-
1
-
-
0001772130
-
Secrecy by Typing in Security Protocols
-
M. Abadi. Secrecy by Typing in Security Protocols. Journal of the ACM, 46(5):749-786, 1999.
-
(1999)
Journal of the ACM
, vol.46
, Issue.5
, pp. 749-786
-
-
Abadi, M.1
-
2
-
-
0035838828
-
Static analysis for the pi-calculus with applications to security
-
C. Bodei, P. Degano, F. Nielson, and H. Nielson. Static analysis for the pi-calculus with applications to security. Information and Computation, 168(1):68-92, 2001.
-
(2001)
Information and Computation
, vol.168
, Issue.1
, pp. 68-92
-
-
Bodei, C.1
Degano, P.2
Nielson, F.3
Nielson, H.4
-
3
-
-
84944047063
-
Transforming processes to ensure and check information flow security
-
H. Kirchner and C. Ringeissen, editors, Int. Conference on Algebraic Methodology and Software Technology (AMAST'02), Springer
-
A. Bossi, R. Focardi, C. Piazza, and S. Rossi. Transforming processes to ensure and check information flow security. In H. Kirchner and C. Ringeissen, editors, Int. Conference on Algebraic Methodology and Software Technology (AMAST'02), volume 2422 of LWCS, pages 271-286. Springer, 2002.
-
(2002)
LWCS
, vol.2422
, pp. 271-286
-
-
Bossi, A.1
Focardi, R.2
Piazza, C.3
Rossi, S.4
-
4
-
-
85029439013
-
Symbolic Bisimulation Minimization
-
Proc. of Computer Aided Verification, Springer
-
A. Bouali and R. de Simone. Symbolic Bisimulation Minimization. In Proc. of Computer Aided Verification, volume 663 of LNCS, pages 96-108. Springer, 1992.
-
(1992)
LNCS
, vol.663
, pp. 96-108
-
-
Bouali, A.1
De Simone, R.2
-
5
-
-
84879520825
-
Non-Interference for Concurrent Programs
-
Proc. of Int. Colloquium on Automata, Languages and Programming, Springer
-
G. Boudol and I. Castellani. Non-Interference for Concurrent Programs. In Proc. of Int. Colloquium on Automata, Languages and Programming, volume 2076 of LNCS, pages 382-395. Springer, 2001.
-
(2001)
LNCS
, vol.2076
, pp. 382-395
-
-
Boudol, G.1
Castellani, I.2
-
7
-
-
84958780189
-
A Fast Bisimulation Algorithm
-
Proc. of Computer Aided Verification, Springer
-
A. Dovier, C. Piazza, and A. Policriti. A Fast Bisimulation Algorithm. In Proc. of Computer Aided Verification, volume 2102 of LNCS, pages 79-90. Springer, 2001.
-
(2001)
LNCS
, vol.2102
, pp. 79-90
-
-
Dovier, A.1
Piazza, C.2
Policriti, A.3
-
9
-
-
0001439194
-
The Compositional Security Checker: A Tool for the Verification of Information Flow Security Properties
-
R. Focardi and R. Gorrieri. The Compositional Security Checker: A Tool for the Verification of Information Flow Security Properties. IEEE Transactions on Software Engineering, 23(9):550-571, 1997.
-
(1997)
IEEE Transactions on Software Engineering
, vol.23
, Issue.9
, pp. 550-571
-
-
Focardi, R.1
Gorrieri, R.2
-
10
-
-
84988393004
-
Classification of Security Properties (Part I: Information Flow)
-
R. Focardi and R. Gorrieri, editors, Foundations of Security Analysis and Design, Springer
-
R. Focardi and R. Gorrieri. Classification of Security Properties (Part I: Information Flow). In R. Focardi and R. Gorrieri, editors, Foundations of Security Analysis and Design, volume 2171 of LNCS. Springer, 2001.
-
(2001)
LNCS
, vol.2171
-
-
Focardi, R.1
Gorrieri, R.2
-
13
-
-
84974577536
-
Information Flow vs. Resource Access in the Asynchronous Pi-Calculus
-
Proc. of Int. Colloquium on Automata, Languages and Programming (ICALP'00), Springer
-
M. Hennessy and J. Riely. Information Flow vs. Resource Access in the Asynchronous Pi-Calculus. In Proc. of Int. Colloquium on Automata, Languages and Programming (ICALP'00), volume 1853 of LNCS, pages 415-427. Springer, 2000.
-
(2000)
LNCS
, vol.1853
, pp. 415-427
-
-
Hennessy, M.1
Riely, J.2
-
15
-
-
0033701251
-
Possibilistic Definitions of Security - An Assebly Kit
-
IEEE
-
H. Mantel. Possibilistic Definitions of Security - An Assebly Kit -. In Proc. of the IEEE Symp. on Security and Privacy, pages 185-199. IEEE, 2000.
-
(2000)
Proc. of the IEEE Symp. on Security and Privacy
, pp. 185-199
-
-
Mantel, H.1
-
16
-
-
84944059120
-
Unwinding Possibilistic Security Properties
-
Proc. of European Symp. on Research in Computer Security, Springer
-
H. Mantel. Unwinding Possibilistic Security Properties. In Proc. of European Symp. on Research in Computer Security, volume 2895 of LNCS. Springer, 2000.
-
(2000)
LNCS
, vol.2895
-
-
Mantel, H.1
-
17
-
-
0031645024
-
Partial Model Checking and Theorem Proving for Ensuring Security Properties
-
IEEE
-
F. Martinelli. Partial Model Checking and Theorem Proving for Ensuring Security Properties. In Proc. Computer Security Foundations Workshop. IEEE, 1998.
-
(1998)
Proc. Computer Security Foundations Workshop
-
-
Martinelli, F.1
-
19
-
-
0028058408
-
A General Theory of Composition for Trace Sets Closed under Selective Interleaving Functions
-
J. McLean. A General Theory of Composition for Trace Sets Closed under Selective Interleaving Functions. In Proc. Symp. on Security and Privacy, pages 79-93, 1994.
-
(1994)
Proc. Symp. on Security and Privacy
, pp. 79-93
-
-
McLean, J.1
-
22
-
-
0023566630
-
Three Partition Refinement Algorithms
-
R. Paige and R. E. Tarjan. Three Partition Refinement Algorithms. SIAM Journal on Computing, 16(6):973-989, 1987.
-
(1987)
SIAM Journal on Computing
, vol.16
, Issue.6
, pp. 973-989
-
-
Paige, R.1
Tarjan, R.E.2
|