-
1
-
-
21144453684
-
Two formal approaches for approximating noninterference properties
-
Springer LNCS
-
A. Aldini, M. Bravetti, A. Di Pierro, R. Gorrieri, C. Hankin, and H. Wiklicky. Two Formal Approaches for Approximating Noninterference Properties. Foundations of Security Analysis and Design II - Tutorial Lectures, Springer LNCS 2946:1-43, 2004.
-
(2004)
Foundations of Security Analysis and Design II - Tutorial Lectures
, vol.2946
, pp. 1-43
-
-
Aldini, A.1
Bravetti, M.2
Di Pierro, A.3
Gorrieri, R.4
Hankin, C.5
Wiklicky, H.6
-
2
-
-
3042529082
-
A process-algebraic approach for the analysis of probabilistic noninterference
-
A. Aldini, M. Bravetti, and R. Gorrieri. A Process-algebraic Approach for the Analysis of Probabilistic Noninterference. Journal of Computer Security 12(2), 2004.
-
(2004)
Journal of Computer Security
, vol.12
, Issue.2
-
-
Aldini, A.1
Bravetti, M.2
Gorrieri, R.3
-
4
-
-
0037209771
-
Discrete time generative-reactive probabilistic processes with different advancing speeds
-
M. Bravetti and A. Aldini. Discrete Time Generative-reactive Probabilistic Processes with Different Advancing Speeds. Theoretical Computer Science 290(1):355-406, 2003.
-
(2003)
Theoretical Computer Science
, vol.290
, Issue.1
, pp. 355-406
-
-
Bravetti, M.1
Aldini, A.2
-
5
-
-
19144372130
-
Compositional asymmetric cooperations for process algebras with probabilities, priorities, and time
-
ENTCS
-
M. Bravetti and M. Bernardo. Compositional Asymmetric Cooperations for Process Algebras with Probabilities, Priorities, and Time. In Proc. of 1st Workshop on Models for Time-Critical Systems (MTCS'00), ENTCS 39(3), 2000.
-
(2000)
Proc. of 1st Workshop on Models for Time-Critical Systems (MTCS'00)
, vol.39
, Issue.3
-
-
Bravetti, M.1
Bernardo, M.2
-
7
-
-
0345275464
-
Quantitative analysis of the leakage of confidential data
-
(A. Di Pierro and H. Wiklicky, Eds.), Elsevier Science Publishers
-
D. Clark, S. Hunt, and P. Malacaria. Quantitative Analysis of the Leakage of Confidential Data. In ENTCS 59(3), (A. Di Pierro and H. Wiklicky, Eds.), Elsevier Science Publishers, 2002.
-
(2002)
ENTCS
, vol.59
, Issue.3
-
-
Clark, D.1
Hunt, S.2
Malacaria, P.3
-
9
-
-
0033698747
-
Approximation of labeled Markov processes
-
IEEE CS Press
-
J. Desharnais, V. Gupta, R. Jagadeesan, and P. Panangaden. Approximation of Labeled Markov Processes. In Proc. of 15th Symposium on Logic in Computer Science (LICS'00), pp. 95-106, IEEE CS Press, 2000.
-
(2000)
Proc. of 15th Symposium on Logic in Computer Science (LICS'00)
, pp. 95-106
-
-
Desharnais, J.1
Gupta, V.2
Jagadeesan, R.3
Panangaden, P.4
-
10
-
-
0036052667
-
The metric analogue of weak bisimulation for probabilistic processes
-
IEEE CS Press
-
J. Desharnais, V. Gupta, R. Jagadeesan, and P. Panangaden. The Metric Analogue of Weak Bisimulation for Probabilistic Processes. In Proc. of 17th Symposium on Logic in Computer Science (LICS'02), pp. 413-422, IEEE CS Press, 2002.
-
(2002)
Proc. of 17th Symposium on Logic in Computer Science (LICS'02)
, pp. 413-422
-
-
Desharnais, J.1
Gupta, V.2
Jagadeesan, R.3
Panangaden, P.4
-
15
-
-
84974597207
-
Non interference for the analysis of cryptographic protocols
-
Springer LNCS
-
R. Focardi, R. Gorrieri, and F. Martinelli. Non Interference for the Analysis of Cryptographic Protocols. In Proc. of 27th Int. Colloquium on Automata, Languages and Programming (1CALP'00), Springer LNCS 1853:354-372, 2000.
-
(2000)
Proc. of 27th Int. Colloquium on Automata, Languages and Programming (1CALP'00)
, vol.1853
, pp. 354-372
-
-
Focardi, R.1
Gorrieri, R.2
Martinelli, F.3
-
16
-
-
0006419926
-
Reactive, generative and stratified models of probabilistic processes
-
R. J. van Glabbeek, S. A. Smolka, and B. Steffen. Reactive, Generative and Stratified Models of Probabilistic Processes. Information and Computation 121:59-80, 1995.
-
(1995)
Information and Computation
, vol.121
, pp. 59-80
-
-
Van Glabbeek, R.J.1
Smolka, S.A.2
Steffen, B.3
-
19
-
-
34249875619
-
Equivalences, congruences, and complete axiomatizations for probabilistic processes
-
Springer LNCS
-
C.-C. Jou and S. A. Smolka. Equivalences, Congruences, and Complete Axiomatizations for Probabilistic Processes. In Proc. of 1st Int. Conf. on Concurrency Theory (CONCUR'90), Springer LNCS 458:367-383, 1990.
-
(1990)
Proc. of 1st Int. Conf. on Concurrency Theory (CONCUR'90)
, vol.458
, pp. 367-383
-
-
Jou, C.-C.1
Smolka, S.A.2
-
21
-
-
0032218226
-
A probabilistic poly-time framework for protocol analysis
-
ACM Press
-
P. Lincoln, J. C. Mitchell, M. Mitchell, and A. Scedrov. A Probabilistic Poly-Time Framework for Protocol Analysis. In Proc. of 5th Conf. on Computer and Communications Security, pp. 112-121, ACM Press, 1998.
-
(1998)
Proc. of 5th Conf. on Computer and Communications Security
, pp. 112-121
-
-
Lincoln, P.1
Mitchell, J.C.2
Mitchell, M.3
Scedrov, A.4
-
24
-
-
0034829266
-
Non-interference: Who needs it?
-
IEEE CS Press
-
P.Y.A. Ryan, J. McLean, J. Millen, and V. Gligor. Non-interference: Who needs It? In Proc. of 14th Computer Security Foundations Workshop (CSFW'Ol), pp. 237-238, IEEE CS Press, 2001.
-
(2001)
Proc. of 14th Computer Security Foundations Workshop (CSFW'Ol)
, pp. 237-238
-
-
Ryan, P.Y.A.1
McLean, J.2
Millen, J.3
Gligor, V.4
-
26
-
-
0003885668
-
-
Springer Texts in Statistics, Springer Verlag, New York -Berlin - Heidelberg
-
J. Shao. Mathematical Statistics. Springer Texts in Statistics, Springer Verlag, New York -Berlin - Heidelberg, 1999.
-
(1999)
Mathematical Statistics
-
-
Shao, J.1
-
27
-
-
18544362925
-
Probabilistic noninterference through weak probabilistic bisimulation
-
IEEE CS Press
-
G. Smith. Probabilistic Noninterference through Weak Probabilistic Bisimulation. In Proc. of 16th Computer Security Foundations Workshop (CSFW'03), pp. 3-13, IEEE CS Press, 2003.
-
(2003)
Proc. of 16th Computer Security Foundations Workshop (CSFW'03)
, pp. 3-13
-
-
Smith, G.1
|