-
1
-
-
84878558984
-
Protection in programming-language translations
-
M. Abadi. Protection in programming-language translations. In Proc. of ICALP'98, pages 868-883, 1998.
-
(1998)
Proc. of ICALP'98
, pp. 868-883
-
-
Abadi, M.1
-
2
-
-
33646178489
-
MOCHA: Modularity in model checking
-
R. Alur, T.A. Henzinger, F. Mang, S. Qadeer, S. Rajamani, and S. Tasiran. MOCHA: Modularity in model checking. In Proc. of CAV'98, pages 521-525. 1998.
-
(1998)
Proc. of CAV'98
, pp. 521-525
-
-
Alur, R.1
Henzinger, T.A.2
Mang, F.3
Qadeer, S.4
Rajamani, S.5
Tasiran, S.6
-
3
-
-
4944265699
-
Secure information flow by self-composition
-
G. Barthe, P. D'Argenio, and T. Rezk. Secure Information Flow by Self-Composition. In Proc. of CSFW'04, pages 100-114, 2004.
-
(2004)
Proc. of CSFW'04
, pp. 100-114
-
-
Barthe, G.1
D'Argenio, P.2
Rezk, T.3
-
4
-
-
24644445710
-
A theorem proving approach to analysis of secure information flow
-
Á. Darvas, R. Hähnle, and D. Sands. A Theorem Proving Approach to Analysis of Secure Information Flow. In Proc. of SPC 2005, pages 193-208, 2005.
-
(2005)
Proc. of SPC 2005
, pp. 193-208
-
-
Darvas, Á.1
Hähnle, R.2
Sands, D.3
-
5
-
-
84948775046
-
Secrecy in multiagent systems
-
J. Halpern and K. O'Neill. Secrecy in multiagent systems. In Proc. of CSFW02, pages 32-46, 2002.
-
(2002)
Proc. of CSFW02
, pp. 32-46
-
-
Halpern, J.1
O'Neill, K.2
-
7
-
-
84881150179
-
Secrecy-preserving refinement
-
J. Jürjens. Secrecy-preserving refinement. In Proc. of FME'01, pages 135-152, 2001.
-
(2001)
Proc. of FME'01
, pp. 135-152
-
-
Jürjens, J.1
-
9
-
-
0034836335
-
Preserving information flow properties under refinement
-
H. Mantel. Preserving information flow properties under refinement. In Proc. of SP'01, pages 78-91, 2001.
-
(2001)
Proc. of SP'01
, pp. 78-91
-
-
Mantel, H.1
-
10
-
-
0028058408
-
A general theory of composition for trace sets closed under selective interleaving functions
-
J. McLean. A general theory of composition for trace sets closed under selective interleaving functions. In Proc. of SP'94, pages 79-93, 1994.
-
(1994)
Proc. of SP'94
, pp. 79-93
-
-
McLean, J.1
-
11
-
-
84947418436
-
A compositional rule for hardware design refinement
-
K.L. McMillan. A compositional rule for hardware design refinement. In Proc. of CAV'97, pages 24-35, 1997.
-
(1997)
Proc. of CAV'97
, pp. 24-35
-
-
McMillan, K.L.1
-
12
-
-
84944677742
-
PVS: A prototype verification system
-
S. Owre, J. M. Rushby, and N. Shankar. PVS: A prototype verification system. In CADE'92, pages 748-752, 1992.
-
(1992)
CADE'92
, pp. 748-752
-
-
Owre, S.1
Rushby, J.M.2
Shankar, N.3
-
14
-
-
0003714340
-
-
F.B. Schneider, editor. National Academy Press
-
F.B. Schneider, editor. Trust in Cyberspace. National Academy Press, 1999.
-
(1999)
Trust in Cyberspace
-
-
-
15
-
-
33646037706
-
Secure information flow as a safety problem
-
T. Terauchi and A. Aiken. Secure Information Flow as a Safety Problem. In Proc. of SAS 2005, pages 352-367, 2005.
-
(2005)
Proc. of SAS 2005
, pp. 352-367
-
-
Terauchi, T.1
Aiken, A.2
-
16
-
-
0030672129
-
A general theory of security properties
-
A. Zakinthinos and E. S. Lee. A general theory of security properties. In Proc. of SP'97, pages 94-102, 1997.
-
(1997)
Proc. of SP'97
, pp. 94-102
-
-
Zakinthinos, A.1
Lee, E.S.2
|