-
1
-
-
0011122743
-
Comparing the QoS of internet audio mechanisms via formal methods
-
A. Aldini, M. Bernardo, R. Gorrieri and M. Roccetti, Comparing the QoS of internet audio mechanisms via formal methods, ACM Transactions on Modeling and Computer Simulation 11(1) (2001), 1-42.
-
(2001)
ACM Transactions on Modeling and Computer Simulation
, vol.11
, Issue.1
, pp. 1-42
-
-
Aldini, A.1
Bernardo, M.2
Gorrieri, R.3
Roccetti, M.4
-
3
-
-
3042529082
-
A process-algebraic approach for the analysis of probabilistic non-interference
-
University of Bologna, Italy
-
A. Aldini, M. Bravetti and R. Gorrieri, A process-algebraic approach for the analysis of probabilistic non-interference, Technical Report UBLCS-2002-02, University of Bologna, Italy, 2002, ftp://ftp.es.unibo.it/pub/techreports/
-
(2002)
Technical Report
, vol.UBLCS-2002-02
-
-
Aldini, A.1
Bravetti, M.2
Gorrieri, R.3
-
4
-
-
84943242087
-
Security analysis of a probabilistic non-repudiation protocol
-
Springer LNCS
-
A. Aldini and R. Gorrieri, Security analysis of a probabilistic non-repudiation protocol, in: Proc. of 2nd Joint Int. Workshop on Process Algebra and Performance Modelling, Probabilistic Methods in Verification, Springer LNCS, Vol. 2399, 2002, pp. 17-36.
-
(2002)
Proc. of 2nd Joint Int. Workshop on Process Algebra and Performance Modelling, Probabilistic Methods in Verification
, vol.2399
, pp. 17-36
-
-
Aldini, A.1
Gorrieri, R.2
-
6
-
-
84957037045
-
Computational probabilistic non-interference
-
Springer LNCS
-
M. Backes and B. Pfitzmann, Computational probabilistic non-interference, in: Proc. of 7th European Symposium on Research in Computer Security, Springer LNCS, Vol. 2502, 2002, pp. 1-23.
-
(2002)
Proc. of 7th European Symposium on Research in Computer Security
, vol.2502
, pp. 1-23
-
-
Backes, M.1
Pfitzmann, B.2
-
7
-
-
58149326570
-
Axiomatizing probabilistic processes: ACP with generative probabilities
-
J.C.M. Baeten, J.A. Bergstra and S.A. Smolka, Axiomatizing probabilistic processes: ACP with generative probabilities, Information and Computation 121 (1995), 234-255.
-
(1995)
Information and Computation
, vol.121
, pp. 234-255
-
-
Baeten, J.C.M.1
Bergstra, J.A.2
Smolka, S.A.3
-
8
-
-
84947419887
-
Weak bisimulation for fully probabilistic processes
-
Springer LNCS
-
C. Baier and H. Hermanns, Weak bisimulation for fully probabilistic processes, in: Proc. of 9th Int. Conf. on Computer Aided Verification, Springer LNCS, Vol. 1254, 1997, pp. 119-130.
-
(1997)
Proc. of 9th Int. Conf. on Computer Aided Verification
, vol.1254
, pp. 119-130
-
-
Baier, C.1
Hermanns, H.2
-
9
-
-
0003400251
-
Secure computer systems: Mathematical foundations and model
-
The MITRE Corporation, Bedford, MA
-
D.E. Bell and L.J. La Padula, Secure computer systems: mathematical foundations and model, Technical Report M74-244, The MITRE Corporation, Bedford, MA, 1973.
-
(1973)
Technical Report
, vol.M74-244
-
-
Bell, D.E.1
La Padula, L.J.2
-
11
-
-
0037209771
-
Discrete time generative-reactive probabilistic processes with different advancing speeds
-
M. Bravetti and A. Aldini, Discrete time generative-reactive probabilistic processes with different advancing speeds, Theoretical Computer Science 290(1) (2003), 355-406.
-
(2003)
Theoretical Computer Science
, vol.290
, Issue.1
, pp. 355-406
-
-
Bravetti, M.1
Aldini, A.2
-
12
-
-
23044531196
-
Expressing processes with different action durations through probabilities
-
Springer LNCS
-
M. Bravetti and A. Aldini, Expressing processes with different action durations through probabilities, in: Proc. of 1st Joint Int. Workshop on Process Algebra and Performance Modelling. Probabilistic Methods in Verification, Springer LNCS, Vol. 2165, 2001, pp. 168-183.
-
(2001)
Proc. of 1st Joint Int. Workshop on Process Algebra and Performance Modelling. Probabilistic Methods in Verification
, vol.2165
, pp. 168-183
-
-
Bravetti, M.1
Aldini, A.2
-
13
-
-
19144372130
-
Compositional asymmetric cooperations for process algebras with probabilities, priorities, and time
-
M. Bravetti and M. Bernardo, Compositional asymmetric cooperations for process algebras with probabilities, priorities, and time, in: Proc. of 1st Workshop on Models for Time-Critical Systems, ENTCS 39(3) (2000).
-
(2000)
Proc. of 1st Workshop on Models for Time-critical Systems, ENTCS
, vol.39
, Issue.3
-
-
Bravetti, M.1
Bernardo, M.2
-
14
-
-
0001375583
-
A note on the congruence proof for recursion in Markovian bisimulation equivalence
-
C. Priami, ed.
-
M. Bravetti, M. Bernardo and R. Gorrieri, A note on the congruence proof for recursion in Markovian bisimulation equivalence, in: Proc. of 6th Int. Workshop on Process Algebras and Performance Modeling, C. Priami, ed., 1998, pp. 153-164.
-
(1998)
Proc. of 6th Int. Workshop on Process Algebras and Performance Modeling
, pp. 153-164
-
-
Bravetti, M.1
Bernardo, M.2
Gorrieri, R.3
-
15
-
-
84879525367
-
Towards quantitative verification of probabilistic systems (extended abstract)
-
Springer LNCS
-
F. van Breugel and J. Worrell, Towards quantitative verification of probabilistic systems (extended abstract), in: Proc. of 28th International Colloquium on Automata, Languages and Programming, Springer LNCS, Vol. 2076, 2001, pp. 421-432.
-
(2001)
Proc. of 28th International Colloquium on Automata, Languages and Programming
, vol.2076
, pp. 421-432
-
-
Van Breugel, F.1
Worrell, J.2
-
16
-
-
0034500567
-
Random oracles in constantipole: Practical asynchronous Byzantine agreement using cryptography (extended abstract)
-
ACM Press
-
C. Cachin, K. Kursawe and V. Shoup, Random oracles in constantipole: practical asynchronous Byzantine agreement using cryptography (extended abstract), in: Proc. of 19th Symposium on Principles of Distributed Computing, ACM Press, 2000, pp. 123-132.
-
(2000)
Proc. of 19th Symposium on Principles of Distributed Computing
, pp. 123-132
-
-
Cachin, C.1
Kursawe, K.2
Shoup, V.3
-
18
-
-
0036052667
-
The metric analogue of weak bisimulation for probabilistic processes
-
IEEE Computer Society Press
-
J. Desharnais, V. Gupta, R. Jagadeesan and P. Panangaden, The metric analogue of weak bisimulation for probabilistic processes, in: Proc. of 17th Symposium on Logic in Computer Science, IEEE Computer Society Press, 2002.
-
(2002)
Proc. of 17th Symposium on Logic in Computer Science
-
-
Desharnais, J.1
Gupta, V.2
Jagadeesan, R.3
Panangaden, P.4
-
20
-
-
84948746951
-
Approximate non-interference
-
IEEE CS Press
-
A. Di Pierro, C. Hankin and H. Wiklicky, Approximate non-interference, in: Proc. of 15th Computer Security Foundations Workshop, IEEE CS Press, 2002, pp. 1-17.
-
(2002)
Proc. of 15th Computer Security Foundations Workshop
, pp. 1-17
-
-
Di Pierro, A.1
Hankin, C.2
Wiklicky, H.3
-
21
-
-
84958745858
-
Analysing approximate confinement under uniform attacks
-
Springer LNCS
-
A. Di Pierro, C. Hankin and H. Wiklicky, Analysing approximate confinement under uniform attacks, in: Proc. of 9th Symposium on Static Analysis, Springer LNCS, Vol. 2477, 2002, pp. 310-325.
-
(2002)
Proc. of 9th Symposium on Static Analysis
, vol.2477
, pp. 310-325
-
-
Di Pierro, A.1
Hankin, C.2
Wiklicky, H.3
-
22
-
-
0039926997
-
A compiler for analysing cryptographic protocols using non-interference
-
special issue on Software Engineering & Security
-
A. Durante, R. Focardi and R. Gorrieri, A compiler for analysing cryptographic protocols using non-interference, ACM Transactions on Software Engineering and Methodology, special issue on Software Engineering & Security 9(4) (2000), 489-530.
-
(2000)
ACM Transactions on Software Engineering and Methodology
, vol.9
, Issue.4
, pp. 489-530
-
-
Durante, A.1
Focardi, R.2
Gorrieri, R.3
-
23
-
-
84944070422
-
Analysing time dependent security properties in CSP using PVS
-
Springer LNCS
-
N. Evans and S. Schneider, Analysing time dependent security properties in CSP using PVS, in: Proc. of Symposium on Research in Computer Security, Springer LNCS, Vol. 1895, 2000, pp. 222-237.
-
(2000)
Proc. of Symposium on Research in Computer Security
, vol.1895
, pp. 222-237
-
-
Evans, N.1
Schneider, S.2
-
25
-
-
0001439194
-
The compositional security checker: A tool for the verification of information flow security properties
-
R. Focardi and R. Gorrieri, The compositional security checker: a tool for the verification of information flow security properties, IEEE Trans. Sof. Eng. 27 (1997), 550-571.
-
(1997)
IEEE Trans. Sof. Eng.
, vol.27
, pp. 550-571
-
-
Focardi, R.1
Gorrieri, R.2
-
26
-
-
84988393004
-
Classification of security properties (Part I: Information flow)
-
R. Focardi and R. Gorrieri, eds, Springer LNCS
-
R. Focardi and R. Gorrieri, Classification of security properties (Part I: information flow), in: Foundations of Security Analysis and Design - Tutorial Lectures, R. Focardi and R. Gorrieri, eds, Springer LNCS, Vol. 2171, 2001, pp. 331-396.
-
(2001)
Foundations of Security Analysis and Design - Tutorial Lectures
, vol.2171
, pp. 331-396
-
-
Focardi, R.1
Gorrieri, R.2
-
27
-
-
0033725594
-
Information flow analysis in a discrete-time process algebra
-
IEEE CS Press
-
R. Focardi, R. Gorrieri and F. Martinelli, Information flow analysis in a discrete-time process algebra, in: Proc. of 13th IEEE Computer Security Foundations Workshop, IEEE CS Press, 2000, pp. 170-184.
-
(2000)
Proc. of 13th IEEE Computer Security Foundations Workshop
, pp. 170-184
-
-
Focardi, R.1
Gorrieri, R.2
Martinelli, F.3
-
28
-
-
84974597207
-
Non interference for the analysis of cryptographic protocols
-
Springer LNCS
-
R. Focardi, R. Gorrieri and F. Martinelli, Non interference for the analysis of cryptographic protocols, in: Proc. of 27th International Colloquium on Automata, Languages and Programming, Springer LNCS, Vol. 1853, 2000, pp. 354-372.
-
(2000)
Proc. of 27th International Colloquium on Automata, Languages and Programming
, vol.1853
, pp. 354-372
-
-
Focardi, R.1
Gorrieri, R.2
Martinelli, F.3
-
31
-
-
0006419926
-
Reactive, generative and stratified models of probabilistic processes
-
R.J. van Glabbeek, S.A. Smolka and B. Steffen, Reactive, generative and stratified models of probabilistic processes, Information and Computation 121 (1995), 59-80.
-
(1995)
Information and Computation
, vol.121
, pp. 59-80
-
-
Van Glabbeek, R.J.1
Smolka, S.A.2
Steffen, B.3
-
33
-
-
84974759639
-
Toward a mathematical foundation for information flow security
-
J.W. Gray, III, Toward a mathematical foundation for information flow security, Journal of Computer Security 1 (1992), 255-294.
-
(1992)
Journal of Computer Security
, vol.1
, pp. 255-294
-
-
Gray III, J.W.1
-
38
-
-
84885216103
-
Secure information flow for concurrent processes
-
Springer LNCS
-
J. Jürjens, Secure information flow for concurrent processes, in: Proc. of 11th Int. Conf. on Concurrency Theory, Springer LNCS, Vol. 1877, 2000, pp. 395-409.
-
(2000)
Proc. of 11th Int. Conf. on Concurrency Theory
, vol.1877
, pp. 395-409
-
-
Jürjens, J.1
-
39
-
-
0032218226
-
A probabilistic poly-time framework for protocol analysis
-
ACM Press
-
P. Lincoln, J.C. Mitchell, M. Mitchell and A. Scedrov, A probabilistic poly-time framework for protocol analysis, in: Proc. of 5th ACM Conf. on Computer and Communications Security, ACM Press, 1998, pp. 112-121.
-
(1998)
Proc. of 5th ACM Conf. on Computer and Communications Security
, pp. 112-121
-
-
Lincoln, P.1
Mitchell, J.C.2
Mitchell, M.3
Scedrov, A.4
-
47
-
-
3042670838
-
The successes and failures of behavioural models
-
Davies, Roscoe and Woodcock, eds, Palgrave
-
A.W. Roscoe, G.M. Reed and R. Forster, The successes and failures of behavioural models, in: Millenial Perspectives in Computer Science, Davies, Roscoe and Woodcock, eds, Palgrave, 2000.
-
(2000)
Millenial Perspectives in Computer Science
-
-
Roscoe, A.W.1
Reed, G.M.2
Forster, R.3
-
48
-
-
0001868056
-
Noninterference through determinism
-
Springer LNCS
-
A.W. Roscoe, J.C.P. Woodcock and L. Wulf, Noninterference through determinism, in: Proc. of European Symposium Research Computer Security, Springer LNCS, Vol. 875, 1994, pp. 33-53.
-
(1994)
Proc. of European Symposium Research Computer Security
, vol.875
, pp. 33-53
-
-
Roscoe, A.W.1
Woodcock, J.C.P.2
Wulf, L.3
-
50
-
-
0034829266
-
Non-interference: Who needs it?
-
IEEE CS Press
-
P.Y.A. Ryan, J. McLean, J. Millen and V. Gligor, Non-interference: who needs it? in: Proc. of 14th Computer Security Foundations Workshop, IEEE CS Press, 2001, pp. 237-238.
-
(2001)
Proc. of 14th Computer Security Foundations Workshop
, pp. 237-238
-
-
Ryan, P.Y.A.1
McLean, J.2
Millen, J.3
Gligor, V.4
-
52
-
-
84957869855
-
A Per model of secure information flow in sequential programs
-
Springer LNCS
-
A. Sabelfeld and D. Sands, A Per model of secure information flow in sequential programs, in: Proc. of 8th European Symposium on Programming, Springer LNCS, Vol. 1576, 1999, pp. 40-58.
-
(1999)
Proc. of 8th European Symposium on Programming
, vol.1576
, pp. 40-58
-
-
Sabelfeld, A.1
Sands, D.2
-
54
-
-
84955567248
-
The problem of weak bisimulation up to
-
Springer LNCS
-
D. Sangiorgi and R. Milner, The problem of weak bisimulation up to, in: Proc. of 3rd Int. Conf. on Concurrency Theory, Springer LNCS, Vol. 630, 1992, pp. 32-46.
-
(1992)
Proc. of 3rd Int. Conf. on Concurrency Theory
, vol.630
, pp. 32-46
-
-
Sangiorgi, D.1
Milner, R.2
-
59
-
-
0029504906
-
The epistemic representation of information flow security in probabilistic systems
-
IEEE CS Press
-
P. Syverson and J.W. Gray, III, The epistemic representation of information flow security in probabilistic systems, in: Proc. of 8th Computer Security Foundations Workshop, IEEE CS Press, 1995, pp. 152-166.
-
(1995)
Proc. of 8th Computer Security Foundations Workshop
, pp. 152-166
-
-
Syverson, P.1
Gray III, J.W.2
|