-
1
-
-
0001772130
-
Secrecy by typing in security protocols
-
Abadi, M., Secrecy by typing in security protocols. Journal of the ACM, 46(5):749–786, 1999.
-
(1999)
Journal of the ACM
, vol.46
, Issue.5
, pp. 749-786
-
-
Abadi, M.1
-
2
-
-
0005294877
-
Secrecy in programming-language semantics
-
April
-
Abadi, M., Secrecy in programming-language semantics, MFPS XV, ENTCS, 20 (April 1999).
-
(1999)
MFPS XV, ENTCS
, pp. 20
-
-
Abadi, M.1
-
3
-
-
0005363804
-
A core calculus of dependency
-
Abadi, M., Banerjee, A., Heintze, N. and Riecke, J., A core calculus of dependency, POPL’99, ACM, 1999.
-
(1999)
POPL’99, ACM
-
-
Abadi, M.1
Banerjee, A.2
Heintze, N.3
Riecke, J.4
-
4
-
-
0034672933
-
Full Abstraction for PCF
-
Abramsky, S., Jagadeesan, R. and Malacaria, P., Full Abstraction for PCF. Info. & Comp. 163(2000), 409–470.
-
(2000)
Info. & Comp
, vol.163
, pp. 409-470
-
-
Abramsky, S.1
Jagadeesan, R.2
Malacaria, P.3
-
5
-
-
84949043041
-
Bisimulation in name-passing calculi without matching
-
Boreale, M. and Sangiorgi, D. Bisimulation in name-passing calculi without matching. LICS’98, IEEE, 1998.
-
(1998)
LICS’98, IEEE
-
-
Boreale, M.1
Sangiorgi, D.2
-
6
-
-
84888883433
-
Sequentiality and the p-Calculus
-
Springer
-
Berger, M., Honda, K. and Yoshida, N., Sequentiality and the p-Calculus, TLCA’01, LNCS 2044, 29–45, Springer, 2001. The full version available at www.dcs.qmw.ac.uk/~kohei.
-
(2001)
TLCA’01, LNCS
, vol.2044
, pp. 29-45
-
-
Berger, M.1
Honda, K.2
Yoshida, N.3
-
7
-
-
84879520825
-
Noninterference for Concurrent Programs
-
Springer
-
Boudol, G. and Castellani, I., Noninterference for Concurrent Programs, ICALP’01, LNCS, Springer, 2001.
-
(2001)
ICALP’01, LNCS
-
-
Boudol, G.1
Castellani, I.2
-
8
-
-
0017517624
-
Certification of programs for secure information flow
-
Denning, D. and Denning, P., Certification of programs for secure information flow. Communication of ACM, ACM, 20:504–513, 1997.
-
(1997)
Communication of ACM, ACM
, vol.20
, pp. 504-513
-
-
Denning, D.1
Denning, P.2
-
9
-
-
0001439194
-
The compositional security checker: A tool for the verification of information flow security properties
-
Focardi, R. and Gorrieri, R., The compositional security checker: A tool for the verification of information flow security properties. IEEE Transactions on Software Engineering, 23(9), 1997.
-
(1997)
IEEE Transactions on Software Engineering
, vol.23
, Issue.9
-
-
Focardi, R.1
Gorrieri, R.2
-
10
-
-
84974597207
-
Non-interference for the analysis of cryptographic protocols
-
Springer
-
Focardi, R., Gorrieri, R. and Martinelli, F., Non-interference for the analysis of cryptographic protocols. ICALP’00, LNCS 1853, Springer, 2000.
-
(2000)
ICALP’00, LNCS
, vol.1853
-
-
Focardi, R.1
Gorrieri, R.2
Martinelli, F.3
-
11
-
-
4043088311
-
Types and Subtypes for Client-Server Interactions
-
Springer
-
Gay, S. and Hole, M., Types and Subtypes for Client-Server Interactions, ESOP’99, LNCS 1576, 74–90, Springer, 1999.
-
(1999)
ESOP’99, LNCS
, vol.1576
, pp. 74-90
-
-
Gay, S.1
Hole, M.2
-
12
-
-
0023171371
-
-
Girard, J.-Y., Linear Logic, TCS, 50, 1–102, 1987.
-
(1987)
Linear Logic, TCS
, vol.50
, pp. 1-102
-
-
Girard, J.-Y.1
-
13
-
-
4043061377
-
Typed behavioural equivalences for processes in the presence of subtyping
-
Hennessy, M. and Rathke, J., Typed behavioural equivalences for processes in the presence of subtyping, To appear in Proc. CATS 2002.
-
(2002)
Proc. CATS
-
-
Hennessy, M.1
Rathke, J.2
-
14
-
-
84974577536
-
Information flow vs resource access in the asynchronous pi-calculus
-
Springer
-
Hennessy, M. and Riely, J., Information flow vs resource access in the asynchronous pi-calculus, ICALP’00, LNCS 1853, 415–427, Springer, 2000.
-
(2000)
ICALP’00, LNCS
, vol.1853
, pp. 415-427
-
-
Hennessy, M.1
Riely, J.2
-
15
-
-
85029492434
-
Types for Dyadic Interaction
-
Honda, K., Types for Dyadic Interaction. CONCUR’93, LNCS 715, 509–523, 1993.
-
(1993)
CONCUR’93, LNCS
, vol.715
, pp. 509-523
-
-
Honda, K.1
-
16
-
-
0029719979
-
Composing Processes
-
ACM
-
Honda, K., Composing Processes, POPL’96, 344–357, ACM, 1996.
-
(1996)
POPL’96
, pp. 344-357
-
-
Honda, K.1
-
17
-
-
84949043042
-
-
Notes on Linear Typing for Free Outputs, May
-
Honda, K., Notes on Linear Typing for Free Outputs, May, 2001.
-
(2001)
-
-
Honda, K.1
-
18
-
-
84947741770
-
Language Primitives and Type Discipline for Structured Communication-Based Programming
-
Springer-Verlag
-
Honda, K., Kubo, M. and Vasconcelos, V., Language Primitives and Type Discipline for Structured Communication-Based Programming. ESOP’98, LNCS 1381, 122–138. Springer-Verlag, 1998.
-
(1998)
ESOP’98, LNCS
, vol.1381
, pp. 122-138
-
-
Honda, K.1
Kubo, M.2
Vasconcelos, V.3
-
19
-
-
84983016110
-
An object calculus for asynchronous communication
-
Honda, K. and Tokoro, M. An object calculus for asynchronous communication. ECOOP’91, LNCS 512, 133–147, 1991.
-
(1991)
ECOOP’91, LNCS
, vol.512
, pp. 133-147
-
-
Honda, K.1
Tokoro, M.2
-
20
-
-
84947269249
-
Secure Information Flow as Typed Process Behaviour
-
Honda, K., Vasconcelos, V. and Yoshida, N., Secure Information Flow as Typed Process Behaviour, ESOP’00, LNCS 1782, 180–199, 2000.
-
(2000)
ESOP’00, LNCS
, vol.1782
, pp. 180-199
-
-
Honda, K.1
Vasconcelos, V.2
Yoshida, N.3
-
21
-
-
0029404929
-
On Reduction-Based Process Semantics
-
Honda, K. and Yoshida, N. On Reduction-Based Process Semantics. TCS, 151, 437–486, 1995.
-
(1995)
TCS
, vol.151
, pp. 437-486
-
-
Honda, K.1
Yoshida, N.2
-
22
-
-
0000423953
-
Game-theoretic analysis of call-by-value computation
-
(1999)
-
Honda, K. and Yoshida, N., Game-theoretic analysis of call-by-value computation. TCS, 221 (1999), 393–456, 1999.
-
(1999)
TCS
, vol.221
, pp. 393-456
-
-
Honda, K.1
Yoshida, N.2
-
23
-
-
0036040303
-
A uniform type structure for secure information flow
-
Honda, K. and Yoshida, N., A uniform type structure for secure information flow, To appear in POPL’02, ACM, 2002.
-
(2002)
POPL’02, ACM
-
-
Honda, K.1
Yoshida, N.2
-
24
-
-
0034672932
-
On Full Abstraction for PCF
-
(2000)
-
Hyland, M. and Ong, L., “On Full Abstraction for PCF”: I, II and III. Info. & Comp. 163(2000), 285–408, 2000.
-
(2000)
I, II and III. Info. & Comp
, vol.163
, pp. 285-408
-
-
Hyland, M.1
Ong, L.2
-
25
-
-
0029706996
-
Linearity and the p-calculus
-
Kobayashi, N., Pierce, B., and Turner, D., Linearity and the p-calculus, POPL’96, 358–371, 1996.
-
(1996)
POPL’96
, pp. 358-371
-
-
Kobayashi, N.1
Pierce, B.2
Turner, D.3
-
26
-
-
84976193394
-
Functions as Processes
-
CUP
-
Milner, R., Functions as Processes. MSCS, 2(2), 119–146, CUP, 1992.
-
(1992)
MSCS
, vol.2
, Issue.2
, pp. 119-146
-
-
Milner, R.1
-
27
-
-
84968816021
-
Barbed Bisimulation
-
Springer
-
Milner, R. and Sangiorgi, D., Barbed Bisimulation, ICALP’92, LNCS 623, 685–695, Springer, 1992.
-
(1992)
ICALP’92, LNCS
, vol.623
, pp. 685-695
-
-
Milner, R.1
Sangiorgi, D.2
-
28
-
-
84951190926
-
On confluence in the p-Calculus
-
Springer
-
Philippou, A. and Walker, D., On confluence in the p-Calculus, ICALP’97, LNCS 1256, 314–324, Springer, 1997.
-
(1997)
ICALP’97, LNCS
, vol.1256
, pp. 314-324
-
-
Philippou, A.1
Walker, D.2
-
29
-
-
0030260547
-
P-calculus, internal mobility, and agent-passing calculi
-
Sangiorgi, D. p-calculus, internal mobility, and agent-passing calculi. TCS, 167(2):235–271, 1996.
-
(1996)
TCS
, vol.167
, Issue.2
, pp. 235-271
-
-
Sangiorgi, D.1
-
30
-
-
0000973591
-
The name discipline of uniform receptiveness
-
Sangiorgi, D., The name discipline of uniform receptiveness, TCS, 221, 457–493, 1999.
-
(1999)
TCS
, vol.221
, pp. 457-493
-
-
Sangiorgi, D.1
-
31
-
-
84957869855
-
A per model of secure information flow in sequential programs
-
Springer
-
Sabelfield, A. and Sands, D. A per model of secure information flow in sequential programs. ESOP’99, LNCS 1576, Springer, 1999.
-
(1999)
ESOP’99, LNCS
, vol.1576
-
-
Sabelfield, A.1
Sands, D.2
-
32
-
-
0031648455
-
Secure information flow in a multi-threaded imperative language
-
Smith, G. and Volpano, D., Secure information flow in a multi-threaded imperative language, 355–364, POPL’98, ACM, 1998.
-
(1998)
POPL’98, ACM
, pp. 355-364
-
-
Smith, G.1
Volpano, D.2
-
33
-
-
85024747258
-
Typed concurrent objects
-
Springer
-
Vasconcelos, V., Typed concurrent objects. ECOOP’94, LNCS 821, 100–117. Springer, 1994.
-
(1994)
ECOOP’94, LNCS
, vol.821
, pp. 100-117
-
-
Vasconcelos, V.1
-
34
-
-
84947920982
-
Graph Types for Mobile Processes
-
Springer
-
Yoshida, N. Graph Types for Mobile Processes. FST/TCS’16, LNCS 1180, 371–386, Springer, 1996.
-
(1996)
FST/TCS’16, LNCS
, vol.1180
, pp. 371-386
-
-
Yoshida, N.1
-
35
-
-
19044368044
-
Strong Normalisation in the p-Calculus
-
The full version as MCS technical report, 2001-09, University of Leicester, 2001
-
Yoshida, N., Berger, M. and Honda, K., Strong Normalisation in the p-Calculus, LICS’01, IEEE, 2001. The full version as MCS technical report, 2001-09, University of Leicester, 2001. Available at www.mcs.le.ac.uk/~nyoshida/paper.html.
-
(2001)
LICS’01, IEEE
-
-
Yoshida, N.1
Berger, M.2
Honda, K.3
-
36
-
-
84949043044
-
-
MCS technical report, 2001-48, University of Leicester
-
A full version of this paper. MCS technical report, 2001-48, University of Leicester, 2001. Available at www.mcs.le.ac.uk/~nyoshida/paper.html.
-
(2001)
-
-
|