-
1
-
-
18944371721
-
Coordination model and noninterference
-
Int. Workshop on Security Issues in Coordination Models, Languages, and Systems, SECCO'03. Focardi R., and Zavattaro G. (Eds), Eindhoven, The Netherlands
-
Aldini A. Coordination model and noninterference. In: Focardi R., and Zavattaro G. (Eds). Int. Workshop on Security Issues in Coordination Models, Languages, and Systems, SECCO'03. ENTCS vol. 85.3 (2003), Eindhoven, The Netherlands
-
(2003)
ENTCS
, vol.85 3
-
-
Aldini, A.1
-
3
-
-
33748750115
-
-
D.E. Bell, L.J. La Padula, Secure computer systems: Unified exposition and multics interpretation, Technical Report, ESD-TR-75-306, The MITRE Corp., Bedford, MA, 1976
-
-
-
-
5
-
-
33646743331
-
Validation of asynchronous circuit specifications using IF/CADP
-
Glesner M., et al. (Ed), Darmstadt, Germany
-
Borrione D., Boubekeur M., Mounier L., Renaudin M., and Sirianni A. Validation of asynchronous circuit specifications using IF/CADP. In: Glesner M., et al. (Ed). Proc. of Int. Conf. on Very Large Scale Integration of System-on-Chip, VLSI-SoC'03 (2003), Darmstadt, Germany 86-91
-
(2003)
Proc. of Int. Conf. on Very Large Scale Integration of System-on-Chip, VLSI-SoC'03
, pp. 86-91
-
-
Borrione, D.1
Boubekeur, M.2
Mounier, L.3
Renaudin, M.4
Sirianni, A.5
-
6
-
-
3242706680
-
Verifying persistent security properties
-
Bossi A., Focardi R., Piazza C., and Rossi S. Verifying persistent security properties. Computer Languages, Systems and Structures 30 3-4 (2004) 231-258
-
(2004)
Computer Languages, Systems and Structures
, vol.30
, Issue.3-4
, pp. 231-258
-
-
Bossi, A.1
Focardi, R.2
Piazza, C.3
Rossi, S.4
-
7
-
-
0037014243
-
Noninterference for concurrent programs and thread systems
-
Boudol G., and Castellani I. Noninterference for concurrent programs and thread systems. Theoretical Computer Science 281 1-2 (2002) 109-130
-
(2002)
Theoretical Computer Science
, vol.281
, Issue.1-2
, pp. 109-130
-
-
Boudol, G.1
Castellani, I.2
-
8
-
-
0001810827
-
A process algebraic view of Linda coordination primitives
-
Busi N., Gorrieri R., and Zavattaro G. A process algebraic view of Linda coordination primitives. Theoretical Computer Science 192 2 (1998) 167-199
-
(1998)
Theoretical Computer Science
, vol.192
, Issue.2
, pp. 167-199
-
-
Busi, N.1
Gorrieri, R.2
Zavattaro, G.3
-
9
-
-
84974715662
-
Process calculi for coordination: From Linda to JavaSpaces
-
Proc. 8th Int. Conf. on Algebraic Methodology and Software Technology, AMAST'00. Rus T. (Ed), Iowa, Iowa City
-
Busi N., Gorrieri R., and Zavattaro G. Process calculi for coordination: From Linda to JavaSpaces. In: Rus T. (Ed). Proc. 8th Int. Conf. on Algebraic Methodology and Software Technology, AMAST'00. Springer LNCS vol. 1816 (2000), Iowa, Iowa City 198-212
-
(2000)
Springer LNCS
, vol.1816
, pp. 198-212
-
-
Busi, N.1
Gorrieri, R.2
Zavattaro, G.3
-
10
-
-
84976215953
-
Coordination languages and their significance
-
Carriero N., and Gelernter D. Coordination languages and their significance. Communications of the ACM 35 2 (1992) 97-107
-
(1992)
Communications of the ACM
, vol.35
, Issue.2
, pp. 97-107
-
-
Carriero, N.1
Gelernter, D.2
-
12
-
-
84942942991
-
-
P. Ciancarini, A. Omicini, F. Zambonelli, Multiagent system engineering: The coordination viewpoint, in: N. Jennings, Y. Lesperance (Eds.), Proc. 6th Int. Workshop on Agent Theories, Architectures, and Languages, ATAL'99, Springer LNCS, vol. 1757, Orlando, Florida, 1999, pp. 250-259
-
-
-
-
14
-
-
33748751519
-
-
R. Focardi, R. Gorrieri (Eds.) Foundations of Security Analysis and Design - Tutorial Lectures I and II, in: Springer LNCS, vol. 2171, 2001 and vol. 2946, 2004
-
-
-
-
15
-
-
33748747725
-
-
R. Focardi, R. Gorrieri, Classification of Security Properties (Part I: Information Flow), in: [14], pp. 331-396
-
-
-
-
17
-
-
0020299523
-
Security policy and security models
-
IEEE CS Press, Oakland, CA
-
Goguen J.A., and Meseguer J. Security policy and security models. Proc. Symp. on Security and Privacy, SSP'82 (1982), IEEE CS Press, Oakland, CA 11-20
-
(1982)
Proc. Symp. on Security and Privacy, SSP'82
, pp. 11-20
-
-
Goguen, J.A.1
Meseguer, J.2
-
18
-
-
0002646924
-
What needs securing?
-
MITRE Corporation Press, Franconia, New Hampshire
-
Guttman J., and Nadel M. What needs securing?. Proc. 1st Computer Security Foundation Workshop, CSFW'88 (1988), MITRE Corporation Press, Franconia, New Hampshire 34-57
-
(1988)
Proc. 1st Computer Security Foundation Workshop, CSFW'88
, pp. 34-57
-
-
Guttman, J.1
Nadel, M.2
-
19
-
-
33748745054
-
-
M. Hennessy, The security π-calculus and non-interference, in: S. Brookes, P. Panangaden (Eds.), Proc. 19th Mathematical Foundations of Programming Semantics, MFPS, in: ENTCS, vol. 83, Montreal, Canada, 2003
-
-
-
-
20
-
-
0038893943
-
Information flow vs. resource access in the asynchronous pi-calculus
-
ACM Press
-
Hennessy M., and Riely J. Information flow vs. resource access in the asynchronous pi-calculus. ACM Transactions on Programming Languages and Systems 24 5 (2002) 566-591 ACM Press
-
(2002)
ACM Transactions on Programming Languages and Systems
, vol.24
, Issue.5
, pp. 566-591
-
-
Hennessy, M.1
Riely, J.2
-
21
-
-
85022894365
-
-
K. Honda, M. Tokoro, On asynchronous communication semantics, in: M. Tokoro, O. Nierstrasz, P. Wegner (Eds.), Proc. Workshop on Object-Based Concurrent Computing, in: Springer LNCS, vol. 612, Geneva, Switzerland, 1992, pp. 21-51
-
-
-
-
22
-
-
84947269249
-
-
K. Honda, V. Vasconcelos, N. Yoshida, Secure information flow as typed process behavior, in: G. Smolka, (Ed.), Proc. 9th European Symposium on Programming Languages and Systems, ESOP'00, in: Springer LNCS, vol. 1782, Berlin, Germany, 2000, pp. 180-199
-
-
-
-
23
-
-
85159683895
-
-
H. Mantel, Unwinding possibilistic security properties, in: F. Cuppens, Y. Deswarte, D. Gollmann, M. Waidner (Eds.), Proc. European Symposium on Research in Computer Security, ESORICS'00, in: Springer LNCS, vol. 1895, Toulouse, France, 2000, pp. 238-254
-
-
-
-
24
-
-
85026563474
-
-
M. Merro, D. Sangiorgi, On asynchrony in name-passing calculi, in: K. Larsen, S. Skyum, G. Winskel (Eds.), Proc. 25th Int. Colloquium on Automata, Languages, and Programming, ICALP'98, in: Springer LNCS, vol. 1443, Aalborg, Denmark, 1998, pp. 856-867
-
-
-
-
26
-
-
84969347374
-
-
U. Montanari, V. Sassone, CCS dynamic bisimulation is progressing, in: A. Tarlecki (Ed.) Mathematical Foundations of Computer Science, MFCS'91, in: Springer LNCS, vol. 520, Kazimierz Dolny, Poland, 1991, pp. 346-356
-
-
-
-
27
-
-
35248828687
-
-
S. Orzan, J. van de Pol, Verification of distributed dataspace architectures, in: M. Broy, A.V. Zamulin (Eds.), Proc. 5th Int. Conf. on Perspectives of System Informatics, PSI'03, in: Springer LNCS vol. 2890, Novosibirsk, Russia, 2003, pp. 192-206
-
-
-
-
28
-
-
24644460616
-
-
C. Piazza, E. Pivato, S. Rossi, CoPS - Checker of Persistent Security, in: K. Jensen, A. Podelski (Eds.), Tools and Algorithms for the Construction and Analysis of Systems, 10th Int. Conf., TACAS'04, in: Springer LNCS, vol. 2988, Barcelona, Spain, 2004, pp. 144-152
-
-
-
-
29
-
-
0029232082
-
CSP and determinism in security modelling
-
IEEE CS Press, Oakland, CA
-
Roscoe A.W. CSP and determinism in security modelling. Proc. IEEE Symp. on Security and Privacy, SSP'95 (1995), IEEE CS Press, Oakland, CA 114-127
-
(1995)
Proc. IEEE Symp. on Security and Privacy, SSP'95
, pp. 114-127
-
-
Roscoe, A.W.1
-
31
-
-
84955567248
-
-
D. Sangiorgi, R. Milner, The problem of weak bisimulation up to, in: R. Cleaveland (Ed.), Proc. 3rd Int. Conf. on Concurrency Theory, CONCUR'92, in: Springer LNCS, vol. 630, Stony Brook, NY, 1992, pp. 32-46
-
-
-
-
33
-
-
0031648455
-
Secure information flow in a multi-threaded imperative language
-
ACM Press, San Diego, CA
-
Smith G., and Volpano D. Secure information flow in a multi-threaded imperative language. Proc. 25th Symposium on Principles of Programming Languages, POPL'98 (1998), ACM Press, San Diego, CA 355-364
-
(1998)
Proc. 25th Symposium on Principles of Programming Languages, POPL'98
, pp. 355-364
-
-
Smith, G.1
Volpano, D.2
-
34
-
-
0025135716
-
Information flow in nondeterministic systems
-
IEEE CS Press, Oakland, CA
-
Wittbold J.T., and Johnson D.M. Information flow in nondeterministic systems. Proc. Symposium on Security and Privacy, SSP'90 (1990), IEEE CS Press, Oakland, CA 144-161
-
(1990)
Proc. Symposium on Security and Privacy, SSP'90
, pp. 144-161
-
-
Wittbold, J.T.1
Johnson, D.M.2
|