-
1
-
-
16244374910
-
TwoTowers 4.0: Towards the Integration of Security Analysis and Performance Evaluation
-
[AB04] IEEE CS Press, to appear
-
[AB04] A. Aldini and M. Bernardo. TwoTowers 4.0: Towards the Integration of Security Analysis and Performance Evaluation. 1st Int. Conf. on Quantitative Evaluation of Systems (QEST'04), IEEE CS Press, to appear, 2004.
-
(2004)
1st Int. Conf. on Quantitative Evaluation of Systems (QEST'04)
-
-
Aldini, A.1
Bernardo, M.2
-
2
-
-
3042529082
-
A Process-algebraic Approach for the Analysis of Probabilistic Noninterference
-
[ABG03]
-
[ABG03] A. Aldini, M. Bravetti, and R. Gorrieri. A Process-algebraic Approach for the Analysis of Probabilistic Noninterference. Journal of Computer Security 12(2), 2004.
-
(2004)
Journal of Computer Security
, vol.12
, Issue.2
-
-
Aldini, A.1
Bravetti, M.2
Gorrieri, R.3
-
4
-
-
0037209806
-
Performance Measure Sensitive Congruences for Markovian Process Algebras
-
[BB03]
-
[BB03] M. Bernardo and M. Bravetti, Performance Measure Sensitive Congruences for Markovian Process Algebras. Theoretical Computer Science 290:117-160, 2003.
-
(2003)
Theoretical Computer Science
, vol.290
, pp. 117-160
-
-
Bernardo, M.1
Bravetti, M.2
-
5
-
-
1542325378
-
Architecting Families of Software Systems with Process Algebras
-
[BCD02]
-
[BCD02] M. Bernardo, P. Ciancarini, and L. Donatiello. Architecting Families of Software Systems with Process Algebras. ACM Trans, on Software Engineering and Methodology 11:386-426, 2002.
-
(2002)
ACM Trans, on Software Engineering and Methodology
, vol.11
, pp. 386-426
-
-
Bernardo, M.1
Ciancarini, P.2
Donatiello, L.3
-
6
-
-
84957065546
-
Stochastic Process Algebra: Prom an Algebraic Formalism to an Architectural Description Language
-
[BDC02]
-
[BDC02] M. Bernardo, L. Donatiello, and P. Ciancarini. Stochastic Process Algebra: Prom an Algebraic Formalism to an Architectural Description Language. Performance Evaluation of Complex Systems: Techniques and Tools, LNCS 2459:236-260, 2002.
-
(2002)
Performance Evaluation of Complex Systems: Techniques and Tools, LNCS
, vol.2459
, pp. 236-260
-
-
Bernardo, M.1
Donatiello, L.2
Ciancarini, P.3
-
10
-
-
3142583810
-
Design and Assurance Strategy for the NRL Pump
-
[KMM98] Naval Research Laboratory, Washington, D.C.
-
[KMM98] M.H. Kang, A.P. Moore, and I.S. Moskowitz. Design and Assurance Strategy for the NRL Pump. NRL Memo 5540-97-7991, Naval Research Laboratory, Washington, D.C., 1997,
-
(1997)
NRL Memo 5540-97-7991
-
-
Kang, M.H.1
Moore, A.P.2
Moskowitz, I.S.3
-
11
-
-
35048897621
-
-
appeared in IEEE Computer Magazine 31:56-64, 1998.
-
(1998)
IEEE Computer Magazine
, vol.31
, pp. 56-64
-
-
-
12
-
-
18944373905
-
Automatic Analysis of the NRL Pump
-
+04] To appear in ENTCS
-
+04] R. Lanotte, A. Maggiolo-Schettini, S. Tini, A. Troina, and E. Tronci. Automatic Analysis of the NRL Pump. To appear in ENTCS, Selected Papers from MEFISTO project "Formal Methods for Security", 2004.
-
(2004)
Selected Papers from MEFISTO Project Formal Methods for Security
-
-
Lanotte, R.1
Maggiolo-Schettini, A.2
Tini, S.3
Troina, A.4
Tronci, E.5
-
13
-
-
0003866146
-
-
[Lav83] S.S. Lavenberg editor. Academic Press
-
[Lav83] S.S. Lavenberg editor. Computer Performance Modeling Handbook. Academic Press, 1983.
-
(1983)
Computer Performance Modeling Handbook.
-
-
-
14
-
-
35248838292
-
What Makes a Cryptographic Protocol Secure? the Evolution of Requirements Specification in Formal Cryptographic Protocol Analysis
-
[Mea03] Springer LNCS 2618
-
[Mea03] C. Meadows. What Makes a Cryptographic Protocol Secure? The Evolution of Requirements Specification in Formal Cryptographic Protocol Analysis. 12th Europ. Symp. on Programming Languages and Systems (ESOP'03), Springer LNCS 2618:10-21, 2003.
-
(2003)
12th Europ. Symp. on Programming Languages and Systems (ESOP'03)
, pp. 10-21
-
-
Meadows, C.1
-
16
-
-
0028566761
-
Covert Channels - Here to Stay?
-
[MK94] National Institute of Standards and Technology
-
[MK94] I.S. Moskowitz and M.H. Kang. Covert Channels - Here to Stay? 9th Conf. on Computer Assurance (Compass'94), National Institute of Standards and Technology, pp. 235-244, 1994.
-
(1994)
9th Conf. on Computer Assurance (Compass'94)
, pp. 235-244
-
-
Moskowitz, I.S.1
Kang, M.H.2
-
17
-
-
0034829266
-
Non-interference: Who Needs It?
-
+01] IEEE CS Press
-
+01] P.Y.A. Ryan, J. McLean, J. Millen, and V. Gligor. Non-interference: Who Needs It? 14th Computer Security Foundations Workshop (CSFW'01), pp. 237-238, IEEE CS Press, 2001.
-
(2001)
14th Computer Security Foundations Workshop (CSFW'01)
, pp. 237-238
-
-
Ryan, P.Y.A.1
McLean, J.2
Millen, J.3
Gligor, V.4
|