-
3
-
-
0003712416
-
The Coq proof assistant reference manual: Version 6.1
-
May
-
B. Barras and al. The Coq proof assistant reference manual: Version 6.1. Technical Report INRIA RT-0203, May 1997.
-
(1997)
Technical Report INRIA RT-0203
-
-
Barras, B.1
-
4
-
-
0027612025
-
Security Architectures Using Formal Methods
-
June
-
C. Boyd. Security Architectures Using Formal Methods. IEEE Journal on Selected Areas in Communications, 11(5): 694-701, June 1993.
-
(1993)
IEEE Journal on Selected Areas in Communications
, vol.11
, Issue.5
, pp. 694-701
-
-
Boyd, C.1
-
8
-
-
0030716978
-
Towards the Formal Verification of Electronic Commerce Protocols
-
IEEE Computer Society Press
-
D. Bolignano. Towards the Formal Verification of Electronic Commerce Protocols. In Proc. of the 10th Computer Security Foundations Workshop. IEEE Computer Society Press, 1997.
-
(1997)
Proc. of the 10th Computer Security Foundations Workshop
-
-
Bolignano, D.1
-
13
-
-
0004025792
-
-
Cambridge University Press
-
J-R Abrial. The B-Book. Cambridge University Press, 1996.
-
(1996)
The B-Book
-
-
Abrial, J.-R.1
-
15
-
-
0036812203
-
On the Use of Data Refinement in the Development of Secure Communications Systems
-
October
-
M. Butler. On the Use of Data Refinement in the Development of Secure Communications Systems. Formal Aspects of Computing, 14(1): 2-34, October 2002.
-
(2002)
Formal Aspects of Computing
, vol.14
, Issue.1
, pp. 2-34
-
-
Butler, M.1
-
16
-
-
35048859195
-
Towards a Trust Analysis Framework for Pervasive Computing Scenarios
-
Australia, July
-
M. Butler and al. Towards a Trust Analysis Framework for Pervasive Computing Scenarios. In Proc of the 6th Intl Workshop on Trust, Privacy, Deception, and Fraud in Agent Societies, Australia, July 2003.
-
(2003)
Proc of the 6th Intl Workshop on Trust, Privacy, Deception, and Fraud in Agent Societies
-
-
Butler, M.1
-
21
-
-
7044245601
-
Annotating Cooperative Plans with Trusted Agents
-
Springer
-
N. Griffiths, M. Luck and M. d’Inverno. Annotating Cooperative Plans with Trusted Agents. In Trust, Reputation, and Security: Theories and Practice, LNAI 2631. Springer, 2002.
-
(2002)
Trust, Reputation, and Security: Theories and Practice, LNAI
, vol.2631
-
-
Griffiths, N.1
Luck, M.2
d’Inverno, M.3
-
22
-
-
33749000732
-
The Attacker in Ubiquitous Computing Environments: Formalising the Threat Model
-
Italy
-
S. Creese, M. Goldsmith, B. Roscoe and I. Zakiuddin. The Attacker in Ubiquitous Computing Environments: Formalising the Threat Model. In Proc. of the 1st Intl Workshop on Formal Aspects in Security and Trust, pages 83-97, Italy, 2003.
-
(2003)
Proc. of the 1st Intl Workshop on Formal Aspects in Security and Trust
, pp. 83-97
-
-
Creese, S.1
Goldsmith, M.2
Roscoe, B.3
Zakiuddin, I.4
-
23
-
-
35048886981
-
SpyDer, a Security Model Checker
-
Pisa, Italy
-
S. Lenzini, S. Gnesi and D. Latella. SpyDer, a Security Model Checker. In Proc. of the 1st Intl Workshop on Formal Aspects in Security and Trust, pages 163-180, Pisa, Italy, 2003.
-
(2003)
Proc. of the 1st Intl Workshop on Formal Aspects in Security and Trust
, pp. 163-180
-
-
Lenzini, S.1
Gnesi, S.2
Latella, D.3
-
24
-
-
85009298792
-
Trust in Distributed Artificial Intelligence
-
Springer
-
S. Marsh. Trust in Distributed Artificial Intelligence. In Artificial Social Systems, (MAA-MAW’94), LNCS 830, pages 94-112. Springer, 1994.
-
(1994)
Artificial Social Systems, (MAA-MAW’94), LNCS
, vol.830
, pp. 94-112
-
-
Marsh, S.1
-
25
-
-
7644226470
-
Trust Management for Internet Applications
-
University of London, UK
-
T. Grandison. Trust Management for Internet Applications. PhD thesis, University of London, UK, 2003.
-
(2003)
PhD thesis
-
-
Grandison, T.1
-
26
-
-
35048893747
-
-
FORWARD Deliverable D2
-
The FORWARD project. Protocol Synthesis Feasibility Report, FORWARD Deliverable D2. http://www.nextwave.org.uk/downloads/forward_psfr.pdf.
-
Protocol Synthesis Feasibility Report
-
-
|