-
1
-
-
0011122747
-
Structural operational semantics
-
J.A. Bergstra, A. Ponse, & S.A. Smolka. Amsterdam: Elsevier
-
Aceto L., Fokkink W.J., Verhoef C. Structural operational semantics. Bergstra J.A., Ponse A., Smolka S.A. Handbook of Process Algebra. 2001;197-292 Elsevier, Amsterdam.
-
(2001)
Handbook of Process Algebra
, pp. 197-292
-
-
Aceto, L.1
Fokkink, W.J.2
Verhoef, C.3
-
2
-
-
84872312669
-
A comparison of non-interference and non-deducibility using CSP
-
IEEE Computer Society Press
-
P.G. Allen, A comparison of non-interference and non-deducibility using CSP, Proc. IEEE Computer Security Foundation Workshop, IEEE Computer Society Press, 1991, 43-54.
-
(1991)
Proc. IEEE Computer Security Foundation Workshop
, pp. 43-54
-
-
Allen, P.G.1
-
4
-
-
0003400251
-
Secure computer systems: Unified exposition and multics interpretation
-
MITRE MTR-2997
-
D. Bell, L.J. La Padula, Secure computer systems: unified exposition and multics interpretation, Technical Report ESD-TR-75-301, MITRE MTR-2997, 1976.
-
(1976)
Technical Report
, vol.ESD-TR-75-301
-
-
Bell, D.1
La Padula, L.J.2
-
5
-
-
0002247730
-
Structural operational semantics for weak bisimulation
-
Bloom B. Structural operational semantics for weak bisimulation. Theoretical Computer Science. 146(1-2):1995;25-68.
-
(1995)
Theoretical Computer Science
, vol.146
, Issue.1-2
, pp. 25-68
-
-
Bloom, B.1
-
6
-
-
35248883450
-
A proof system for information flow security
-
Proc. International Workshop on Logic Based Program Development and Transformation, Springer, Berlin
-
A. Bossi, R. Focardi, C. Piazza, S. Rossi, A proof system for information flow security, Proc. International Workshop on Logic Based Program Development and Transformation, Lecture Notes in Computer Science, vol. 2664, Springer, Berlin, 2002, pp. 199-218.
-
(2002)
Lecture Notes in Computer Science
, vol.2664
, pp. 199-218
-
-
Bossi, A.1
Focardi, R.2
Piazza, C.3
Rossi, S.4
-
7
-
-
35248852380
-
Bisimulation and unwinding for verifying possibilistic security properties
-
Proc. International Conference on Verification, Model Checking and Abstract Interpretation, Springer, Berlin
-
A. Bossi, R. Focardi, C. Piazza, S. Rossi, Bisimulation and unwinding for verifying possibilistic security properties, Proc. International Conference on Verification, Model Checking and Abstract Interpretation, Lecture Notes in Computer Science, vol. 2575, Springer, Berlin, 2003, pp. 223-237.
-
(2003)
Lecture Notes in Computer Science
, vol.2575
, pp. 223-237
-
-
Bossi, A.1
Focardi, R.2
Piazza, C.3
Rossi, S.4
-
8
-
-
0142218855
-
Information flow security and recursive systems
-
Proc. Italian Conference on Theoretical Computer Science, Springer, Berlin
-
A. Bossi, D. Macedonio, C. Piazza, S. Rossi, Information flow security and recursive systems, Proc. Italian Conference on Theoretical Computer Science, Lecture Notes in Computer Science, vol. 2841, Springer, Berlin, 2003, pp. 369-382.
-
(2003)
Lecture Notes in Computer Science
, vol.2841
, pp. 369-382
-
-
Bossi, A.1
Macedonio, D.2
Piazza, C.3
Rossi, S.4
-
9
-
-
84974776068
-
A classification of security properties for process algebras
-
Focardi R., Gorrieri R. A classification of security properties for process algebras. Journal of Computer Security. 3(1):1995;5-33.
-
(1995)
Journal of Computer Security
, vol.3
, Issue.1
, pp. 5-33
-
-
Focardi, R.1
Gorrieri, R.2
-
10
-
-
0001439194
-
The compositionality security checker: A tool for the verification of information flow properties
-
Focardi R., Gorrieri R. The compositionality security checker: a tool for the verification of information flow properties. IEEE Transactions on Software Engineering. 23(9):1997;550-571.
-
(1997)
IEEE Transactions on Software Engineering
, vol.23
, Issue.9
, pp. 550-571
-
-
Focardi, R.1
Gorrieri, R.2
-
11
-
-
84988393004
-
Classification of security properties (Part I: Information flow)
-
Foundations of Security Analysis and Design Summer School, Tutorial Lectures, Springer, Berlin
-
R. Focardi, R. Gorrieri, Classification of security properties (Part I: Information flow), in Foundations of Security Analysis and Design Summer School, Tutorial Lectures, Lecture Notes in Computer Science, vol. 2171, Springer, Berlin, 2001, pp. 331-396.
-
(2001)
Lecture Notes in Computer Science
, vol.2171
, pp. 331-396
-
-
Focardi, R.1
Gorrieri, R.2
-
13
-
-
0034140160
-
Rooted branching bisimulation as a congruence
-
Fokkink W.J. Rooted branching bisimulation as a congruence. Journal of Computer and System Sciences. 60(1):2000;13-37.
-
(2000)
Journal of Computer and System Sciences
, vol.60
, Issue.1
, pp. 13-37
-
-
Fokkink, W.J.1
-
14
-
-
0000198242
-
Structured operational semantics and bisimulation as a congruence
-
Groote J.F., Vaandrager F. Structured operational semantics and bisimulation as a congruence. Information and Computation. 100(2):1992;202-260.
-
(1992)
Information and Computation
, vol.100
, Issue.2
, pp. 202-260
-
-
Groote, J.F.1
Vaandrager, F.2
-
17
-
-
0016972709
-
Formal verification of parallel programs
-
Keller R. Formal verification of parallel programs. Communications of the ACM. 19:1976;371-384.
-
(1976)
Communications of the ACM
, vol.19
, pp. 371-384
-
-
Keller, R.1
-
18
-
-
0003067817
-
Representation of events in nerve nets and finite automata
-
Princeton University Press
-
Kleene S.C. Representation of events in nerve nets and finite automata, Automata Studies. 1956;Princeton University Press. pp. 3-41.
-
(1956)
Automata Studies
, pp. 3-41
-
-
Kleene, S.C.1
-
19
-
-
0036083020
-
On the composition of secure systems
-
IEEE Computer Society Press
-
H. Mantel, On the composition of secure systems, Proc. IEEE Symposium on Security and Privacy, IEEE Computer Society Press, 2002, pp. 88-101.
-
(2002)
Proc. IEEE Symposium on Security and Privacy
, pp. 88-101
-
-
Mantel, H.1
-
20
-
-
0031645024
-
Partial model checking and theorem proving for ensuring security properties
-
IEEE Computer Society Press
-
F. Martinelli, Partial model checking and theorem proving for ensuring security properties, Proc. IEEE Computer Security Foundation Workshop, IEEE Computer Society Press, 1998, pp. 44-52.
-
(1998)
Proc. IEEE Computer Security Foundation Workshop
, pp. 44-52
-
-
Martinelli, F.1
-
21
-
-
0023231848
-
Specification for multi-level security and hook-up property
-
IEEE Computer Society Press
-
D. McCullough, Specification for multi-level security and hook-up property, Proc. IEEE Symposium on Security and Privacy, IEEE Computer Society Press, 1987, pp. 161-166.
-
(1987)
Proc. IEEE Symposium on Security and Privacy
, pp. 161-166
-
-
McCullough, D.1
-
23
-
-
0028058408
-
A general theory of composition for trace sets closed under selective interleaving functions
-
IEEE Computer Society Press
-
J. McLean, A general theory of composition for trace sets closed under selective interleaving functions, Proc. IEEE Symposium on Security and Privacy, IEEE Computer Society Press, 1994, pp. 79-93.
-
(1994)
Proc. IEEE Symposium on Security and Privacy
, pp. 79-93
-
-
McLean, J.1
-
24
-
-
0002426876
-
A general theory of composition for a class of "possibilistic" security properties
-
McLean J. A general theory of composition for a class of "possibilistic" security properties. IEEE Transactions on Software Engineering. 22(1):1996;53-67.
-
(1996)
IEEE Transactions on Software Engineering
, vol.22
, Issue.1
, pp. 53-67
-
-
McLean, J.1
-
25
-
-
0000066575
-
A complete inference system for a class of regular behaviors
-
Milner R. A complete inference system for a class of regular behaviors. Journal of Computer and System Sciences. 28(3):1984;439-466.
-
(1984)
Journal of Computer and System Sciences
, vol.28
, Issue.3
, pp. 439-466
-
-
Milner, R.1
-
27
-
-
0003604327
-
The polyadic π -calculus: A tutorial
-
Department of Computer Science, Edinburgh University
-
R. Milner, The polyadic π -calculus: a tutorial, Technical Report ECS-LFCS-91-180, Department of Computer Science, Edinburgh University, 1991.
-
(1991)
Technical Report
, vol.ECS-LFCS-91-180
-
-
Milner, R.1
-
28
-
-
0003931061
-
A structural approach to operational semantics
-
University of Aarhus
-
G. Plotkin, A structural approach to operational semantics, Technical Report DAIMI FN-19, University of Aarhus, 1981.
-
(1981)
Technical Report
, vol.DAIMI FN-19
-
-
Plotkin, G.1
-
29
-
-
0001868056
-
Non-interference through determinism
-
Proc. European Symposium on Research in Computer Security, Springer, Berlin
-
A.W. Roscoe, J.C.P. Woodcock, L. Wulf, Non-interference through determinism, Proc. European Symposium on Research in Computer Security, Lecture Notes in Computer Science, vol. 875, Springer, Berlin, 1994, pp. 33-53.
-
(1994)
Lecture Notes in Computer Science
, vol.875
, pp. 33-53
-
-
Roscoe, A.W.1
Woodcock, J.C.P.2
Wulf, L.3
-
30
-
-
0003706571
-
A CSP formulation of non-interference and unwinding
-
IEEE Computer Society Press
-
P.Y.A. Ryan, A CSP formulation of non-interference and unwinding, Proc. IEEE Computer Security Foundation Workshop, IEEE Computer Society Press, 1990.
-
(1990)
Proc. IEEE Computer Security Foundation Workshop
-
-
Ryan, P.Y.A.1
-
31
-
-
0022186092
-
Higher level synchronization devices in SCCS-Meije
-
De Simone R. Higher level synchronization devices in SCCS-Meije. Theoretical Computer Science. 37:1985;245-267.
-
(1985)
Theoretical Computer Science
, vol.37
, pp. 245-267
-
-
De Simone, R.1
-
32
-
-
21144445349
-
Rule formats for non-interference
-
Proc. European Symposium on Programming, Springer, Berlin
-
S. Tini, Rule formats for non-interference, Proc. European Symposium on Programming, Lecture Notes in Computer Science, vol. 2618, Springer, Berlin, 2003, pp. 129-143.
-
(2003)
Lecture Notes in Computer Science
, vol.2618
, pp. 129-143
-
-
Tini, S.1
-
34
-
-
0037057857
-
Ordered SOS process languages for branching and eager bisimulations
-
Ulidowski I., Phillips I.C.C. Ordered SOS process languages for branching and eager bisimulations. Information and Computation. 178(1):2002;180-213.
-
(2002)
Information and Computation
, vol.178
, Issue.1
, pp. 180-213
-
-
Ulidowski, I.1
Phillips, I.C.C.2
-
35
-
-
0347307535
-
The algebra of communicating processes with empty process
-
Vrancken J.L.M. The algebra of communicating processes with empty process. Theoretical Computer Science. 177(2):1997;287-328.
-
(1997)
Theoretical Computer Science
, vol.177
, Issue.2
, pp. 287-328
-
-
Vrancken, J.L.M.1
|