-
1
-
-
84855617591
-
-
Technical Report CS-2002-15, Dipartimento di Informatica, Università Ca' Foscari di Venezia, Italy
-
A. Bossi, R. Focardi, C. Piazza, and S. Rossi. Bisimulation and unwinding for verifying possibilistic security properties. Technical Report CS-2002-15, Dipartimento di Informatica, Università Ca' Foscari di Venezia, Italy, 2002. http://www.dsi.unive.it/ricerca/TR/index.htm.
-
(2002)
Bisimulation and Unwinding for Verifying Possibilistic Security Properties
-
-
Bossi, A.1
Focardi, R.2
Piazza, C.3
Rossi, S.4
-
2
-
-
35248883450
-
A Proof System for Information Flow Security
-
M. Leuschel, editor, Proc. of Int. Workshop on Logic Based Program Development and Transformation, Springer-Verlag, To appear
-
A. Bossi, R. Focardi, C. Piazza, and S. Rossi. A Proof System for Information Flow Security. In M. Leuschel, editor, Proc. of Int. Workshop on Logic Based Program Development and Transformation, LNCS. Springer-Verlag, 2002. To appear.
-
(2002)
LNCS
-
-
Bossi, A.1
Focardi, R.2
Piazza, C.3
Rossi, S.4
-
4
-
-
84974776068
-
A Classification of Security Properties for Process Algebras
-
R. Focardi and R. Gorrieri. A Classification of Security Properties for Process Algebras. Journal of Computer Security, 3(1):5-33, 1994/1995.
-
(1994)
Journal of Computer Security
, vol.3
, Issue.1
, pp. 5-33
-
-
Focardi, R.1
Gorrieri, R.2
-
5
-
-
0001439194
-
The Compositional Security Checker: A Tool for the Verification of Information Flow Security Properties
-
R. Focardi and R. Gorrieri. The Compositional Security Checker: A Tool for the Verification of Information Flow Security Properties. IEEE Transactions on Software Engineering, 23(9):550-571, 1997.
-
(1997)
IEEE Transactions on Software Engineering
, vol.23
, Issue.9
, pp. 550-571
-
-
Focardi, R.1
Gorrieri, R.2
-
6
-
-
84988393004
-
Classification of Security Properties (Part I: Information Flow)
-
R. Focardi and R. Gorrieri, editors, Foundations of Security Analysis and Design, Springer-Verlag
-
R. Focardi and R. Gorrieri. Classification of Security Properties (Part I: Information Flow). In R. Focardi and R. Gorrieri, editors, Foundations of Security Analysis and Design, volume 2171 of LNCS. Springer-Verlag, 2001.
-
(2001)
LNCS
, vol.2171
-
-
Focardi, R.1
Gorrieri, R.2
-
7
-
-
84876687849
-
Proof Methods for Bisimulation based Information Flow Security
-
A. Cortesi, editor, Proc. of Int. Workshop on Verification, Model Checking and Abstract Interpretation, Springer-Verlag
-
R. Focardi, C. Piazza, and S. Rossi. Proof Methods for Bisimulation based Information Flow Security. In A. Cortesi, editor, Proc. of Int. Workshop on Verification, Model Checking and Abstract Interpretation, volume 2294 of LNCS, pages 16-31. Springer-Verlag, 2002.
-
(2002)
LNCS
, vol.2294
, pp. 16-31
-
-
Focardi, R.1
Piazza, C.2
Rossi, S.3
-
9
-
-
0023241098
-
A Universal Theory of Information Flow
-
IEEE Computer Society Press
-
S. N. Foley. A Universal Theory of Information Flow. In Proc. of the IEEE Symposium on Security and Privacy, pages 116-122. IEEE Computer Society Press, 1987.
-
(1987)
Proc. of the IEEE Symposium on Security and Privacy
, pp. 116-122
-
-
Foley, S.N.1
-
14
-
-
0024663847
-
On the Derivation of Secure Components
-
IEEE Computer Society Press
-
J. Jacob. On the Derivation of Secure Components. In Proc. of the IEEE Symposium on Security and Privacy, pages 242-247. IEEE Computer Society Press, 1989.
-
(1989)
Proc. of the IEEE Symposium on Security and Privacy
, pp. 242-247
-
-
Jacob, J.1
-
16
-
-
0033701251
-
Possibilistic Definitions of Security - An Assebly Kit
-
IEEE Computer Society Press
-
H. Mantel. Possibilistic Definitions of Security - An Assebly Kit -. In Proc. of the IEEE Symposium on Security and Privacy, pages 185-199. IEEE Computer Society Press, 2000.
-
(2000)
Proc. of the IEEE Symposium on Security and Privacy
, pp. 185-199
-
-
Mantel, H.1
-
17
-
-
84944059120
-
Unwinding Possibilistic Security Properties
-
Proc. of the European Symposium on Research in Computer Security, Springer-Verlag
-
H. Mantel. Unwinding Possibilistic Security Properties. In Proc. of the European Symposium on Research in Computer Security, volume 2895 of LNCS, pages 238-254. Springer-Verlag, 2000.
-
(2000)
LNCS
, vol.2895
, pp. 238-254
-
-
Mantel, H.1
-
18
-
-
0034836335
-
Preserving Information Flow Properties under Refinement
-
IEEE Computer Society Press
-
H. Mantel. Preserving Information Flow Properties under Refinement. In Proc. of the IEEE Symposium on Security and Privacy, pages 78-91. IEEE Computer Society Press, 2001.
-
(2001)
Proc. of the IEEE Symposium on Security and Privacy
, pp. 78-91
-
-
Mantel, H.1
-
19
-
-
0036083020
-
On the Composition of Secure Systems
-
IEEE Computer Society Press
-
H. Mantel. On the Composition of Secure Systems. In Proc. of the IEEE Symposium on Security and Privacy, pages 88-101. IEEE Computer Society Press, 2002.
-
(2002)
Proc. of the IEEE Symposium on Security and Privacy
, pp. 88-101
-
-
Mantel, H.1
-
20
-
-
0031645024
-
Partial Model Checking and Theorem Proving for Ensuring Security Properties
-
IEEE Computer Society Press
-
F. Martinelli. Partial Model Checking and Theorem Proving for Ensuring Security Properties. In Proc. of the IEEE Computer Security Foundations Workshop, pages 44-52. IEEE Computer Society Press, 1998.
-
(1998)
Proc. of the IEEE Computer Security Foundations Workshop
, pp. 44-52
-
-
Martinelli, F.1
-
21
-
-
0023231848
-
Specifications for Multi-Level Security and a Hook-Up Property
-
IEEE Computer Society Press
-
D. McCullough. Specifications for Multi-Level Security and a Hook-Up Property. In Proc. of the IEEE Symposium on Security and Privacy, pages 161-166. IEEE Computer Society Press, 1987.
-
(1987)
Proc. of the IEEE Symposium on Security and Privacy
, pp. 161-166
-
-
McCullough, D.1
-
22
-
-
0025139568
-
Security Models and Information Flow
-
IEEE Computer Society Press
-
J. McLean. Security Models and Information Flow. In Proc. of the IEEE Symposium on Security and Privacy, pages 180-187. IEEE Computer Society Press, 1990.
-
(1990)
Proc. of the IEEE Symposium on Security and Privacy
, pp. 180-187
-
-
McLean, J.1
-
23
-
-
0028058408
-
A General Theory of Composition for Trace Sets Closed under Selective Interleaving Functions
-
IEEE Computer Society Press
-
J. McLean. A General Theory of Composition for Trace Sets Closed under Selective Interleaving Functions. In Proc. of the IEEE Symposium on Security and Privacy, pages 79-93. IEEE Computer Society Press, 1994.
-
(1994)
Proc. of the IEEE Symposium on Security and Privacy
, pp. 79-93
-
-
McLean, J.1
-
25
-
-
0002426876
-
A General Theory of Composition for a Class of "Possibilistic" Security Properties
-
J. McLean. A General Theory of Composition for a Class of "Possibilistic" Security Properties. IEEE Trabsactions on Software Engineering, 22(1):53-67, 1996.
-
(1996)
IEEE Trabsactions on Software Engineering
, vol.22
, Issue.1
, pp. 53-67
-
-
McLean, J.1
-
30
-
-
0023566630
-
Three partition refinement algorithms
-
R. Paige and R. E. Tarjan. Three partition refinement algorithms. SIAM Journal on Computing, 16(6):973-989, 1987.
-
(1987)
SIAM Journal on Computing
, vol.16
, Issue.6
, pp. 973-989
-
-
Paige, R.1
Tarjan, R.E.2
-
31
-
-
0001868056
-
Non-interference through Determinism
-
Proc. of the European Symposium on Research in Computer Security, Springer-Verlag
-
A. W. Roscoe, J. C. P. Woodcock, and L. Wulf. Non-interference through Determinism. In Proc. of the European Symposium on Research in Computer Security, volume 875 of LNCS, pages 33-53. Springer-Verlag, 1994.
-
(1994)
LNCS
, vol.875
, pp. 33-53
-
-
Roscoe, A.W.1
Woodcock, J.C.P.2
Wulf, L.3
-
32
-
-
0003142759
-
A CSP Formulation of Non-interference and Unwinding
-
P. Y. A. Ryan. A CSP Formulation of Non-interference and Unwinding. Cipher, pages 19-27, 1991.
-
(1991)
Cipher
, pp. 19-27
-
-
Ryan, P.Y.A.1
|