-
4
-
-
84958060420
-
Météor: A successful application of B in a large project
-
J. Wing, J. Woodcock, and J. Davies, editors, FM'99 - Formal Methods. Springer-Verlag
-
P. Behm, P. Benoit, A. Faivre, and J.-M. Meynadier. Météor: A successful application of B in a large project. In J. Wing, J. Woodcock, and J. Davies, editors, FM'99 - Formal Methods, volume I of LNCS 1708, pages 369-387. Springer-Verlag, 1999.
-
(1999)
LNCS 1708
, vol.1
, pp. 369-387
-
-
Behm, P.1
Benoit, P.2
Faivre, A.3
Meynadier, J.-M.4
-
6
-
-
34250190790
-
On probabilistic computation tree logic
-
C. Baier, B. R. Haverkort, H. Hermanns, J.-P. Katoen, and M. Siegle, editors, LNCS 2925. Springer-Verlag
-
F. Ciesinski and M. Größer. On probabilistic computation tree logic. In C. Baier, B. R. Haverkort, H. Hermanns, J.-P. Katoen, and M. Siegle, editors, Validation of Stochastic Systems: A Guide to Current Research, LNCS 2925, pages 147-188. Springer-Verlag, 2004.
-
(2004)
Validation of Stochastic Systems: A Guide to Current Research
, pp. 147-188
-
-
Ciesinski, F.1
Größer, M.2
-
9
-
-
84974759639
-
Toward a mathematical foundation for information flow security
-
J. W. Gray, III. Toward a mathematical foundation for information flow security. Journal of Computer Security, pages 255-294, 1992.
-
(1992)
Journal of Computer Security
, pp. 255-294
-
-
Gray III, J.W.1
-
11
-
-
0015482118
-
Proof of correctness of data representations
-
C. A. R. Hoare. Proof of correctness of data representations. Acta Informatica, 1:271-281, 1972.
-
(1972)
Acta Informatica
, vol.1
, pp. 271-281
-
-
Hoare, C.A.R.1
-
12
-
-
0024663847
-
On the derivation of secure components
-
IEEE Press
-
J.Jacob. On the derivation of secure components. In IEEE Symposium on Security and Privacy, pages 242-247. IEEE Press, 1989.
-
(1989)
IEEE Symposium on Security and Privacy
, pp. 242-247
-
-
Jacob, J.1
-
14
-
-
84881150179
-
Secrecy-preserving refinement
-
J. N. Oliveira and P. Zave, editors, LNCS 2021. Springer-Verlag
-
J. Jürjens. Secrecy-preserving refinement. In J. N. Oliveira and P. Zave, editors, FME 2001: Formal Methods for Increasing Software Productivity, LNCS 2021, pages 135-152. Springer-Verlag, 2001.
-
(2001)
FME 2001: Formal Methods for Increasing Software Productivity
, pp. 135-152
-
-
Jürjens, J.1
-
18
-
-
0034836335
-
Preserving information flow properties under refinement
-
IEEE Computer Society Press
-
H. Mantel. Preserving information flow properties under refinement. In IEEE Symposium on Security and Privacy, pages 78-91. IEEE Computer Society Press, 2001.
-
(2001)
IEEE Symposium on Security and Privacy
, pp. 78-91
-
-
Mantel, H.1
-
20
-
-
0002426876
-
A general theory of composition for a class of "possibilistic" properties
-
J. McLean. A general theory of composition for a class of "possibilistic" properties. IEEE Transactions on Software Engineering, 22(1):53-67, 1996.
-
(1996)
IEEE Transactions on Software Engineering
, vol.22
, Issue.1
, pp. 53-67
-
-
McLean, J.1
-
21
-
-
84945713135
-
Applying "design by contract"
-
October
-
B. Meyer. Applying "design by contract". IEEE Computer, pages 40-51, October 1992.
-
(1992)
IEEE Computer
, pp. 40-51
-
-
Meyer, B.1
-
22
-
-
0000921963
-
Refinement-oriented probability for CSP
-
C. Morgan, A. McIver, K. Seidel, and J. W. Sanders. Refinement-oriented probability for CSP. Formal Aspects of Computing, 8(6):617-641, 1996.
-
(1996)
Formal Aspects of Computing
, vol.8
, Issue.6
, pp. 617-641
-
-
Morgan, C.1
McIver, A.2
Seidel, K.3
Sanders, J.W.4
-
23
-
-
0034823388
-
A model for asynchronous reactive systems and its application to secure message transmission
-
IEEE Computer Society
-
B. Pfitzmann and M. Waidner. A model for asynchronous reactive systems and its application to secure message transmission. In IEEE Symposium on Security and Privacy, pages 184-201. IEEE Computer Society, 2001.
-
(2001)
IEEE Symposium on Security and Privacy
, pp. 184-201
-
-
Pfitzmann, B.1
Waidner, M.2
-
24
-
-
0029232082
-
CSP and determinism in security modelling
-
IEEE Computer Society Press
-
A. W. Roscoe. CSP and determinism in security modelling. In Proc. IEEE Symposium on Security and Privacy, pages 114-127. IEEE Computer Society Press, 1995.
-
(1995)
Proc. IEEE Symposium on Security and Privacy
, pp. 114-127
-
-
Roscoe, A.W.1
-
26
-
-
0001868056
-
Non-interference through determinism
-
D. Gollmann, editor, LNCS 875. Springer-Verlag
-
A. W. Roscoe, J. C. P. Woodcock, and L. Wulf. Non-interference through determinism. In D. Gollmann, editor, European Symposium on Research in Computer Security (ESORICS), LNCS 875, pages 33-53. Springer-Verlag, 1994.
-
(1994)
European Symposium on Research in Computer Security (ESORICS)
, pp. 33-53
-
-
Roscoe, A.W.1
Woodcock, J.C.P.2
Wulf, L.3
-
28
-
-
84874143629
-
Probabilistic confidentiality properties based on indistinguishability
-
H. Federrath, editor, Lecture Notes in Informatics. Gesellschaft für Informatik
-
T. Santen. Probabilistic confidentiality properties based on indistinguishability. In H. Federrath, editor, Proc. Sicherheit 2005 - Schutz und Zuverlässigkeit, Lecture Notes in Informatics, pages 113-124. Gesellschaft für Informatik, 2005.
-
(2005)
Proc. Sicherheit 2005 - Schutz und Zuverlässigkeit
, pp. 113-124
-
-
Santen, T.1
-
29
-
-
84957012794
-
Confidentiality-preserving refinement is compositional - Sometimes
-
D. Gollmann, G. Karjoth, and M. Waidner, editors, LNCS 2502. Springer-Verlag
-
T. Santen, M. Heisel, and A. Pfitzmann. Confidentiality-preserving refinement is compositional - sometimes. In D. Gollmann, G. Karjoth, and M. Waidner, editors, Computer Security - ESORICS 2002, LNCS 2502, pages 194-211. Springer-Verlag, 2002.
-
(2002)
Computer Security - ESORICS 2002
, pp. 194-211
-
-
Santen, T.1
Heisel, M.2
Pfitzmann, A.3
-
30
-
-
0001609136
-
Probabilistic simulations for probabilistic processes
-
R. Segala and N. Lynch. Probabilistic simulations for probabilistic processes. Nordic Journal of Computing, 2(2):250-273, 1995.
-
(1995)
Nordic Journal of Computing
, vol.2
, Issue.2
, pp. 250-273
-
-
Segala, R.1
Lynch, N.2
|