-
1
-
-
0001772130
-
Secrecy by typing in security protocols
-
M. Abadi, Secrecy by typing in security protocols, Journal of the ACM 46(5) (1999), 749-786.
-
(1999)
Journal of the ACM
, vol.46
, Issue.5
, pp. 749-786
-
-
Abadi, M.1
-
2
-
-
3042529082
-
A process-algebraic approach for the analysis of probabilistic non-interference
-
A. Aldini, M. Bravetti and R. Gorrieri, A process-algebraic approach for the analysis of probabilistic non-interference, Journal of Computer Security 12(2) (2004), 191-245.
-
(2004)
Journal of Computer Security
, vol.12
, Issue.2
, pp. 191-245
-
-
Aldini, A.1
Bravetti, M.2
Gorrieri, R.3
-
3
-
-
0003400251
-
Secure computer systems: Unified exposition and multics interpretation
-
MITRE MTR-2997
-
D.E. Bell and L.J. La Padula, Secure computer systems: Unified exposition and multics interpretation, Technical Report ESD-TR-75-306, MITRE MTR-2997, 1976.
-
(1976)
Technical Report
, vol.ESD-TR-75-306
-
-
Bell, D.E.1
La Padula, L.J.2
-
4
-
-
0347586993
-
Information flow security for XML transformations
-
Proc. of Asian Computing Science Conference (ASIAN '03), Springer, Berlin
-
V. Benzaken, M. Burelle and G. Castagna, Information flow security for XML transformations, in: Proc. of Asian Computing Science Conference (ASIAN '03), Volume 2896 of LNCS, Springer, Berlin, 2003, pp. 33-53.
-
(2003)
LNCS
, vol.2896
, pp. 33-53
-
-
Benzaken, V.1
Burelle, M.2
Castagna, G.3
-
5
-
-
84937553676
-
Static analysis for secrecy and non-interference in networks of processes
-
Proc. of International Conference on Parallel Computing Technologies, V.E. Malyshkin, ed., Springer, Berlin
-
C. Bodei, P. Degano, F. Nielson and H. Riis Nielson, Static analysis for secrecy and non-interference in networks of processes, in: Proc. of International Conference on Parallel Computing Technologies, V.E. Malyshkin, ed., Volume 2127 of LNCS, Springer, Berlin, 2001, pp. 27-41.
-
(2001)
LNCS
, vol.2127
, pp. 27-41
-
-
Bodei, C.1
Degano, P.2
Nielson, F.3
Riis Nielson, H.4
-
6
-
-
3242706680
-
Verifying persistent security properties
-
A. Bossi, R. Focardi, C. Piazza and S. Rossi, Verifying persistent security properties, Computer Languages, Systems and Structures 30(3-4) (2004), 231-258.
-
(2004)
Computer Languages, Systems and Structures
, vol.30
, Issue.3-4
, pp. 231-258
-
-
Bossi, A.1
Focardi, R.2
Piazza, C.3
Rossi, S.4
-
7
-
-
85029439013
-
Symbolic bisimulation minimization
-
Proc. of International Conference on Computer Aided Verification (CAV '92), G. von Bochmann and D.K. Probst, eds, Springer, Berlin
-
A. Bouali and R. de Simone, Symbolic bisimulation minimization, in: Proc. of International Conference on Computer Aided Verification (CAV '92), G. von Bochmann and D.K. Probst, eds, Volume 663 of LNCS, Springer, Berlin, 1992, pp. 96-108.
-
(1992)
LNCS
, vol.663
, pp. 96-108
-
-
Bouali, A.1
De Simone, R.2
-
8
-
-
18944374156
-
Information leakage detection in boundary ambients
-
Elsevier
-
C. Braghin, A. Cortesi and R. Focardi, Information leakage detection in boundary ambients, in: Proc. of Computing: The Australasian Theory Symposium (CATS '03), Electronic Notes in Theoretical Computer Science, Elsevier, 2003.
-
(2003)
Proc. of Computing: The Australasian Theory Symposium (CATS '03), Electronic Notes in Theoretical Computer Science
-
-
Braghin, C.1
Cortesi, A.2
Focardi, R.3
-
9
-
-
84978997669
-
Boxed ambients
-
TACS '01 Proc. of the 4th Int. Conference on Theoretical Aspects of Computer Science, Springer, Berlin
-
M. Bugliesi, G. Castagna and S. Crafa, Boxed ambients, in: TACS '01 Proc. of the 4th Int. Conference on Theoretical Aspects of Computer Science, Number 2215 in LNCS, Springer, Berlin, 2001, pp. 38-63.
-
(2001)
LNCS
, vol.2215
, pp. 38-63
-
-
Bugliesi, M.1
Castagna, G.2
Crafa, S.3
-
10
-
-
84877738879
-
Communication interference in mobile boxed ambients
-
Proc. of Int. Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS '02), M. Agrawal and A. Seth, eds, Springer, Berlin
-
M. Bugliesi, S. Crafa, M. Merro and V. Sassone, Communication interference in mobile boxed ambients, in: Proc. of Int. Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS '02), M. Agrawal and A. Seth, eds, Volume 2556 of LNCS, Springer, Berlin, 2002, pp. 71-84.
-
(2002)
LNCS
, vol.2556
, pp. 71-84
-
-
Bugliesi, M.1
Crafa, S.2
Merro, M.3
Sassone, V.4
-
11
-
-
84947919695
-
Mobile ambients
-
Proc. of Foundations of Software Science and Computation Structures (FoSSaCS), M. Nivat, ed., Springer
-
L. Cardelli and A.D. Gordon, Mobile ambients, in: Proc. of Foundations of Software Science and Computation Structures (FoSSaCS), M. Nivat, ed., Volume 1378 of LNCS, Springer, 1998, pp. 140-155.
-
(1998)
LNCS
, vol.1378
, pp. 140-155
-
-
Cardelli, L.1
Gordon, A.D.2
-
12
-
-
12444299406
-
Information flow security for boxed ambients
-
F-WAN: Int. Workshop on Foundations of Wide Area Networks, Elsevier
-
S. Crafa, M. Bugliesi and G. Castagna, Information flow security for boxed ambients, in: F-WAN: Int. Workshop on Foundations of Wide Area Networks, Number 66(3), Electronic Notes in Theoretical Computer Science, Elsevier, 2002.
-
(2002)
Electronic Notes in Theoretical Computer Science
, vol.66
, Issue.3
-
-
Crafa, S.1
Bugliesi, M.2
Castagna, G.3
-
13
-
-
84948746951
-
Approximate Non-interference
-
IEEE Computer Society Press
-
A. Di Pierro, C. Hankin and H. Wiklicky, Approximate Non-interference, in: Proc. of the IEEE Computer Security Foundations Workshop (CSFW '02), IEEE Computer Society Press, 2002, pp. 3-17.
-
(2002)
Proc. of the IEEE Computer Security Foundations Workshop (CSFW '02)
, pp. 3-17
-
-
Di Pierro, A.1
Hankin, C.2
Wiklicky, H.3
-
14
-
-
84958780189
-
A fast bisimulation algorithm
-
Proc. of International Conference on Computer Aided Verification (CAV '01), G. Berry, H. Comon and A. Finkel, eds, Springer, Berlin
-
A. Dovier, C. Piazza and A. Policriti, A fast bisimulation algorithm, in: Proc. of International Conference on Computer Aided Verification (CAV '01), G. Berry, H. Comon and A. Finkel, eds, Volume 2102 of LNCS, Springer, Berlin, 2001, pp. 79-90.
-
(2001)
LNCS
, vol.2102
, pp. 79-90
-
-
Dovier, A.1
Piazza, C.2
Policriti, A.3
-
15
-
-
84974776068
-
A classification of security properties for process algebras
-
R. Focardi and R. Gorrieri, A classification of security properties for process algebras, Journal of Computer Security 3(1) (1994/1995), 5-33.
-
(1994)
Journal of Computer Security
, vol.3
, Issue.1
, pp. 5-33
-
-
Focardi, R.1
Gorrieri, R.2
-
16
-
-
0001439194
-
The compositional security checker: A tool for the verification of information flow security properties
-
R. Focardi and R. Gorrieri, The compositional security checker: A tool for the verification of information flow security properties, IEEE Transactions on Software Engineering 23(9) (1997), 550-571.
-
(1997)
IEEE Transactions on Software Engineering
, vol.23
, Issue.9
, pp. 550-571
-
-
Focardi, R.1
Gorrieri, R.2
-
17
-
-
84988393004
-
Classification of security properties (Part I: Information flow)
-
Foundations of Security Analysis and Design, R. Focardi and R. Gorrieri, eds, Springer, Berlin
-
R. Focardi and R. Gorrieri, Classification of security properties (Part I: Information flow), in: Foundations of Security Analysis and Design, R. Focardi and R. Gorrieri, eds, Volume 2171 of LNCS, Springer, Berlin, 2001.
-
(2001)
LNCS
, vol.2171
-
-
Focardi, R.1
Gorrieri, R.2
-
18
-
-
84974597207
-
Non Interference for the analysis of cryptographic protocols
-
U. Montanari, J.D.P. Rolim and E. Welzl, eds, Proc. of International Colloquium on Automata, Languages and Programming (ICALP '00), Springer, Berlin
-
R. Focardi, R. Gorrieri and F. Martinelli, Non Interference for the analysis of cryptographic protocols, in: U. Montanari, J.D.P. Rolim and E. Welzl, eds, Proc. of International Colloquium on Automata, Languages and Programming (ICALP '00), Volume 1853 of LNCS, Springer, Berlin, 2000, pp. 744-755.
-
(2000)
LNCS
, vol.1853
, pp. 744-755
-
-
Focardi, R.1
Gorrieri, R.2
Martinelli, F.3
-
22
-
-
0020299523
-
Security policy and security models
-
IEEE Computer Society Press
-
J.A. Goguen and J. Meseguer, Security policy and security models, in: Proc, of the 1982 Symposium on Security and Privacy, IEEE Computer Society Press, 1982, pp. 11-20.
-
(1982)
Proc, of the 1982 Symposium on Security and Privacy
, pp. 11-20
-
-
Goguen, J.A.1
Meseguer, J.2
-
23
-
-
35248873844
-
A simple language for real-time cryptographic protocol analysis
-
Proc. of European Symposium on Programming (ESOP '03), P. Degano, ed., Springer, Berlin
-
R. Gorrieri, E. Locatelli and F. Martinelli, A simple language for real-time cryptographic protocol analysis, in: Proc. of European Symposium on Programming (ESOP '03), P. Degano, ed., Volume 2618 of LNCS, Springer, Berlin, 2003, pp. 114-128.
-
(2003)
LNCS
, vol.2618
, pp. 114-128
-
-
Gorrieri, R.1
Locatelli, E.2
Martinelli, F.3
-
24
-
-
20144362494
-
The security picalculus and Non-interference
-
University of Sussex, School of Cognitive and Computing Sciences, Brighton BN1 9QH, UK, Nov.
-
M. Hennessy, The security picalculus and Non-interference, Technical Report CS-05-2000, University of Sussex, School of Cognitive and Computing Sciences, Brighton BN1 9QH, UK, Nov. 2000.
-
(2000)
Technical Report
, vol.CS-05-2000
-
-
Hennessy, M.1
-
26
-
-
0037170503
-
Resource access control in systems of mobile agents
-
M. Hennessy and J. Riely, Resource access control in systems of mobile agents, Information and Computation 173 (2002), 82-120.
-
(2002)
Information and Computation
, vol.173
, pp. 82-120
-
-
Hennessy, M.1
Riely, J.2
-
28
-
-
0025432462
-
CCS Expressions, Finite state processes, and three problems of equivalence
-
P.C. Kannellakis and S.A. Smolka, CCS Expressions, Finite state processes, and three problems of equivalence, Information and Computation 86(1) (1990), 43-68.
-
(1990)
Information and Computation
, vol.86
, Issue.1
, pp. 43-68
-
-
Kannellakis, P.C.1
Smolka, S.A.2
-
32
-
-
84944059120
-
Unwinding possibilistic security properties
-
Proc. of the European Symposium on Research in Computer Security (ESoRiCS '00), Springer, Berlin
-
H. Mantel, Unwinding possibilistic security properties, in: Proc. of the European Symposium on Research in Computer Security (ESoRiCS '00), Volume 2895 of LNCS, Springer, Berlin, 2000, pp. 238-254.
-
(2000)
LNCS
, vol.2895
, pp. 238-254
-
-
Mantel, H.1
-
33
-
-
0023231848
-
Specifications for multi-level security and a hook-up property
-
IEEE Computer Society Press
-
D. McCullough, Specifications for multi-level security and a hook-up property, in: Proc, of the IEEE Symposium on Security and Privacy (SSP '87), IEEE Computer Society Press, 1987, pp. 161-166.
-
(1987)
Proc, of the IEEE Symposium on Security and Privacy (SSP '87)
, pp. 161-166
-
-
McCullough, D.1
-
34
-
-
0023829319
-
Noninterference and the composability of security properties
-
IEEE Computer Society Press
-
D. McCullough, Noninterference and the composability of security properties, in: Proceedings, 1988 IEEE Symposium on Security and Privacy, IEEE Computer Society Press, 1988, pp. 177-186.
-
(1988)
Proceedings, 1988 IEEE Symposium on Security and Privacy
, pp. 177-186
-
-
McCullough, D.1
-
36
-
-
0028058408
-
A general theory of composition for trace sets closed under selective interleaving functions
-
IEEE Computer Society Press
-
J. McLean, A general theory of composition for trace sets closed under selective interleaving functions, in: Proc. of the IEEE Symposium on Security and Privacy (SSP '94), IEEE Computer Society Press, 1994, pp. 79-93.
-
(1994)
Proc. of the IEEE Symposium on Security and Privacy (SSP '94)
, pp. 79-93
-
-
McLean, J.1
-
37
-
-
0024925378
-
Finite-state noiseless covert channels
-
MITRE Corporation, IEEE Computer Society Press
-
J.K. Millen, Finite-state noiseless covert channels, in: Proceedings of the Computer Security Foundations Workshop II, MITRE Corporation, IEEE Computer Society Press, 1989, pp. 81-86.
-
(1989)
Proceedings of the Computer Security Foundations Workshop
, vol.2
, pp. 81-86
-
-
Millen, J.K.1
-
39
-
-
44049113210
-
A calculus of mobile processes, I and II
-
R. Milner, J. Parrow and J. Walker, A calculus of mobile processes, I and II, Information and Computation 100(1) (1992), 1-77.
-
(1992)
Information and Computation
, vol.100
, Issue.1
, pp. 1-77
-
-
Milner, R.1
Parrow, J.2
Walker, J.3
-
40
-
-
84969347374
-
CCS dynamic bisimulation is progressing
-
Proc. of the Int. Symposium on Mathematical Foundations of Computer Science (MFCS '91), Springer, Berlin
-
U. Montanari and V. Sassone, CCS dynamic bisimulation is progressing, in: Proc. of the Int. Symposium on Mathematical Foundations of Computer Science (MFCS '91), Volume 520 of LNCS, Springer, Berlin, 1991, pp. 346-356.
-
(1991)
LNCS
, vol.520
, pp. 346-356
-
-
Montanari, U.1
Sassone, V.2
-
43
-
-
0023566630
-
Three partition refinement algorithms
-
R. Paige and R.E. Tarjan, Three partition refinement algorithms, SIAM Journal on Computing 16(6) (1987), 973-989.
-
(1987)
SIAM Journal on Computing
, vol.16
, Issue.6
, pp. 973-989
-
-
Paige, R.1
Tarjan, R.E.2
-
44
-
-
24644460616
-
CoPS: Checker of persistent security
-
Proc. of Int. Conference on Tools and Algorithms for Construction and Analysis of Systems (TACAS '04), Springer, Berlin
-
C. Piazza, E. Pivato and S. Rossi, CoPS: Checker of persistent security, in: Proc. of Int. Conference on Tools and Algorithms for Construction and Analysis of Systems (TACAS '04), Volume 2988 of LNCS, Springer, Berlin, 2004, pp. 144-152.
-
(2004)
LNCS
, vol.2988
, pp. 144-152
-
-
Piazza, C.1
Pivato, E.2
Rossi, S.3
-
45
-
-
84948737028
-
A simple view of type-secure information flow in the iπ-calculus
-
IEEE Computer Society Press
-
F. Pottier, A simple view of type-secure information flow in the iπ-calculus, in: Proc. of the 15th IEEE Computer Secuiity Foundations Workshop (CSFW15), IEEE Computer Society Press, 2002, pp. 320-330.
-
(2002)
Proc. of the 15th IEEE Computer Secuiity Foundations Workshop (CSFW15)
, pp. 320-330
-
-
Pottier, F.1
-
47
-
-
0035067847
-
Process algebra and Non-interference
-
P. Ryan and S. Schneider, Process algebra and Non-interference, Journal of Computer Security 9(1/2) (2001), 75-103.
-
(2001)
Journal of Computer Security
, vol.9
, Issue.1-2
, pp. 75-103
-
-
Ryan, P.1
Schneider, S.2
-
48
-
-
0003142759
-
A CSP formulation of Non-interference and unwinding
-
P.Y.A. Ryan, A CSP formulation of Non-interference and unwinding, Cipher (1991), 19-27.
-
(1991)
Cipher
, pp. 19-27
-
-
Ryan, P.Y.A.1
-
52
-
-
0001422438
-
Characteristic formulae for processes with divergence
-
B. Steffen and A. Ingòlfsdòttir, Characteristic formulae for processes with divergence, Information and Computation 110(1) (1994) 149-163.
-
(1994)
Information and Computation
, vol.110
, Issue.1
, pp. 149-163
-
-
Steffen, B.1
Ingòlfsdòttir, A.2
-
53
-
-
84947744871
-
Modal and temporal logics for processes
-
Logics for Concurrency: Structures versus Automata, E. Brinksma, R. Cleaveland, K.G.T. Margaria Larsen and B. Steffen, eds, Springer, Berlin
-
C. Stirling, Modal and temporal logics for processes, in: Logics for Concurrency: Structures versus Automata, E. Brinksma, R. Cleaveland, K.G.T. Margaria Larsen and B. Steffen, eds, Volume 1043 of LNCS, Springer, Berlin, 1996, pp. 149-237.
-
(1996)
LNCS
, vol.1043
, pp. 149-237
-
-
Stirling, C.1
|