-
1
-
-
0023558367
-
Recognizing safety and liveness
-
B. Alpern and F. Schneider. Recognizing safety and liveness. Distributed Computing, 2(3): 117-126, 1987.
-
(1987)
Distributed Computing
, vol.2
, Issue.3
, pp. 117-126
-
-
Alpern, B.1
Schneider, F.2
-
3
-
-
0003962322
-
-
MIT Press, Cambridge, Massachusetts
-
E.M. Clarke, O. Grumberg, and D.A. Peled. Model Checking. MIT Press, Cambridge, Massachusetts, 2000.
-
(2000)
Model Checking
-
-
Clarke, E.M.1
Grumberg, O.2
Peled, D.A.3
-
5
-
-
0027342054
-
The concurrency workbench: A semantics-based tool for the verification of finite-state systems
-
January
-
R. Cleaveland, J. Parrow, and B. Steffen. The Concurrency Workbench: A semantics-based tool for the verification of finite-state systems. ACM Transactions on Programming Languages and Systems, 15(1):36-72, January 1993.
-
(1993)
ACM Transactions on Programming Languages and Systems
, vol.15
, Issue.1
, pp. 36-72
-
-
Cleaveland, R.1
Parrow, J.2
Steffen, B.3
-
7
-
-
0023365727
-
Statecharts: A visual formalism for complex systems
-
D.Harel. Statecharts:a visual formalism for complex systems. Science of Computer Programming,8, pages 231-274, 1987.
-
(1987)
Science of Computer Programming
, vol.8
, pp. 231-274
-
-
Harel, D.1
-
8
-
-
84975277890
-
Checking system rules using system-specific, programmer-written compiler extensions
-
Dawson Engler, Benjamin Chelf, Andy Chou, and Seth Hallem. Checking system rules using system-specific, programmer-written compiler extensions. Operating Systems Design and Implementation, 2002.
-
(2002)
Operating Systems Design and Implementation
-
-
Engler, D.1
Chelf, B.2
Chou, A.3
Hallem, S.4
-
10
-
-
0025430066
-
An implementation of an efficient algorithm for bisimulation equivalence
-
J.-C. Fernandez. An implementation of an efficient algorithm for bisimulation equivalence. Science of Computer Programming, 13:219-236, 1989/1990.
-
(1989)
Science of Computer Programming
, vol.13
, pp. 219-236
-
-
Fernandez, J.-C.1
-
11
-
-
0001439194
-
The compositional security checkeratool for the verification of information flow security policies
-
September
-
R. Focardi and R. Gorrieri. The compositional security checkeratool for the verification of information flow security policies. IEEE Transactions on Software Engineering 23(9):550-571, September 1997.
-
(1997)
IEEE Transactions on Software Engineering
, vol.23
, Issue.9
, pp. 550-571
-
-
Focardi, R.1
Gorrieri, R.2
-
13
-
-
0025432462
-
CCS expressions, finite state processes, and three problems of equivalence
-
May
-
P. Kanellakis and S.A. Smolka. CCS expressions, finite state processes, and three problems of equivalence. Information and Computation, 86(1):43-68, May 1990.
-
(1990)
Information and Computation
, vol.86
, Issue.1
, pp. 43-68
-
-
Kanellakis, P.1
Smolka, S.A.2
-
14
-
-
49049126479
-
Results on the prepositional μ-calculus
-
December
-
D. Kozen. Results on the prepositional μ-calculus. Theoretical Computer Science, 27(3):333-354, December 1983.
-
(1983)
Theoretical Computer Science
, vol.27
, Issue.3
, pp. 333-354
-
-
Kozen, D.1
-
17
-
-
0023566630
-
Three partition refinement algorithms
-
December
-
R. Paige and R.E. Tarjan. Three partition refinement algorithms. SIAM Journal of Computing, 16(6):973-989, December 1987.
-
(1987)
SIAM Journal of Computing
, vol.16
, Issue.6
, pp. 973-989
-
-
Paige, R.1
Tarjan, R.E.2
-
18
-
-
0003931061
-
A structural approach to operational semantics
-
Computer Science Department, Aarhus University, Aarhus, Denmark
-
G.D. Plotkin. A structural approach to operational semantics. Technical Report DAIMI-FN-19, Computer Science Department, Aarhus University, Aarhus, Denmark, 1981.
-
(1981)
Technical Report
, vol.DAIMI-FN-19
-
-
Plotkin, G.D.1
-
21
-
-
0036132062
-
Generic tools for verifying concurrent systems
-
R.Cleaveland and S.Sims, Generic tools for verifying concurrent systems. Science of Computer Programming, 41(1):39-47, 2002.
-
(2002)
Science of Computer Programming
, vol.41
, Issue.1
, pp. 39-47
-
-
Cleaveland, R.1
Sims, S.2
-
23
-
-
0012889295
-
A language-based approach to security. informatics: 10 years back, 10 years ahead
-
(Reihnard Wilhelm, ed.), Springer-Verlag
-
Fred Schneider. A language-based approach to security. informatics: 10 years back, 10 years ahead. Lecture Notes in Computer Science, Volume 2000 (Reihnard Wilhelm, ed.), Springer-Verlag, 2000.
-
(2000)
Lecture Notes in Computer Science
, vol.2000
-
-
Schneider, F.1
-
25
-
-
85084163313
-
Synthesizing fast intrusion detection/prevention systems from high-level specifications
-
R. Sekar and P. Uppuluri. Synthesizing fast intrusion detection/prevention systems from high-level specifications. USENIX Security Symposium, 1999.
-
(1999)
USENIX Security Symposium
-
-
Sekar, R.1
Uppuluri, P.2
-
26
-
-
84974747910
-
Aggregation and separation as non-interference properties
-
1992
-
F. Simon. Aggregation and separation as non-interference properties. The Journal Of Computer Security, 1(2): 159-188, 1992., 1992.
-
(1992)
The Journal of Computer Security
, vol.1
, Issue.2
, pp. 159-188
-
-
Simon, F.1
|