLean. A General Theory of Composition for a Class of "Possibilistic" Security Properties. IEEE Transactions on Software Engineering, 22(1):53-67, 1996.
-
(1996)
IEEE Transactions on Software Engineering
, vol.22
, Issue.1
, pp. 53-67
-
-
McLean, J.1
-
20
-
-
0000511698
-
The Polyadic Pi-calculus: A tutorial
-
F. L. Bauer, W. Brauer, and H. Schwichtenberg, editors, Springer-Verlag
-
R. Milner. The Polyadic Pi-calculus: a tutorial. In F. L. Bauer, W. Brauer, and H. Schwichtenberg, editors, Logic and Algebra of Specification, pages 203-246. Springer-Verlag, 1993.
-
(1993)
Logic and Algebra of Specification
, pp. 203-246
-
-
Milner, R.1
-
21
-
-
0035067847
-
Process Algebra and Non-interference
-
P. Ryan and S. Schneider. Process Algebra and Non-interference. Journal of Computer Security, 9(1/2):75-103, 2001.
-
(2001)
Journal of Computer Security
, vol.9
, Issue.1-2
, pp. 75-103
-
-
Ryan, P.1
Schneider, S.2
-
25
-
-
0026884658
-
Trace-based Network Proof Systems: Expressiveness and Completeness
-
J. Widom, D. Gries, and F. B. Schneider. Trace-based Network Proof Systems: Expressiveness and Completeness. ACM Transactions on Programming Languages and Systems (TOPLAS), 14(3):396-416, 1992.
-
(1992)
ACM Transactions on Programming Languages and Systems (TOPLAS)
, vol.14
, Issue.3
, pp. 396-416
-
-
Widom, J.1
Gries, D.2
Schneider, F.B.3
|