-
1
-
-
34347266676
-
-
Andersen, H., "Verification of Temporal Properties of Concurrent Systems," Ph.D. thesis, Department of Computer Science, Aarhus University, Denmark (1993)
-
-
-
-
2
-
-
0029193016
-
-
Andersen, H.R., Partial model checking, in: LICS '95: Proceedings of the 10th Annual IEEE Symposium on Logic in Computer Science (1995), p. 398
-
-
-
-
4
-
-
28144460333
-
-
Bartoletti, M., P. Degano and G.L. Ferrari, Enforcing secure service composition., in: CSFW (2005), pp. 211-223
-
-
-
-
5
-
-
35248897592
-
-
Basu, S. and C.R. Ramakrishnan, Compositional analysis for verification of parameterized systems, in: Ninth International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS), Lecture Notes in Computer Science 2619 (2003), pp. 315-330
-
-
-
-
6
-
-
34347233593
-
-
Bauer, L., J. Ligatti and D. Walker, More enforceable security policies, in: I. Cervesato, editor, Foundations of Computer Security: proceedings of the FLoC'02 workshop on Foundations of Computer Security (2002), pp. 95-104
-
-
-
-
7
-
-
34347229889
-
-
Bradfield, J.C., On the expressivity of the modal mu-calculus., in: STACS, 1996, pp. 479-490
-
-
-
-
8
-
-
0347875939
-
On the relationships among four timed process algebras
-
Corradini F., D'Ortenzio D., and Inverardi P. On the relationships among four timed process algebras. Fundam. Inform. 38 (1999) 377-395
-
(1999)
Fundam. Inform.
, vol.38
, pp. 377-395
-
-
Corradini, F.1
D'Ortenzio, D.2
Inverardi, P.3
-
9
-
-
85050550846
-
-
Cousot, P. and R. Cousot, Abstract interpretation: a unified lattice model for static analysis of programs by construction or approximation of fixpoints, in: Conference Record of the Fourth Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (1977), pp. 238-252
-
-
-
-
10
-
-
0030655947
-
-
Dierks, H., Synthesising controllers from real-time specifications, in: ISSS '97: Proceedings of the 10th international symposium on System synthesis (1997), pp. 126-133
-
-
-
-
11
-
-
33646152517
-
Safety interfaces for component-based systems
-
SAFECOMP. Winther R., Gran B.A., and Dahll G. (Eds)
-
Elmqvist J., Nadjm-Tehrani S., and Minea M. Safety interfaces for component-based systems. In: Winther R., Gran B.A., and Dahll G. (Eds). SAFECOMP. Lecture Notes in Computer Science (2005) 246-260
-
(2005)
Lecture Notes in Computer Science
, pp. 246-260
-
-
Elmqvist, J.1
Nadjm-Tehrani, S.2
Minea, M.3
-
13
-
-
34250655219
-
Automated analysis of timed security: a case study on web privacy
-
Gorrieri R., Lanotte R., Maggiolo-Schettini A., Martinelli F., Tini S., and Tronci E. Automated analysis of timed security: a case study on web privacy. Int. J. Inf. Sec. 2 (2004) 168-186
-
(2004)
Int. J. Inf. Sec.
, vol.2
, pp. 168-186
-
-
Gorrieri, R.1
Lanotte, R.2
Maggiolo-Schettini, A.3
Martinelli, F.4
Tini, S.5
Tronci, E.6
-
14
-
-
1442311382
-
A simple framework for real-time cryptographic protocol analysis with compositional proof rules
-
Gorrieri R., and Martinelli F. A simple framework for real-time cryptographic protocol analysis with compositional proof rules. Sci. Comput. Program. 50 (2004) 23-49
-
(2004)
Sci. Comput. Program.
, vol.50
, pp. 23-49
-
-
Gorrieri, R.1
Martinelli, F.2
-
15
-
-
34347210442
-
-
Hennessy, M. and T. Regan, A temporal process algebra, in: FORTE '90: Proceedings of the IFIP TC6/WG6.1 Third International Conference on Formal Description Techniques for Distributed Systems and Communication Protocols (1991), pp. 33-48
-
-
-
-
17
-
-
2042514961
-
Semantic models for information flow
-
Lowe G. Semantic models for information flow. Theor. Comput. Sci. 315 (2004) 209-256
-
(2004)
Theor. Comput. Sci.
, vol.315
, pp. 209-256
-
-
Lowe, G.1
-
18
-
-
0031645024
-
-
Martinelli, F., Partial model checking and theorem proving for ensuring security properties, in: CSFW '98: Proceedings of the 11th IEEE Computer Security Foundations Workshop (1998)
-
-
-
-
19
-
-
34347246823
-
-
Martinelli, F., Towards automatic synthesis of systems without informations leaks, in: Proceedings of Workshop in Issues in Theory of Security (WITS), 2000
-
-
-
-
20
-
-
0037209815
-
Analysis of security protocols as open systems
-
Martinelli F. Analysis of security protocols as open systems. Theoretical Computer Science 290 (2003) 1057-1106
-
(2003)
Theoretical Computer Science
, vol.290
, pp. 1057-1106
-
-
Martinelli, F.1
-
21
-
-
34347268580
-
-
Martinelli, F. and I. Matteucci, Modeling security automata with process algebras and related results (2006), presented at the 6th International Workshop on Issues in the Theory of Security (WITS '06) - Informal proceedings
-
-
-
-
22
-
-
34347269736
-
-
Martinelli, F. and I. Matteucci, Through modeling to synthesis of security automata (2006), accepted to STM06. To appeare in ENTCS
-
-
-
-
23
-
-
34347229197
-
-
Milner, R., Synthesis of communicating behaviour, in: Proceedings of 7th MFCS (1978)
-
-
-
-
26
-
-
34347226458
-
-
Pnueli, A., E. Asarin, O. Maler and J. Sifakis, Controller synthesis for timed automata, in: Proc. System Structure and Control (1998). URL citeseer.ist.psu.edu/asarin98controller.html
-
-
-
-
27
-
-
34347272417
-
-
R. Focardi, R. Gorrieri and F. Martinelli, Real-time Information Flow Analysis, IEEE JSAC (2003)
-
-
-
-
28
-
-
0032646572
-
-
Ryan, P.Y.A. and S.A. Schneider, Process algebra and non-interference, in: CSFW '99: Proceedings of the 1999 IEEE Computer Security Foundations Workshop (1999), p. 214
-
-
-
-
30
-
-
0024681890
-
An automata theoretic procedure for the propositional μ-calculus
-
Street R.S., and Emerson E.A. An automata theoretic procedure for the propositional μ-calculus. Information and Computation 81 (1989) 249-264
-
(1989)
Information and Computation
, vol.81
, pp. 249-264
-
-
Street, R.S.1
Emerson, E.A.2
-
31
-
-
34347261856
-
-
Streett, R.S. and E.A. Emerson, The propositional mu-calculus is elementary, in: Proceedings of the 11th Colloquium on Automata, Languages and Programming (1984), pp. 465-472
-
-
-
-
32
-
-
34347215246
-
-
Ulidowski, I. and S. Yuen, Extending process languages with time, in: AMAST '97: Proceedings of the 6th International Conference on Algebraic Methodology and Software Technology (1997)
-
-
-
|