-
1
-
-
0344412458
-
On the extension of non-interference with probabilities
-
P. Syverson and J. Guttman, eds, Portland
-
A. Aldini, On the extension of non-interference with probabilities, in: Proceedings of WITS '02 Workshop on Issues in the Theory of Security, P. Syverson and J. Guttman, eds, Portland, 2002, http://www.dsi.unive.it/IFlPWG1_7/WITS2002.
-
(2002)
Proceedings of WITS '02 Workshop on Issues in the Theory of Security
-
-
Aldini, A.1
-
2
-
-
0004287147
-
-
Elsevier Science, Amsterdam
-
J.A. Bergstra, A. Ponse and S.A. Smolka, eds, Handbook of Process Algebra, Elsevier Science, Amsterdam, 2001.
-
(2001)
Handbook of Process Algebra
-
-
Bergstra, J.A.1
Ponse, A.2
Smolka, S.A.3
-
4
-
-
0345275464
-
Quantitative analysis of leakage of confidential data
-
QAPL 2001 - First International Workshop on Quantitative Aspects of Programming Laguages
-
D. Clark, S. Hunt and P. Malacaria, Quantitative analysis of leakage of confidential data, in: QAPL 2001 - First International Workshop on Quantitative Aspects of Programming Laguages, Volume 59 of Electronic Notes in Theoretical Computer, 2002.
-
(2002)
Electronic Notes in Theoretical Computer
, vol.59
-
-
Clark, D.1
Hunt, S.2
Malacaria, P.3
-
5
-
-
85050550846
-
Abstract interpretation: A unified lattice model for static analysis of programs by construction or approximation of fixpoints
-
Los Angeles
-
P. Cousot and R. Cousot, Abstract interpretation: a unified lattice model for static analysis of programs by construction or approximation of fixpoints, in: Symposium on Principles of Programming Languages (POPL), Los Angeles, 1977, pp. 238-252.
-
(1977)
Symposium on Principles of Programming Languages (POPL)
, pp. 238-252
-
-
Cousot, P.1
Cousot, R.2
-
6
-
-
0029403439
-
Nondeterminism and infinite computations in constraint programming
-
F.S. de Boer, A. Di Pierro and C. Palamidessi, Nondeterminism and infinite computations in constraint programming, Theoretical Computer Science 151(1) (1995), 37-78.
-
(1995)
Theoretical Computer Science
, vol.151
, Issue.1
, pp. 37-78
-
-
De Boer, F.S.1
Di Pierro, A.2
Palamidessi, C.3
-
7
-
-
0012799565
-
Probabilistic confinement in a declarative framework
-
Declarative Programming - Selected Papers from AGP 2000 - La Havana, Cuba, Elsevier
-
A. Di Pierro, C. Hankin and H. Wiklicky, Probabilistic confinement in a declarative framework, in: Declarative Programming - Selected Papers from AGP 2000 - La Havana, Cuba, Volume 48 of Electronic Notes in Theoretical Computer Science, Elsevier, 2001, pp. 1-23.
-
(2001)
Electronic Notes in Theoretical Computer Science
, vol.48
, pp. 1-23
-
-
Di Pierro, A.1
Hankin, C.2
Wiklicky, H.3
-
8
-
-
84958745858
-
Analysing approximate confinement under uniform attacks
-
SAS 2002 - 9th International Symposium on Static Analysis, Springer
-
A. Di Pierro, C. Hankin and H. Wiklicky, Analysing approximate confinement under uniform attacks, in: SAS 2002 - 9th International Symposium on Static Analysis, Volume 2477 of Lecture Notes in Computer Science, Springer, 2002, pp. 310-326.
-
(2002)
Lecture Notes in Computer Science
, vol.2477
, pp. 310-326
-
-
Di Pierro, A.1
Hankin, C.2
Wiklicky, H.3
-
9
-
-
0031645080
-
An operational semantics for Probabilistic Concurrent Constraint Programming
-
P. Iyer, Y. Choo and D. Schmidt, eds, IEEE Computer Society Press
-
A. Di Pierro and H. Wiklicky, An operational semantics for Probabilistic Concurrent Constraint Programming, in: ICCL '98 - International Conference on Computer Languages, P. Iyer, Y. Choo and D. Schmidt, eds, IEEE Computer Society Press, 1998, pp. 174-183.
-
(1998)
ICCL '98 - International Conference on Computer Languages
, pp. 174-183
-
-
Di Pierro, A.1
Wiklicky, H.2
-
10
-
-
84896771832
-
Probabilistic Concurrent Constraint Programming: Towards a fully abstract model
-
MFCS '98 - Mathematical Foundations of Computer Science, L. Brim, J. Gruska and J. Zlatuska, eds, Berlin - New York, Springer-Verlag
-
A. Di Pierro and H. Wiklicky, Probabilistic Concurrent Constraint Programming: Towards a fully abstract model, in: MFCS '98 - Mathematical Foundations of Computer Science, L. Brim, J. Gruska and J. Zlatuska, eds, Volume 1450 of Lecture Notes in Computer Science, Berlin - New York, 1998, Springer-Verlag, pp. 446-455.
-
(1998)
Lecture Notes in Computer Science
, vol.1450
, pp. 446-455
-
-
Di Pierro, A.1
Wiklicky, H.2
-
11
-
-
18444416310
-
Quantitative observables and averages in Probabilistic Concurrent Constraint Programming
-
Paphos, Cyprus, K.R. Apt, T. Kakas, E. Monfroy and F. Rossi, eds, number 1865 in Lecture Notes in Computer Science, Berlin-Heidelberg-New York. Springer-Verlag.
-
A. Di Pierro and H. Wiklicky, Quantitative observables and averages in Probabilistic Concurrent Constraint Programming, in: New Trends in Constraints - Selected Papers of the ERCIM/Compulog Workshop on Constraints, October 1999, Paphos, Cyprus, K.R. Apt, T. Kakas, E. Monfroy and F. Rossi, eds, number 1865 in Lecture Notes in Computer Science, Berlin-Heidelberg-New York, 2000. Springer-Verlag.
-
(2000)
New Trends in Constraints - Selected Papers of the ERCIM/Compulog Workshop on Constraints, October 1999
-
-
Di Pierro, A.1
Wiklicky, H.2
-
12
-
-
84974776068
-
A classification of security properties for process algebras
-
R. Focardi and R. Gorrieri, A classification of security properties for process algebras, Journal of Computer Security 3(1) (1995), 5-33.
-
(1995)
Journal of Computer Security
, vol.3
, Issue.1
, pp. 5-33
-
-
Focardi, R.1
Gorrieri, R.2
-
13
-
-
84988393004
-
Classification of security properties (Part I: Information Flow)
-
Foundations of Security Analysis and Design - Tutorial Lectures, Springer
-
R. Focardi and R. Gorrieri, Classification of security properties (Part I: Information Flow), in: Foundations of Security Analysis and Design - Tutorial Lectures, Volume 2171 of Lecture Notes in Computer Science, Springer, 2001, pp. 331-396.
-
(2001)
Lecture Notes in Computer Science
, vol.2171
, pp. 331-396
-
-
Focardi, R.1
Gorrieri, R.2
-
14
-
-
0020299523
-
Security policies and security models
-
IEEE Computer Society Press
-
J. Goguen and J. Meseguer, Security policies and security models, in: IEEE Symposium on Security and Privacy, IEEE Computer Society Press, 1982, pp. 11-20.
-
(1982)
IEEE Symposium on Security and Privacy
, pp. 11-20
-
-
Goguen, J.1
Meseguer, J.2
-
16
-
-
0010974144
-
-
American Mathematical Society, Providence, Rhode Island
-
C.M. Grinstead and J.L. Snell, Introduction to Probability, second revised edition, American Mathematical Society, Providence, Rhode Island, 1997.
-
(1997)
Introduction to Probability, Second Revised Edition
-
-
Grinstead, C.M.1
Snell, J.L.2
-
18
-
-
0344844014
-
Approximating labelled Markov processes
-
IEEE Computer Society Press
-
R. Jagadeesan, J. Desharnais, V. Gupta and P. Panangaden, Approximating labelled Markov processes, in: Proceedings of LICS '2000, IEEE Computer Society Press, 2000.
-
(2000)
Proceedings of LICS '2000
-
-
Jagadeesan, R.1
Desharnais, J.2
Gupta, V.3
Panangaden, P.4
-
19
-
-
18444384746
-
-
Elsevier Science, Amsterdam, Chapter 11, see [2]
-
B. Jonsson, W. Yi and K.G. Larsen, Probabilistic Extentions of Process Algebras, Elsevier Science, Amsterdam, 2001, Chapter 11, pp. 685-710, see [2].
-
(2001)
Probabilistic Extentions of Process Algebras
, pp. 685-710
-
-
Jonsson, B.1
Yi, W.2
Larsen, K.G.3
-
20
-
-
0003062448
-
Cryptanalysis of Diffie-Hellman, RSA, DSS, and other cryptosystems using timing attacks
-
Advances in Cryptology, CRYPTO '95:15th Annual International Cryptology Conference, Santa Barbara, California, USA, D. Coppersmith, ed., Berlin-Heidelberg-London, Springer-Verlag
-
P.C. Kocher, Cryptanalysis of Diffie-Hellman, RSA, DSS, and other cryptosystems using timing attacks, in: Advances in Cryptology, CRYPTO '95:15th Annual International Cryptology Conference, Santa Barbara, California, USA, D. Coppersmith, ed., Volume 963 of Lecture Notes in Computer Science, Berlin-Heidelberg-London, 1995, Springer-Verlag, pp. 171-183.
-
(1995)
Lecture Notes in Computer Science
, vol.963
, pp. 171-183
-
-
Kocher, P.C.1
-
21
-
-
0026222347
-
Bisimulation through probabilistic testing
-
K.G. Larsen and A. Skou, Bisimulation through probabilistic testing, Information and Computation 94(1) (1991), 1-28.
-
(1991)
Information and Computation
, vol.94
, Issue.1
, pp. 1-28
-
-
Larsen, K.G.1
Skou, A.2
-
24
-
-
0345275457
-
Formal dependence and independence relations in computer security
-
L. Marcus, Formal dependence and independence relations in computer security, in: Haifa Logic Colloquium, 1995.
-
(1995)
Haifa Logic Colloquium
-
-
Marcus, L.1
-
25
-
-
0003630834
-
-
A Calculus of Communicating Systems, Springer-Verlag, Berlin-New York
-
R. Milner, A Calculus of Communicating Systems, Volume 92 of Lecture Notes in Computer Science, Springer-Verlag, Berlin-New York, 1980.
-
(1980)
Lecture Notes in Computer Science
, vol.92
-
-
Milner, R.1
-
26
-
-
0034829266
-
Non-interference, who needs it?
-
Cape Breton, Nova Scotia, Canada, IEEE
-
P.Y.A. Ryan, J. McLean, J. Millen and V. Gilgor, Non-interference, who needs it? in: Proceedings of the 14th IEEE Computer Security Foundations Workshop, Cape Breton, Nova Scotia, Canada, IEEE, pp. 237-238.
-
Proceedings of the 14th IEEE Computer Security Foundations Workshop
, pp. 237-238
-
-
Ryan, P.Y.A.1
McLean, J.2
Millen, J.3
Gilgor, V.4
-
27
-
-
0035067847
-
Process algebra and non-interference
-
Special Issue on CSFW-12
-
P.Y.A. Ryan and S.A. Schneider, Process algebra and non-interference, Journal of Computer Security 9(1/2) (2001), 75-103. Special Issue on CSFW-12.
-
(2001)
Journal of Computer Security
, vol.9
, Issue.1-2
, pp. 75-103
-
-
Ryan, P.Y.A.1
Schneider, S.A.2
-
28
-
-
84957869855
-
A per model of secure information flow in sequential programs
-
number 1576 in Lecture Notes in Computer Science, Springer-Verlag
-
A. Sabelfeld and D. Sands, A per model of secure information flow in sequential programs, in: ESOP '99, number 1576 in Lecture Notes in Computer Science, Springer-Verlag, 1999, pp. 40-58.
-
(1999)
ESOP '99
, pp. 40-58
-
-
Sabelfeld, A.1
Sands, D.2
-
31
-
-
85047788507
-
Semantics foundations of concurrent constraint programming
-
ACM
-
V.A. Saraswat, M. Rinard and P. Panangaden, Semantics foundations of concurrent constraint programming, in: Symposium on Principles of Programming Languages (POPL), ACM, 1991, pp. 333-353.
-
(1991)
Symposium on Principles of Programming Languages (POPL)
, pp. 333-353
-
-
Saraswat, V.A.1
Rinard, M.2
Panangaden, P.3
-
33
-
-
0031648455
-
Secure information flow in a multi-threaded imperative language
-
San Diego, California, ACM
-
G. Smith and D. Volpano, Secure information flow in a multi-threaded imperative language, in: Symposium on Principles of Programming Languages (POPL '98), San Diego, California, 1998, ACM, pp. 355-364.
-
(1998)
Symposium on Principles of Programming Languages (POPL '98)
, pp. 355-364
-
-
Smith, G.1
Volpano, D.2
-
34
-
-
0345275454
-
Verifying secrets and relative secrecy
-
Boston, Massachusetts, ACM
-
G. Smith and D. Volpano, Verifying secrets and relative secrecy, in: Symposium on Principles of Programming Languages (POPL '00), Boston, Massachusetts, 2000, ACM, pp. 368-376.
-
(2000)
Symposium on Principles of Programming Languages (POPL '00)
, pp. 368-376
-
-
Smith, G.1
Volpano, D.2
-
35
-
-
84879525367
-
Towards quantitative verification of probabilistic transition systems
-
ICALP: 28th International Colloquium on Automata, Languages and Programming, Springer-Verlag
-
F. van Breugel and J. Worrell, Towards quantitative verification of probabilistic transition systems, in: ICALP: 28th International Colloquium on Automata, Languages and Programming, Volume 2076 of Lecture Notes in Computer Science, Springer-Verlag, 2001, pp. 421-432.
-
(2001)
Lecture Notes in Computer Science
, vol.2076
, pp. 421-432
-
-
Van Breugel, F.1
Worrell, J.2
-
36
-
-
0006419926
-
Reactive, generative and stratified models of probabilistic processes
-
R.J. van Glabbeek, S.A. Smolka and B. Steffen, Reactive, generative and stratified models of probabilistic processes, Information and Computation 121 (1995), 59-80.
-
(1995)
Information and Computation
, vol.121
, pp. 59-80
-
-
Van Glabbeek, R.J.1
Smolka, S.A.2
Steffen, B.3
-
37
-
-
0001909368
-
Confinement properties for programming languages
-
D. Volpano and G. Smith, Confinement properties for programming languages, SIGACT News 29(3) (1998), 33-42.
-
(1998)
SIGACT News
, vol.29
, Issue.3
, pp. 33-42
-
-
Volpano, D.1
Smith, G.2
-
38
-
-
0031633213
-
Probabilistic noninterference in a concurrent language
-
Washington-Brussels-Tokyo, IEEE
-
D. Volpano and G. Smith, Probabilistic noninterference in a concurrent language, in: Proceedings of the 11th IEEE Computer Security Foundations Workshop (CSFW '98), Washington-Brussels-Tokyo, 1998, IEEE, pp. 34-43.
-
(1998)
Proceedings of the 11th IEEE Computer Security Foundations Workshop (CSFW '98)
, pp. 34-43
-
-
Volpano, D.1
Smith, G.2
|