-
1
-
-
31844435239
-
Computational probabilistic non-interference
-
BACKES, M., AND PFITZMANN, B. Computational Probabilistic Non-interference. International Journal of Information Security (IJIS) 3, 1 (2004), 42-60.
-
(2004)
International Journal of Information Security (IJIS)
, vol.3
, Issue.1
, pp. 42-60
-
-
Backes, M.1
Pfitzmann, B.2
-
2
-
-
4944242009
-
Modelling downgrading in information flow security
-
BOSSI, A., PIAZZA, C., AND ROSSI, S. Modelling Downgrading in Information Flow Security. In Proceedings of the IEEE Computer Security Foundations Workshop (2004), pp. 187-201.
-
(2004)
Proceedings of the IEEE Computer Security Foundations Workshop
, pp. 187-201
-
-
Bossi, A.1
Piazza, C.2
Rossi, S.3
-
3
-
-
84974776068
-
A classification of security properties for process algebras
-
FOCARDI, R., AND GORRIERI, R. A Classification of Security Properties for Process Algebras. Journal of Computer Security 3, 1 (1995), 5-33.
-
(1995)
Journal of Computer Security
, vol.3
, Issue.1
, pp. 5-33
-
-
Focardi, R.1
Gorrieri, R.2
-
4
-
-
84958046259
-
A uniform approach to the definition of security properties
-
Proceedings of FM'99 Formal Methods (vol. 1)
-
FOCARDI, R., AND MARTINELLI, F. A Uniform Approach to the Definition of Security Properties. In Proceedings of FM'99 Formal Methods (vol. 1) (1999), vol. 1708 of LNCS, pp. 794-813.
-
(1999)
LNCS
, vol.1708
, pp. 794-813
-
-
Focardi, R.1
Martinelli, F.2
-
9
-
-
31844443143
-
Possibilistic information flow control in the presence of encrypted communication
-
Proceedings of the European Symposium on Research in Computer Security
-
HUTTER, D., AND SCHAIRER, A. Possibilistic Information Flow Control in the Presence of Encrypted Communication. In Proceedings of the European Symposium on Research in Computer Security (2004), vol. 3193 of LNCS, pp. 209-224.
-
(2004)
LNCS
, vol.3193
, pp. 209-224
-
-
Hutter, D.1
Schairer, A.2
-
12
-
-
84944059120
-
Unwinding possibilistic security properties
-
Proceedings of the European Symposium on Research in Computer Security
-
MANTEL, H. Unwinding Possibilistic Security Properties. In Proceedings of the European Symposium on Research in Computer Security (2000), vol. 1895 of LNCS, pp. 238-254.
-
(2000)
LNCS
, vol.1895
, pp. 238-254
-
-
Mantel, H.1
-
13
-
-
84881123660
-
Information flow control and applications - Bridging a gap
-
Proceedings of FME S001: Formal Methods for Increasing Software Productivity
-
MANTEL, H. Information Flow Control and Applications - Bridging a Gap. In Proceedings of FME S001: Formal Methods for Increasing Software Productivity (2001), vol. 2021 of LNCS, pp. 153-172.
-
(2001)
LNCS
, vol.2021
, pp. 153-172
-
-
Mantel, H.1
-
17
-
-
31844452782
-
Using information flow control to evaluate access protection of location information in mobile communication networks
-
Computer Science Department, University of Freiburg
-
MANTEL, H., SCHAIRER, A., KABATNIK, M., KREUTZER, M., AND ZUGENMAIER, A. Using Information Flow Control to Evaluate Access Protection of Location Information In Mobile Communication Networks. Tech. Rep. 159, Computer Science Department, University of Freiburg, 2001.
-
(2001)
Tech. Rep.
, vol.159
-
-
Mantel, H.1
Schairer, A.2
Kabatnik, M.3
Kreutzer, M.4
Zugenmaier, A.5
-
20
-
-
0002426876
-
A general theory of composition for a class of "possibilistlc" security properties
-
MCLEAN, J. D. A General Theory of Composition for a Class of "Possibilistlc" Security Properties. IEEE Transaction on Software Engineering 22, 1 (1996), 53-67.
-
(1996)
IEEE Transaction on Software Engineering
, vol.22
, Issue.1
, pp. 53-67
-
-
Mclean, J.D.1
-
21
-
-
0003954103
-
-
International Series in Computer Science. Prentice Hall
-
MILNER, R. Communication and Concurrency. International Series in Computer Science. Prentice Hall, 1989.
-
(1989)
Communication and Concurrency
-
-
Milner, R.1
-
23
-
-
0029703093
-
A logic of composition for information flow predicates
-
PERI, R. V., WULF, W. A., AND KIENZLE, D. M. A Logic of Composition for Information Flow Predicates. In Proceedings of the 9th IEEE Computer Security Foundations Workshop (1996), pp. 82-93.
-
(1996)
Proceedings of the 9th IEEE Computer Security Foundations Workshop
, pp. 82-93
-
-
Peri, R.V.1
Wulf, W.A.2
Kienzle, D.M.3
-
26
-
-
0001868056
-
Non-interference through determinism
-
Proceedings of the European Symposium on Research in Computer Security
-
ROSCOE, A. W., WOODCOCK, J. C. P., AND WULF, L. Non-Interference through Determinism. In Proceedings of the European Symposium on Research in Computer Security (1994), vol. 875 of LNCS, pp. 33-53.
-
(1994)
LNCS
, vol.875
, pp. 33-53
-
-
Roscoe, A.W.1
Woodcock, J.C.P.2
Wulf, L.3
-
28
-
-
0035067847
-
Process algebra and non-interference
-
RYAN, P. Y. A., AND SCHNEIDER, S. A. Process Algebra and Non-interference. Journal of Computer Security 9, 1/2 (2001), 78-103.
-
(2001)
Journal of Computer Security
, vol.9
, Issue.1-2
, pp. 78-103
-
-
Ryan, P.Y.A.1
Schneider, S.A.2
-
29
-
-
31844435915
-
Information flow control for multiagent systems
-
Master's thesis, Universität Rostock
-
SCHÄFER, I. Information Flow Control for Multiagent Systems, A Case Study in Comparison Shopping. Master's thesis, Universität Rostock, 2004.
-
(2004)
A Case Study in Comparison Shopping
-
-
Schäfer, I.1
-
30
-
-
35048854255
-
Information flow control revisited: Noninfluence = noninterference + nonleakage
-
Proceedings of the European Symposium on Research in Computer Security
-
v. OHEIMB, D. Information Flow Control Revisited: Noninfluence = Noninterference + Nonleakage. In Proceedings of the European Symposium on Research in Computer Security (2004), vol. 3193 of LNCS, pp. 225-243.
-
(2004)
LNCS
, vol.3193
, pp. 225-243
-
-
Oheimb, D.V.1
-
32
-
-
18944393517
-
-
PhD thesis, Graduate Department of Electrical and Computer Engineering, University of Toronto
-
ZAKINTHINOS, A. On the Composition of Security Properties. PhD thesis, Graduate Department of Electrical and Computer Engineering, University of Toronto, 1996.
-
(1996)
On the Composition of Security Properties
-
-
Zakinthinos, A.1
|