-
2
-
-
84948414101
-
Soft Constraints for Security Protocol Analysis: Confidentiality
-
I. V. Ramakrishnan, editor, Proc. of the 3rd International Symposium on Practical Aspects of Declarative Languages (PADL'01), Springer-Verlag
-
G. Bella and S. Bistarelli. Soft Constraints for Security Protocol Analysis: Confidentiality. In I. V. Ramakrishnan, editor, Proc. of the 3rd International Symposium on Practical Aspects of Declarative Languages (PADL'01), volume 1990 of LNCS, pages 108-122. Springer-Verlag, 2001.
-
(2001)
LNCS
, vol.1990
, pp. 108-122
-
-
Bella, G.1
Bistarelli, S.2
-
3
-
-
0036038693
-
Soft Constraint Propagation and Solving in CHR
-
ACM, mar
-
S. Bistarelli, T. Fruewirth, M. Marte, and F. Rossi. Soft Constraint Propagation and Solving in CHR. In Proc. ACM Symposium on Applied Computing (SAC), Madrid, Spain. ACM, mar 2002.
-
(2002)
Proc. ACM Symposium on Applied Computing (SAC), Madrid, Spain
-
-
Bistarelli, S.1
Fruewirth, T.2
Marte, M.3
Rossi, F.4
-
4
-
-
0031095278
-
Semiring-based Constraint Solving and Optimization
-
Mar
-
S. Bistarelli, U. Montanari, and F. Rossi. Semiring-based Constraint Solving and Optimization. Journal of the ACM, 44(2):201-236, Mar 1997.
-
(1997)
Journal of the ACM
, vol.44
, Issue.2
, pp. 201-236
-
-
Bistarelli, S.1
Montanari, U.2
Rossi, F.3
-
6
-
-
0032671775
-
A Meta-Notation for Protocol Analysis
-
Iliano Cervesato, N. A. Durgin, Patrick Lincoln, John C. Mitchell, and Andre Scedrov. A Meta-Notation for Protocol Analysis. In Proc. CSFW, pages 55-69, 1999.
-
(1999)
Proc. CSFW
, pp. 55-69
-
-
Cervesato, I.1
Durgin, N.A.2
Lincoln, P.3
Mitchell, J.C.4
Scedrov, A.5
-
7
-
-
0016949746
-
A Lattice Model of Secure Information Flow
-
D.E. Denning. A Lattice Model of Secure Information Flow. Comm. of ACM, 19(5):236-242, 1976.
-
(1976)
Comm. of ACM
, vol.19
, Issue.5
, pp. 236-242
-
-
Denning, D.E.1
-
9
-
-
0011121265
-
Undecidability of Bounded Security Protocols
-
N. Heintze and E. Clarke, editors
-
N. Durgin, P. Lincoln, J. Mitchell, and A. Scedrov. Undecidability of Bounded Security Protocols. In N. Heintze and E. Clarke, editors, Proc. FMSP'99, 1999.
-
(1999)
Proc. FMSP'99
-
-
Durgin, N.1
Lincoln, P.2
Mitchell, J.3
Scedrov, A.4
-
12
-
-
28144456308
-
An Attack on the Needham-Schroeder Public-Key Authentication Protocol
-
G. Lowe. An Attack on the Needham-Schroeder Public-Key Authentication Protocol. Information Processing Letters, 56(3):131-133, 1995.
-
(1995)
Information Processing Letters
, vol.56
, Issue.3
, pp. 131-133
-
-
Lowe, G.1
-
13
-
-
49449120803
-
Consistency in Networks of Relations
-
A.K. Mackworth. Consistency in Networks of Relations. Artificial Intelligence, 8(1):99-118, 1977.
-
(1977)
Artificial Intelligence
, vol.8
, Issue.1
, pp. 99-118
-
-
Mackworth, A.K.1
-
14
-
-
0016050041
-
Networks of Constraints: Fundamental Properties and Applications to Picture Processing
-
Also Technical Report, Carnegie Mellon University, 1971
-
U. Montanari. Networks of Constraints: Fundamental Properties and Applications to Picture Processing. Information Science, 7:95-132, 1974. Also Technical Report, Carnegie Mellon University, 1971.
-
(1974)
Information Science
, vol.7
, pp. 95-132
-
-
Montanari, U.1
-
18
-
-
0001553684
-
Possibilistic Constraint Satisfaction Problems, or "How to Handle Soft Constraints?"
-
T. Schiex. Possibilistic Constraint Satisfaction Problems, or "How to Handle Soft Constraints?". In Proc. of 8th Conference on Uncertainty in AI, pages 269-275, 1992.
-
(1992)
Proc. of 8th Conference on Uncertainty in AI
, pp. 269-275
-
-
Schiex, T.1
|