-
1
-
-
0003969635
-
DOD Trusted Computer System Evaluation Criteria
-
US Department of Defense
-
US Department of Defense. DOD Trusted Computer System Evaluation Criteria. DOD 5200.28-STD, 1985.
-
(1985)
DOD 5200.28-STD
-
-
-
2
-
-
84937705299
-
Static Analysis of Processes for No Read-Up and No-Write-Down
-
Springer-Verlag
-
C. Bodei, P. Degano, F. Nielson, and H.R. Nielson. Static Analysis of Processes for No Read-Up and No-Write-Down. In Proc. FoSSaCS'99, volume 1578 of Lecture Notes in Computer Science, pages 120-134, Springer-Verlag, 1999.
-
(1999)
Proc. FoSSaCS'99, Volume 1578 of Lecture Notes In Computer Science
, pp. 120-134
-
-
Bodei, C.1
Degano, P.2
Nielson, F.3
Nielson, H.R.4
-
3
-
-
84891342409
-
Control Flow Analysis of Mobile Ambients with Security Boundaries
-
Kluwer Academic Publisher
-
Chiara Braghin, Agostino Cortesi, and Riccardo Focardi. Control Flow Analysis of Mobile Ambients with Security Boundaries. In Bart Jacobs and Arend Rensink, editors, Proc. of Fifth IFIP International Conference on Formal Methods for Open Object-Based Distributed Systems (FMOODS'02), pages 197-212. Kluwer Academic Publisher, 2002.
-
(2002)
Bart Jacobs and Arend Rensink, Editors, Proc. of Fifth IFIP International Conference On Formal Methods For Open Object-Based Distributed Systems (FMOODS'02)
, pp. 197-212
-
-
Braghin, C.1
Cortesi, A.2
Focardi, R.3
-
6
-
-
0011837296
-
Information Flow Security in Mobile Ambients
-
Lipari Island, July, volume 54 of Electronic Notes in Theoretical Computer Science, Elsevier
-
A. Cortesi, and R. Focardi. Information Flow Security in Mobile Ambients. In Proc. of International Workshop on Cuncurrency and Coordination CONCOORD'01, Lipari Island, July 2001, volume 54 of Electronic Notes in Theoretical Computer Science, Elsevier, 2001.
-
(2001)
Proc. of International Workshop On Cuncurrency and Coordination CONCOORD'01
-
-
Cortesi, A.1
Focardi, R.2
-
7
-
-
84957807650
-
Safe Ambients: Control Flow Analysis and Security
-
P. Degano, F. Levi, C. Bodei. Safe Ambients: Control Flow Analysis and Security. In Proceedings of ASIAN'00, LNCS 1961,2000, pages 199-214.
-
(2000)
Proceedings Of ASIAN'00, LNCS
, vol.1961
, pp. 199-214
-
-
Degano, P.1
Levi, F.2
Bodei, C.3
-
8
-
-
84974776068
-
A Classification of Security Properties for Process Algebras
-
R. Focardi and R. Gorrieri. A Classification of Security Properties for Process Algebras. Journal of Computer Security, 3(1): 5-33,1995.
-
(1995)
Journal of Computer Security
, vol.3
, Issue.1
, pp. 5-33
-
-
Focardi, R.1
Gorrieri, R.2
-
9
-
-
0001439194
-
The Compositional Security Checker: A Tool for the Verification of Information Flow Security Properties
-
R. Focardi and R. Gorrieri. The Compositional Security Checker: A Tool for the Verification of Information Flow Security Properties, IEEE Transactions on Software Engineering, Vol. 23, No. 9, September 1997.
-
(1997)
IEEE Transactions On Software Engineering
, vol.9
, pp. 23
-
-
Focardi, R.1
Gorrieri, R.2
-
10
-
-
0033725594
-
Information Flow Analysis in a Discrete Time Process Algebra
-
(P.Syverson ed), IEEE CS Press
-
R. Focardi, R. Gorrieri, F. Martinelli. Information Flow Analysis in a Discrete Time Process Algebra, in Proc. of 13th IEEE Computer Security Foundations Workshop (CSFW13), (P.Syverson ed), IEEE CS Press, 170-184, 2000.
-
(2000)
Proc. of 13th IEEE Computer Security Foundations Workshop (CSFW13)
, pp. 170-184
-
-
Focardi, R.1
Gorrieri, R.2
Martinelli, F.3
-
11
-
-
84957649493
-
Abstract Interpretation of Mobile Ambients
-
Springer-Verlag
-
R. R. Hansen, J. G. Jensen, F. Nielson, and H. R. Nielson. Abstract Interpretation of Mobile Ambients. In Proc. Static Analysis Symposium SAS'99, volume 1694 of Lecture Notes in Computer Science, pages 134-148, Springer-Verlag, 1999.
-
(1999)
Proc. Static Analysis Symposium SAS'99, Volume 1694 of Lecture Notes In Computer Science
, pp. 134-148
-
-
Hansen, R.R.1
Jensen, J.G.2
Nielson, F.3
Nielson, H.R.4
-
12
-
-
84974577536
-
Information Flow vs. Resource Access in the Asynchronous Pi-Calculus
-
M. Hennessy, J. Riely. Information Flow vs. Resource Access in the Asynchronous Pi-Calculus. ICALP 2000:415-427.
-
ICALP
, vol.2000
, pp. 415-427
-
-
Hennessy, M.1
Riely, J.2
-
13
-
-
0031648455
-
Secure Information Flow in a Multi-Threaded Imperative Language
-
G. Smith, D.M. Volpano, Secure Information Flow in a Multi-Threaded Imperative Language. In Proc. of POPL 1998: 355-364.
-
(1998)
Proc. of POPL
, pp. 355-364
-
-
Smith, G.1
Volpano, D.M.2
|