-
1
-
-
35248852380
-
Bisimulation and unwinding for verifying possibilistic security properties
-
L.D. Zuck, P.C. Attie, A. Cortesi, & S. Mukhopadhyay, vol. 2575 of Lecture Notes in Computer Science. Berlin: Springer
-
Bossi A., Focardi R., Piazza C., Rossi S. Bisimulation and unwinding for verifying possibilistic security properties. Zuck L.D., Attie P.C., Cortesi A., Mukhopadhyay S. Proceedings of the International Conference on Verification, Model Checking, and Abstract Interpretation (VMCAI'03), vol. 2575 of Lecture Notes in Computer Science. 2003;223-237 Springer, Berlin.
-
(2003)
Proceedings of the International Conference on Verification, Model Checking, and Abstract Interpretation (VMCAI'03)
, pp. 223-237
-
-
Bossi, A.1
Focardi, R.2
Piazza, C.3
Rossi, S.4
-
4
-
-
0024925378
-
Finite-state noiseless covert channels
-
the MITRE Corporation. Silver Spring, MD: IEEE Computer Society Press
-
Millen JK. Finite-state noiseless covert channels., In: Proceedings of the Computer Security Foundations Workshop II, the MITRE Corporation. Silver Spring, MD: IEEE Computer Society Press, 1989. p. 81-6.
-
(1989)
Proceedings of the Computer Security Foundations Workshop II
, pp. 81-86
-
-
Millen, J.K.1
-
8
-
-
84974776068
-
A classification of security properties for process algebras
-
Focardi R., Gorrieri R. A classification of security properties for process algebras. Journal of Computer Security. 3(1):19941995;5-33.
-
(1994)
Journal of Computer Security
, vol.3
, Issue.1
, pp. 5-33
-
-
Focardi, R.1
Gorrieri, R.2
-
10
-
-
0033701251
-
Possibilistic definitions of security - An assembly kit
-
Silver Spring, MD: IEEE Computer Society Press
-
Mantel H. Possibilistic definitions of security - an assembly kit - In: Proceedings of the IEEE Symposium on Security and Privacy (SSP'00). Silver Spring, MD: IEEE Computer Society Press; 2000. p. 185-99.
-
(2000)
Proceedings of the IEEE Symposium on Security and Privacy (SSP'00)
, pp. 185-199
-
-
Mantel, H.1
-
11
-
-
0023231848
-
Specifications for multi-level security and a hook-up property
-
Silver Spring, MD: IEEE Computer Society Press
-
McCullough D. Specifications for multi-level security and a hook-up property. In: Proceedings of the IEEE Symposium on Security and Privacy (SSP'87). Silver Spring, MD: IEEE Computer Society Press; 1987. p. 161-6.
-
(1987)
Proceedings of the IEEE Symposium on Security and Privacy (SSP'87)
, pp. 161-166
-
-
McCullough, D.1
-
13
-
-
0028058408
-
A general theory of composition for trace sets closed under selective interleaving functions
-
Silver Spring, MD: IEEE Computer Society Press
-
McLean J. A general theory of composition for trace sets closed under selective interleaving functions. In: Proceedings of the IEEE Symposium on Security and Privacy (SSP'94). Silver Spring, MD: IEEE Computer Society Press; 1994. p. 79-93.
-
(1994)
Proceedings of the IEEE Symposium on Security and Privacy (SSP'94)
, pp. 79-93
-
-
McLean, J.1
-
19
-
-
84988393004
-
Classification of security properties (part I: Information flow)
-
R. Focardi, & R. Gorrieri. Foundations of Security Analysis and Design, Berlin: Springer
-
Focardi R., Gorrieri R. Classification of security properties (part I: information flow). Focardi R., Gorrieri R. Foundations of Security Analysis and Design, vol. 2171 of Lecture Notes in Computer Science. 2001;331-396 Springer, Berlin.
-
(2001)
Lecture Notes in Computer Science
, vol.2171
, pp. 331-396
-
-
Focardi, R.1
Gorrieri, R.2
-
20
-
-
0001439194
-
The compositional security checker: A tool for the verification of information flow security properties
-
Focardi R., Gorrieri R. The compositional security checker. a tool for the verification of information flow security properties IEEE Transactions on Software Engineering. 23(9):1997;550-571.
-
(1997)
IEEE Transactions on Software Engineering
, vol.23
, Issue.9
, pp. 550-571
-
-
Focardi, R.1
Gorrieri, R.2
-
22
-
-
0031645024
-
Partial model checking and theorem proving for ensuring security properties
-
Silver Spring, MD: IEEE Computer Society Press
-
Martinelli F. Partial model checking and theorem proving for ensuring security properties. In: Proceedings of the IEEE Computer Security Foundations Workshop (CSFW'98). Silver Spring, MD: IEEE Computer Society Press; 1998. p. 44-52.
-
(1998)
Proceedings of the IEEE Computer Security Foundations Workshop (CSFW'98)
, pp. 44-52
-
-
Martinelli, F.1
-
24
-
-
35248883450
-
A proof system for information flow security
-
M. Leuschel, vol. 2264 of Lecture Notes in Computer Science. Berlin: Springer
-
Bossi A., Focardi R., Piazza C., Rossi S. A proof system for information flow security. Leuschel M. Proceedings of International Workshop on Logic Based Program Development and Transformation (LOPSTR'02), vol. 2264 of Lecture Notes in Computer Science. 2002;199-218 Springer, Berlin.
-
(2002)
Proceedings of International Workshop on Logic Based Program Development and Transformation (LOPSTR'02)
, pp. 199-218
-
-
Bossi, A.1
Focardi, R.2
Piazza, C.3
Rossi, S.4
-
25
-
-
84944059120
-
Unwinding possibilistic security properties
-
vol. 2895 of Lecture Notes in Computer Science. Berlin: Springer
-
Mantel H. Unwinding possibilistic security properties. In: Proceedings of the European Symposium on Research in Computer Security, vol. 2895 of Lecture Notes in Computer Science. Berlin: Springer; 2000. p. 238-54.
-
(2000)
Proceedings of the European Symposium on Research in Computer Security
, pp. 238-254
-
-
Mantel, H.1
-
28
-
-
0001422438
-
Characteristic formulae for Processes with divergence
-
Steffen B., Ingòlfsdòttir A. Characteristic formulae for Processes with divergence. Information and Computation. 110(1):1994;149-163.
-
(1994)
Information and Computation
, vol.110
, Issue.1
, pp. 149-163
-
-
Steffen, B.1
Ingòlfsdòttir, A.2
-
29
-
-
49049126479
-
Results on the propositional μ -calculus
-
Kozen D. Results on the propositional. μ -calculus Theoretical Computer Science. 27:1983;333-354.
-
(1983)
Theoretical Computer Science
, vol.27
, pp. 333-354
-
-
Kozen, D.1
-
31
-
-
0023566630
-
Three partition refinement algorithms
-
Paige R., Tarjan R.E. Three partition refinement algorithms. SIAM Journal on computing. 16(6):1987;973-989.
-
(1987)
SIAM Journal on Computing
, vol.16
, Issue.6
, pp. 973-989
-
-
Paige, R.1
Tarjan, R.E.2
-
34
-
-
84958780189
-
A fast bisimulation algorithm
-
G. Berry, H. Comon, & A. Finkel, vol. 2102 of Lecture Notes in Computer Science. Berlin: Springer
-
Dovier A., Piazza C., Policriti A. A fast bisimulation algorithm. Berry G., Comon H., Finkel A. Proceedings of International Conference on Computer Aided Verification (CAV'01), vol. 2102 of Lecture Notes in Computer Science. 2001;79-90 Springer, Berlin.
-
(2001)
Proceedings of International Conference on Computer Aided Verification (CAV'01)
, pp. 79-90
-
-
Dovier, A.1
Piazza, C.2
Policriti, A.3
-
35
-
-
84863943881
-
XEVE, an ESTEREL verification environment
-
A.J. Hu, & M.Y. Vardi, vol. 1427 of Lecture Notes in Computer Science. Berlin: Springer
-
Bouali A. XEVE, an ESTEREL verification environment. Hu A.J., Vardi M.Y. Proceedings of International Conference on Computer Aided Verification (CAV'98), vol. 1427 of Lecture Notes in Computer Science. 1998;500-504 Springer, Berlin.
-
(1998)
Proceedings of International Conference on Computer Aided Verification (CAV'98)
, pp. 500-504
-
-
Bouali, A.1
-
36
-
-
0003988659
-
The theory and practice of concurrency
-
Englewood Cliffs, NJ: Prentice Hall
-
Roscoe A.W. The theory and practice of concurrency, Series in Computer Science. 1998;Prentice Hall, Englewood Cliffs, NJ.
-
(1998)
Series in Computer Science
-
-
Roscoe, A.W.1
-
39
-
-
0002426876
-
A general theory of composition for a class of "possibilistic" security properties
-
McLean J. A general theory of composition for a class of "possibilistic" security properties. IEEE Transactions on Software Engineering. 22(1):1996;53-67.
-
(1996)
IEEE Transactions on Software Engineering
, vol.22
, Issue.1
, pp. 53-67
-
-
McLean, J.1
-
41
-
-
84855661226
-
Refinement operators and information flow security
-
Silver Spring, MD: IEEE Computer Society Press
-
Bossi A, Focardi R, Piazza C, Rossi S. Refinement operators and information flow security. In: Proceedings of the First IEEE International Conference on Software Engineering and Formal Methods (SEFM'03). Silver Spring, MD: IEEE Computer Society Press; 2003. p. 44-53.
-
(2003)
Proceedings of the First IEEE International Conference on Software Engineering and Formal Methods (SEFM'03)
, pp. 44-53
-
-
Bossi, A.1
Focardi, R.2
Piazza, C.3
Rossi, S.4
-
42
-
-
84969334683
-
An improved algorithm for the evaluation of fixpoint expressions
-
E.L. Dill, vol. 818 of Lecture Notes in Computer Science. Berlin: Springer
-
Long D., Browne A., Clarke E., Jha S., Marrero W. An improved algorithm for the evaluation of fixpoint expressions. Dill E.L. Proceedings of International Conference on Computer Aided Verification (CAV'94), vol. 818 of Lecture Notes in Computer Science. 1994;338-350 Springer, Berlin.
-
(1994)
Proceedings of International Conference on Computer Aided Verification (CAV'94)
, pp. 338-350
-
-
Long, D.1
Browne, A.2
Clarke, E.3
Jha, S.4
Marrero, W.5
-
44
-
-
0004235635
-
-
PhD thesis, Universiteit van Amsterdam, Instituut voor Logica en Grondslagenonderzoek van Exacte Wetenschappen
-
Benthem Jv. Modal correspondence theory. PhD thesis, Universiteit van Amsterdam, Instituut voor Logica en Grondslagenonderzoek van Exacte Wetenschappen, 1976.
-
(1976)
Modal Correspondence Theory
-
-
Benthem, Jv.1
-
45
-
-
0003253658
-
Non-well-founded sets
-
Stanford University Press. Stanford, USA: CSLI
-
Aczel P. Non-well-founded sets, vol. 14 of CSLI Lecture Notes, Stanford University Press. Stanford, USA: CSLI; 1988.
-
(1988)
CSLI Lecture Notes
, vol.14
-
-
Aczel, P.1
-
52
-
-
0034836335
-
Preserving information flow properties under refinement
-
Silver Spring, MD: IEEE Computer Society Press
-
Mantel H. Preserving information flow properties under refinement. In: Proceedings of the IEEE Symposium on Security and Privacy (SSP'01). Silver Spring, MD: IEEE Computer Society Press; 2001. p. 78-91.
-
(2001)
Proceedings of the IEEE Symposium on Security and Privacy (SSP'01)
, pp. 78-91
-
-
Mantel, H.1
-
54
-
-
3242725432
-
Secure contexts for confidential data
-
Silver Spring, MD: IEEE Computer Society Press
-
Bossi A, Macedonio D, Piazza C, Rossi S. Secure contexts for confidential data. In: Proceedings of the 16th IEEE Computer Security Foundations Workshop (CSFW'03). Silver Spring, MD: IEEE Computer Society Press; 2003. p. 14-25.
-
(2003)
Proceedings of the 16th IEEE Computer Security Foundations Workshop (CSFW'03)
, pp. 14-25
-
-
Bossi, A.1
Macedonio, D.2
Piazza, C.3
Rossi, S.4
|