-
1
-
-
33748744443
-
Classification of security properties in a linda-like process algebra
-
Aldini A. (2006). Classification of security properties in a linda-like process algebra. Sci. Comput. Program. 63: 16-38
-
(2006)
Sci. Comput. Program.
, vol.63
, pp. 16-38
-
-
Aldini, A.1
-
2
-
-
35048838158
-
An integrated view of security analysis and performance evaluation: Trading qos with covert channel bandwidth
-
In: Springer
-
Aldini, A., Bernardo, M.: An integrated view of security analysis and performance evaluation: Trading qos with covert channel bandwidth. In: SAFECOMP'04: Proceedings of the 23rd International Conference on Computer Safety, Reliability and Security, Lecture Notes in Computer Science, vol. 3219, pp. 283-296. Springer (2004)
-
(2004)
SAFECOMP'04: Proceedings of the 23rd International Conference on Computer Safety, Reliability and Security, Lecture Notes in Computer Science
, vol.3219
, pp. 283-296
-
-
Aldini, A.1
Bernardo, M.2
-
3
-
-
21144453684
-
Two formal approaches for approximating noninterference properties
-
In: [18]
-
Aldini, A., Bravetti, M., Di Pierro, A., Gorrieri, R., Hankin, C., Wiklicky, H.: Two formal approaches for approximating noninterference properties. In: Focardi and Gorrieri [18], pp. 1-43
-
Focardi and Gorrieri
, pp. 1-43
-
-
Aldini, A.1
Bravetti, M.2
Di Pierro, A.3
Gorrieri, R.4
Hankin, C.5
Wiklicky, H.6
-
4
-
-
3042529082
-
A process algebraic approach for the analysis of probabilistic non-inetrference
-
Aldini A., Bravetti M. and Gorrieri R. (2004). A process algebraic approach for the analysis of probabilistic non-inetrference. J. Comput. Security 12(1): 191-245
-
(2004)
J. Comput. Security
, vol.12
, Issue.1
, pp. 191-245
-
-
Aldini, A.1
Bravetti, M.2
Gorrieri, R.3
-
5
-
-
18944371718
-
A quantitative approach to noninterference for probabilistic systems
-
In: Bravetti M., Gorrieri G. (eds.) Elsevier
-
Aldini, A., Di Pierro, A.: A quantitative approach to noninterference for probabilistic systems. In: Bravetti M., Gorrieri G. (eds.) Proceedings of the MEFISTO Project 2003, Formal Methods for Security and Time, Electronic Notes in Theoretical Computer Science, vol. 99, pp. 155-182. Elsevier (2004)
-
(2004)
Proceedings of the MEFISTO Project 2003, Formal Methods for Security and Time, Electronic Notes in Theoretical Computer Science
, vol.99
, pp. 155-182
-
-
Aldini, A.1
Di Pierro, A.2
-
6
-
-
11344262694
-
On quantitative analysis of probabilistic protocols
-
In: Cerone, A., Pierro, A.D. (eds.) Elsevier
-
Aldini, A., Di Pierro, A.: On quantitative analysis of probabilistic protocols. In: Cerone, A., Pierro, A.D. (eds.) QAPL 2004, 2nd Workshop on Quantitative Aspects of Programming Languages, Electronic Notes in Theoretical Computer Science, vol. 112, pp. 131-148. Elsevier (2005)
-
(2005)
QAPL 2004, 2nd Workshop on Quantitative Aspects of Programming Languages, Electronic Notes in Theoretical Computer Science
, vol.112
, pp. 131-148
-
-
Aldini, A.1
Di Pierro, A.2
-
8
-
-
84943242087
-
Security analysis of a probabilistic non-repudiation protocol
-
In: Springer
-
Aldini, A., Gorrieri, R.: Security analysis of a probabilistic non-repudiation protocol. In: PAPM-PROBMIV 2002, 2nd Joint International Workshop on Process Algebra and Performance Modelling, Probabilistic Methods in Verification, Lecture Notes in Computer Science, vol. 2399, pp. 17-36. Springer (2002)
-
(2002)
PAPM-PROBMIV 2002, 2nd Joint International Workshop on Process Algebra and Performance Modelling, Probabilistic Methods in Verification, Lecture Notes in Computer Science
, vol.2399
, pp. 17-36
-
-
Aldini, A.1
Gorrieri, R.2
-
9
-
-
33646022579
-
Quantifying probabilistic information flow in computational reactive systems
-
In: De Capitani di Vimercati, S., Syverson, P.F., Gollmann, D. (eds.) Springer
-
Backes, M.: Quantifying probabilistic information flow in computational reactive systems. In: De Capitani di Vimercati, S., Syverson, P.F., Gollmann, D. (eds.) ESORICS '05: Proceedings of the 10th European Symposium on Research in Computer Security, Lecture Notes in Computer Science, vol. 3679, pp. 336-354. Springer (2005)
-
(2005)
ESORICS '05: Proceedings of the 10th European Symposium on Research in Computer Security, Lecture Notes in Computer Science
, vol.3679
, pp. 336-354
-
-
Backes, M.1
-
10
-
-
1442292329
-
A composable yptographic library with nested operations
-
In: ACM Press, New York doi: 10.1145/948109.948140
-
Backes, M., Pfitzmann, B., Waidner, M.: A composable yptographic library with nested operations. In: CCS'03: Proceedings of the 10th ACM conference on Computer and Communications Security, pp. 220-230. ACM Press, New York, (2003). doi: 10.1145/948109.948140
-
(2003)
CCS'03: Proceedings of the 10th ACM Conference on Computer and Communications Security
, pp. 220-230
-
-
Backes, M.1
Pfitzmann, B.2
Waidner, M.3
-
11
-
-
84947419887
-
Weak bisimulation for fully probabilistic processes
-
In: Springer
-
Baier, C., Hermanns, H.: Weak bisimulation for fully probabilistic processes. In: Proceedings of the 9th International Conference on Computer Aided Verification, Lecture Notes in Computer Science, vol. 1254, pp. 119-130. Springer (1997)
-
(1997)
Proceedings of the 9th International Conference on Computer Aided Verification, Lecture Notes in Computer Science
, vol.1254
, pp. 119-130
-
-
Baier, C.1
Hermanns, H.2
-
12
-
-
0037209771
-
Disete time generative-reactive probabilistic processes with different advancing speeds
-
Bravetti M. and Aldini A. (2003). Disete time generative-reactive probabilistic processes with different advancing speeds. Theor. Comput. Sci. 290: 355-406
-
(2003)
Theor. Comput. Sci.
, vol.290
, pp. 355-406
-
-
Bravetti, M.1
Aldini, A.2
-
13
-
-
44249107424
-
Using probabilistic I/O automata to improve the analysis of cryptographic protocols
-
Canetti R., Cheung L., Kaynar D., Liskov M., Lynch N., Pereira O. and Segala R. (2005). Using probabilistic I/O automata to improve the analysis of cryptographic protocols. ERCIM News 63: 40-41
-
(2005)
ERCIM News
, vol.63
, pp. 40-41
-
-
Canetti, R.1
Cheung, L.2
Kaynar, D.3
Liskov, M.4
Lynch, N.5
Pereira, O.6
Segala, R.7
-
14
-
-
34249809380
-
Weak probabilistic anonymity
-
Deng, Y., Palamidessi, C., Pang, J.: Weak probabilistic anonymity. In: SecCo 2005, 2nd International Workshop on Security Issues in Coordination Models, Languages, and Systems, Electronic Notes in Theoretical Computer Science (2005)
-
(2005)
SecCo 2005, 2nd International Workshop on Security Issues in Coordination Models, Languages, and Systems, Electronic Notes in Theoretical Computer Science
-
-
Deng, Y.1
Palamidessi, C.2
Pang, J.3
-
17
-
-
84974776068
-
A classification of security properties
-
Focardi R. and Gorrieri R. (1995). A classification of security properties. J. Comput. Security 3: 5-33
-
(1995)
J. Comput. Security
, vol.3
, pp. 5-33
-
-
Focardi, R.1
Gorrieri, R.2
-
18
-
-
84864840163
-
-
Focardi, R., Gorrieri, R. (eds.): Springer
-
Focardi, R., Gorrieri, R. (eds.): Lecture Notes in Computer Science, vol. 2946. Springer (2004)
-
(2004)
Lecture Notes in Computer Science
, vol.2946
-
-
-
19
-
-
35048815468
-
Classification of security properties (part ii: Network security)
-
In: [18]
-
Focardi, R., Gorrieri, R., Martinelli, F.: Classification of security properties (part ii: Network security). In: Focardi and Gorrieri [18], pp. 139-185
-
Focardi and Gorrieri
, pp. 139-185
-
-
Focardi, R.1
Gorrieri, R.2
Martinelli, F.3
-
28
-
-
35048876713
-
Probabilistic bisimulation and equivalence for security analysis of network protocols
-
In: Springer
-
Ramanathan, A., Mitchell, J.C., Scedrov, A., Teague, V.: Probabilistic bisimulation and equivalence for security analysis of network protocols. In: FoSSaCS 2004, Foundations of Software Science and Computation Structures, Lecture Notes in Computer Science, vol. 2987, pp. 468-483. Springer (2004)
-
(2004)
FoSSaCS 2004, Foundations of Software Science and Computation Structures, Lecture Notes in Computer Science
, vol.2987
, pp. 468-483
-
-
Ramanathan, A.1
Mitchell, J.C.2
Scedrov, A.3
Teague, V.4
-
30
-
-
0035067847
-
Process algebra and non-interference
-
Special Issue on CSFW-12
-
Ryan, P., Schneider, S.: Process algebra and non-interference. J. Comput. Security 9 (1/2), 75-103 (2001). Special Issue on CSFW-12
-
(2001)
J. Comput. Security
, vol.9
, Issue.1-2
, pp. 75-103
-
-
Ryan, P.1
Schneider, S.2
-
33
-
-
0004181981
-
Modeling and verification of randomized distributed real-time systems
-
Ph.D. thesis, MIT, Boston (MA)
-
Segala, R.: Modeling and verification of randomized distributed real-time systems. Ph.D. thesis, MIT, Boston (MA) (1995)
-
(1995)
-
-
Segala, R.1
-
34
-
-
0001609136
-
Probabilistic simulations for probabilistic processes
-
Segala R. and Lynch N. (1995). Probabilistic simulations for probabilistic processes. Nordic J. Comput. 2: 250-273
-
(1995)
Nordic J. Comput.
, vol.2
, pp. 250-273
-
-
Segala, R.1
Lynch, N.2
-
36
-
-
0006419926
-
Reactive, generative and stratified models of probabilistic processes
-
van Glabbeek R., Smolka S. and Steffen B. (1995). Reactive, generative and stratified models of probabilistic processes. Inf. Comput. 121: 59-80
-
(1995)
Inf. Comput.
, vol.121
, pp. 59-80
-
-
van Glabbeek, R.1
Smolka, S.2
Steffen, B.3
-
38
-
-
0031125422
-
Composition and behaviors of probabilistic i/o automata
-
Wu S., Smolka S. and Stark E. (1997). Composition and behaviors of probabilistic i/o automata. Theor. Comput. Sci. 176: 1-38
-
(1997)
Theor. Comput. Sci.
, vol.176
, pp. 1-38
-
-
Wu, S.1
Smolka, S.2
Stark, E.3
|