-
2
-
-
4944265912
-
Unwinding in information flow security
-
To appear
-
A. Bossi, R. Focardi, D. Macedonio, C. Piazza, and S. Rossi. Unwinding in Information Flow Security. Electronic Notes in Theoretical Computer Science, 2004. To appear. Available at http://www.dsiunive.it/~srossi/entcs04.ps.
-
(2004)
Electronic Notes in Theoretical Computer Science
-
-
Bossi, A.1
Focardi, R.2
Macedonio, D.3
Piazza, C.4
Rossi, S.5
-
3
-
-
84855661226
-
Refinement operators and information flow security
-
IEEE Computer Society Press
-
A. Bossi, R. Focardi, C. Piazza, and S. Rossi. Refinement Operators and Information Flow Security. In Proc. of the 1st IEEE Int. Conference on Software Engineering and Formal Methods (SEFM'03), pages 44-53. IEEE Computer Society Press, 2003.
-
(2003)
Proc. of the 1st IEEE Int. Conference on Software Engineering and Formal Methods (SEFM'03)
, pp. 44-53
-
-
Bossi, A.1
Focardi, R.2
Piazza, C.3
Rossi, S.4
-
4
-
-
34249893892
-
Compositional Action Refinement and Information Flow Security
-
Dipartimento di Informatica, Università Ca' Foscari di Venezia, Italy
-
A. Bossi, D. Macedonio, C. Piazza, and S. Rosssi. Compositional Action Refinement and Information Flow Security. Technical Report CS-2003-13, Dipartimento di Informatica, Università Ca' Foscari di Venezia, Italy, 2003.
-
(2003)
Technical Report CS-2003-13
, vol.CS-2003-13
-
-
Bossi, A.1
Macedonio, D.2
Piazza, C.3
Rosssi, S.4
-
5
-
-
84988393004
-
Classification of security properties (Part I: Information flow)
-
Volume 2171 of LNCS. In R. Focardi and R. Gorrieri, editors. Springer-Verlag
-
R. Focardi and R. Gorrieri. Classification of Security Properties (Part I: Information Flow). In R. Focardi and R. Gorrieri, editors, Proc. of Foundations of Security Analysis and Design (FOSAD'01), volume 2171 of LNCS, pages 331-396. Springer-Verlag, 2001.
-
(2001)
Proc. of Foundations of Security Analysis and Design (FOSAD'01)
, pp. 331-396
-
-
Focardi, R.1
Gorrieri, R.2
-
11
-
-
4944237116
-
Bisimulation-based non-deterministic admissible interference and its application to the analysis of cryptographic protocols
-
S. Lafrance and J. Mullins. Bisimulation-based Non-deterministic Admissible Interference and its Application to the Analysis of Cryptographic Protocols. Electronic Notes in Theoretical Computer Science, 61:1-24, 2002.
-
(2002)
Electronic Notes in Theoretical Computer Science
, vol.61
, pp. 1-24
-
-
Lafrance, S.1
Mullins, J.2
-
15
-
-
0042361083
-
Nondeterministic admissible interference
-
J. Mullins. Nondeterministic Admissible Interference. Journal of Universal Computer Science, 11:1054-1070, 2000.
-
(2000)
Journal of Universal Computer Science
, vol.11
, pp. 1054-1070
-
-
Mullins, J.1
-
17
-
-
0029228214
-
Absorbing covers and intransitive noninterference
-
IEEE Computer Society Press
-
S. Pinsky. Absorbing Covers and Intransitive Noninterference. In Proc. of the IEEE Symposium on Security and Privacy (SSP'95), pages 102-113. IEEE Computer Society Press, 1995.
-
(1995)
Proc. of the IEEE Symposium on Security and Privacy (SSP'95)
, pp. 102-113
-
-
Pinsky, S.1
-
19
-
-
0003502331
-
Noninterference, transitivity, and channel-control security policies
-
SRI International, December
-
J. Rushby. Noninterference, transitivity, and channel-control security policies. Technical Report CSL-92-02, SRI International, December 1992.
-
(1992)
Technical Report CSL-92-02
, vol.CSL-92-02
-
-
Rushby, J.1
|