-
1
-
-
17944374564
-
Process algebra
-
L. Aceto and W.J. Fokkink, editors
-
L. Aceto and W.J. Fokkink, editors, Special issue on process algebra, Information Processing Letters, 80, 2001.
-
(2001)
Information Processing Letters
, vol.80
, Issue.SPEC. ISSUE
-
-
-
2
-
-
0011122747
-
Structural operational semantics
-
J.A. Bergstra, A. Ponse, and S.A. Smolka, editors, Elsevier, Amsterdam
-
L. Aceto, W.J. Fokkink, and C. Verhoef, Structural operational semantics, in J.A. Bergstra, A. Ponse, and S.A. Smolka, editors, Handbook of Process Algebra, Elsevier, Amsterdam, 2001, 197-292.
-
(2001)
Handbook of Process Algebra
, pp. 197-292
-
-
Aceto, L.1
Fokkink, W.J.2
Verhoef, C.3
-
3
-
-
84872312669
-
A comparison of non interference and non deducibility using CSP
-
IEEE Computer Society Press
-
P.G. Allen, A comparison of non interference and non deducibility using CSP, Proc. IEEE Computer Security Foundation Workshop, IEEE Computer Society Press, 1991, 43-54.
-
(1991)
Proc. IEEE Computer Security Foundation Workshop
, pp. 43-54
-
-
Allen, P.G.1
-
5
-
-
0002247730
-
Structural operational semantics for weak bisimulation
-
B. Bloom, Structural operational semantics for weak bisimulation, Theoretical Computer Science, 146, 1995, 25-68.
-
(1995)
Theoretical Computer Science
, vol.146
, pp. 25-68
-
-
Bloom, B.1
-
6
-
-
84974776068
-
A classification of security properties for process algebras
-
R. Focardi and R. Gorrieri, A classification of security properties for process algebras, Journal of Computer Security, 3, 1995, 5-33.
-
(1995)
Journal of Computer Security
, vol.3
, pp. 5-33
-
-
Focardi, R.1
Gorrieri, R.2
-
7
-
-
0001439194
-
The compositional security checker: A tool for the verification of information flow security properties
-
R. Focardi and R. Gorrieri, The compositional security checker: A tool for the verification of information flow security properties, IEEE Transactions on Software Engineering, 23, 1997, 550-571.
-
(1997)
IEEE Transactions on Software Engineering
, vol.23
, pp. 550-571
-
-
Focardi, R.1
Gorrieri, R.2
-
8
-
-
84988393004
-
Classification of security properties (Part I: Information flow)
-
Foundations of Security Analysis and Design, Tutorial Lectures, Springer, Berlin
-
R. Focardi and R. Gorrieri, Classification of security properties (Part I: Information flow), Foundations of Security Analysis and Design, Tutorial Lectures, Lecture Notes in Computer Science, 2171, Springer, Berlin, 2001, 331-396.
-
(2001)
Lecture Notes in Computer Science
, vol.2171
, pp. 331-396
-
-
Focardi, R.1
Gorrieri, R.2
-
12
-
-
0031645024
-
Partial model checking and theorem proving for ensuring security properties
-
IEEE Computer Society Press
-
F. Martinelli, Partial model checking and theorem proving for ensuring security properties, Proc. IEEE Computer Security Foundation Workshop, IEEE Computer Society Press, 1998, 44-52.
-
(1998)
Proc. IEEE Computer Security Foundation Workshop
, pp. 44-52
-
-
Martinelli, F.1
-
15
-
-
0001868056
-
Non interference through determinism
-
Proc. European Symposium on Research in Computer Security, Springer, Berlin
-
A.W. Roscoe, J.C.P. Woodcock, and L. Wulf, Non interference through determinism, Proc. European Symposium on Research in Computer Security, Lecture Notes in Computer Science, 875, Springer, Berlin, 1994, 33-53.
-
(1994)
Lecture Notes in Computer Science
, vol.875
, pp. 33-53
-
-
Roscoe, A.W.1
Woodcock, J.C.P.2
Wulf, L.3
-
17
-
-
0022186092
-
Higher level synchronization devices in SCCS-Meije
-
R. De Simone, Higher level synchronization devices in SCCS-Meije, Theoretical Computer Science, 37, 1985, 245-267.
-
(1985)
Theoretical Computer Science
, vol.37
, pp. 245-267
-
-
De Simone, R.1
-
18
-
-
84956983460
-
Formats of ordered SOS rules with silent actions
-
Proc. Theory and Practice of Software Development, Springer, Berlin
-
I. Ulidowski and I. Phillips, Formats of ordered SOS rules with silent actions, Proc. Theory and Practice of Software Development, Lecture Notes in Computer Science, 1214, Springer, Berlin, 1997, 297-308.
-
(1997)
Lecture Notes in Computer Science
, vol.1214
, pp. 297-308
-
-
Ulidowski, I.1
Phillips, I.2
|