-
2
-
-
84944050367
-
Probabilistic information flow in a process algebra
-
Proc. CONCUR'01, Springer-Verlag, August
-
A. Aldini. Probabilistic information flow in a process algebra. In Proc. CONCUR'01, volume 2154 of LNCS, pages 152-168. Springer-Verlag, August 2001.
-
(2001)
LNCS
, vol.2154
, pp. 152-168
-
-
Aldini, A.1
-
3
-
-
3042529082
-
-
Technical Report UBLCS-2002-02, University of Bologna, Bologna, Italy
-
A. Aldini, M. Bravetti, and R. Gorrieri. A process algebraic approach for the analysis of probabilistic non-interference. Technical Report UBLCS-2002-02, University of Bologna, Bologna, Italy, 2002.
-
(2002)
A Process Algebraic Approach for the Analysis of Probabilistic Non-interference
-
-
Aldini, A.1
Bravetti, M.2
Gorrieri, R.3
-
4
-
-
84879520825
-
Noninterference for concurrent programs
-
Proc. ICALP, Springer-Verlag, July
-
G. Boudol and I. Castellani. Noninterference for concurrent programs. In Proc. ICALP, volume 2076 of LNCS, pages 382-395. Springer-Verlag, July 2001.
-
(2001)
LNCS
, vol.2076
, pp. 382-395
-
-
Boudol, G.1
Castellani, I.2
-
5
-
-
84947796708
-
Decidability of bisimulation equivalences for parallel timer processes
-
Proc. CAV 1992, Springer-Verlag, June
-
K. Cerans. Decidability of bisimulation equivalences for parallel timer processes. In Proc. CAV 1992, volume 663 of LNCS, pages 302-315. Springer-Verlag, June 1992.
-
(1992)
LNCS
, vol.663
, pp. 302-315
-
-
Cerans, K.1
-
6
-
-
0017517624
-
Certification of programs for secure information flow
-
July
-
D. E. Denning and P. J. Denning. Certification of programs for secure information flow. Comm. of the ACM, 20(7):504-513, July 1977.
-
(1977)
Comm. of the ACM
, vol.20
, Issue.7
, pp. 504-513
-
-
Denning, D.E.1
Denning, P.J.2
-
8
-
-
84974776068
-
A classification of security properties for process algebras
-
R. Focardi and R. Gorrieri. A classification of security properties for process algebras. J. Computer Security, 3(1):5-33, 1995.
-
(1995)
J. Computer Security
, vol.3
, Issue.1
, pp. 5-33
-
-
Focardi, R.1
Gorrieri, R.2
-
10
-
-
0037246625
-
Real-time information flow analysis
-
January
-
R. Focardi, R. Gorrieri, and F. Martinelli. Real-time information flow analysis. IEEE J. Selected Areas in Communications, 21(1):20-35, January 2003.
-
(2003)
IEEE J. Selected Areas in Communications
, vol.21
, Issue.1
, pp. 20-35
-
-
Focardi, R.1
Gorrieri, R.2
Martinelli, F.3
-
11
-
-
35248815514
-
On the secure implementation of security protocols
-
Proc. European Symposium on Programming, Springer-Verlag, April
-
P. Giambiagi and M. Dam. On the secure implementation of security protocols. In Proc. European Symposium on Programming, volume 2618 of LNCS, pages 144-158. Springer-Verlag, April 2003.
-
(2003)
LNCS
, vol.2618
, pp. 144-158
-
-
Giambiagi, P.1
Dam, M.2
-
15
-
-
84885216103
-
Secure information flow for concurrent processes
-
Proc. CONCUR 2000, Springer-Verlag, August
-
J. Jürjens. Secure information flow for concurrent processes. In Proc. CONCUR 2000, volume 1877 of LNCS, pages 395-409. Springer-Verlag, August 2000.
-
(2000)
LNCS
, vol.1877
, pp. 395-409
-
-
Jürjens, J.1
-
16
-
-
84943632039
-
Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems
-
Proc. CRYPTO'96, Springer-Verlag
-
P. C. Kocher. Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems. In Proc. CRYPTO'96, volume 1109 of LNCS, pages 104-113. Springer-Verlag, 1996.
-
(1996)
LNCS
, vol.1109
, pp. 104-113
-
-
Kocher, P.C.1
-
17
-
-
84949229854
-
Language-based security
-
Proc. Mathematical Foundations of Computer Science, Springer-Verlag, September
-
D. Kozen. Language-based security. In Proc. Mathematical Foundations of Computer Science, volume 1672 of LNCS, pages 284-298. Springer-Verlag, September 1999.
-
(1999)
LNCS
, vol.1672
, pp. 284-298
-
-
Kozen, D.1
-
18
-
-
0026222347
-
Bisimulation through probabilistic testing
-
September
-
K. G. Larsen and A. Skou. Bisimulation through probabilistic testing. Information and Computation, 94(1):1-28, September 1991.
-
(1991)
Information and Computation
, vol.94
, Issue.1
, pp. 1-28
-
-
Larsen, K.G.1
Skou, A.2
-
20
-
-
0141528662
-
A unifying approach to the security of distributed and multi-threaded programs
-
To appear
-
H. Mantel and A. Sabelfeld. A unifying approach to the security of distributed and multi-threaded programs. J. Computer Security, 2003. To appear.
-
(2003)
J. Computer Security
-
-
Mantel, H.1
Sabelfeld, A.2
-
21
-
-
0023231848
-
Specifications for multi-level security and hook-up property
-
April
-
D. McCullough. Specifications for multi-level security and hook-up property. In Proc. IEEE Symp. on Security and Privacy, pages 161-166, April 1987.
-
(1987)
Proc. IEEE Symp. on Security and Privacy
, pp. 161-166
-
-
McCullough, D.1
-
23
-
-
0028058408
-
A general theory of composition for trace sets closed under selective interleaving functions
-
May
-
J. McLean. A general theory of composition for trace sets closed under selective interleaving functions. In Proc. IEEE Symp. on Security and Privacy, pages 79-93, May 1994.
-
(1994)
Proc. IEEE Symp. on Security and Privacy
, pp. 79-93
-
-
McLean, J.1
-
26
-
-
84885715358
-
The impact of synchronisation on secure information flow in concurrent programs
-
Proc. Andrei Ershov International Conference on Perspectives of System Informatics, Springer-Verlag, July
-
A. Sabelfeld. The impact of synchronisation on secure information flow in concurrent programs. In Proc. Andrei Ershov International Conference on Perspectives of System Informatics, volume 2244 of LNCS, pages 227-241. Springer-Verlag, July 2001.
-
(2001)
LNCS
, vol.2244
, pp. 227-241
-
-
Sabelfeld, A.1
-
27
-
-
84958755151
-
Static confidentiality enforcement for distributed programs
-
Proc. Symposium on Static Analysis, Springer-Verlag, September
-
A. Sabelfeld and H. Mantel. Static confidentiality enforcement for distributed programs. In Proc. Symposium on Static Analysis, volume 2477 of LNCS, pages 376-394. Springer-Verlag, September 2002.
-
(2002)
LNCS
, vol.2477
, pp. 376-394
-
-
Sabelfeld, A.1
Mantel, H.2
-
30
-
-
0035276729
-
A per model of secure information flow in sequential programs
-
March
-
A. Sabelfeld and D. Sands. A per model of secure information flow in sequential programs. Higher Order and Symbolic Computation, 14(1):59-91, March 2001.
-
(2001)
Higher Order and Symbolic Computation
, vol.14
, Issue.1
, pp. 59-91
-
-
Sabelfeld, A.1
Sands, D.2
-
31
-
-
0012889295
-
A language-based approach to security
-
Informatics - 10 Years Back, 10 Years Ahead, Springer-Verlag
-
F. B. Schneider, G. Morrisett, and R. Harper. A language-based approach to security. In Informatics - 10 Years Back, 10 Years Ahead, volume 2000 of LNCS, pages 86-101. Springer-Verlag, 2000.
-
(2000)
LNCS
, vol.2000
, pp. 86-101
-
-
Schneider, F.B.1
Morrisett, G.2
Harper, R.3
-
32
-
-
25044480968
-
-
Technical Report CSD-TR-00-02, Royal Holloway, University of London, January
-
S. Schneider. May testing, non-interference, and compositionality. Technical Report CSD-TR-00-02, Royal Holloway, University of London, January 2001.
-
(2001)
May Testing, Non-interference, and Compositionality
-
-
Schneider, S.1
-
35
-
-
0030370740
-
A sound type system for secure flow analysis
-
D. Volpano, G. Smith, and C. Irvine. A sound type system for secure flow analysis. J. Computer Security, 4(3):167-187, 1996.
-
(1996)
J. Computer Security
, vol.4
, Issue.3
, pp. 167-187
-
-
Volpano, D.1
Smith, G.2
Irvine, C.3
|