-
1
-
-
0001772130
-
Secrecy by typing in security protocols
-
Martín Abadi. Secrecy by typing in security protocols. Journal of the ACM, 46(5):749-786, 1999.
-
(1999)
Journal of the ACM
, vol.46
, Issue.5
, pp. 749-786
-
-
Abadi, M.1
-
2
-
-
3042529082
-
A Process-algebraic Approach for the Analysis of Probabilistic Non-interference
-
To appear
-
A. Aldini, M. Bravetti, and R. Gorrieri. A Process-algebraic Approach for the Analysis of Probabilistic Non-interference. Journal of Computer Security, 2004. To appear.
-
(2004)
Journal of Computer Security
-
-
Aldini, A.1
Bravetti, M.2
Gorrieri, R.3
-
3
-
-
0003400251
-
Secure computer systems: Unified exposition and multics interpretation
-
MITRE MTR-2997
-
D. E. Bell and L. J. La Padula. Secure computer systems: Unified exposition and multics interpretation. Technical Report ESD-TR-75-306, MITRE MTR-2997, 1975.
-
(1975)
Technical Report
, vol.ESD-TR-75-306
-
-
Bell, D.E.1
La Padula, L.J.2
-
5
-
-
84937553676
-
Static analysis for secrecy and non-interference in networks of processes
-
Victor E. Malyshkin, editor, Proc. of International Conference on Parallel Computing Technologies. Springer-Verlag
-
C. Bodei, P. Degano, F. Nielson, and H. Riis Nielson. Static analysis for secrecy and non-interference in networks of processes. In Victor E. Malyshkin, editor, Proc. of International Conference on Parallel Computing Technologies, volume 2127 of Lecture Notes in Computer Science, pages 27-41. Springer-Verlag, 2001.
-
(2001)
Lecture Notes in Computer Science
, vol.2127
, pp. 27-41
-
-
Bodei, C.1
Degano, P.2
Nielson, F.3
Nielson, H.R.4
-
6
-
-
84944047063
-
Transforming processes to ensure and check information flow security
-
H. Kirchner and C. Ringeissen, editors, Int. Conference on Algebraic Methodology and Software Technology (AMAST'02). Springer-Verlag
-
A. Bossi, R. Focardi, C. Piazza, and S. Rossi. Transforming Processes to Ensure and Check Information Flow Security. In H. Kirchner and C. Ringeissen, editors, Int. Conference on Algebraic Methodology and Software Technology (AMAST'02), volume 2422 of LNCS, pages 271-286. Springer-Verlag, 2002.
-
(2002)
LNCS
, vol.2422
, pp. 271-286
-
-
Bossi, A.1
Focardi, R.2
Piazza, C.3
Rossi, S.4
-
7
-
-
35248883450
-
A proof system for information flow security
-
M. Leuschel, editor, Logic Based Program Development and Transformation. Springer-Verlag
-
A. Bossi, R. Focardi, C. Piazza, and S. Rossi. A Proof System for Information Flow Security. In M. Leuschel, editor, Logic Based Program Development and Transformation, volume 2664 of LNCS, pages 199-218. Springer-Verlag, 2003.
-
(2003)
LNCS
, vol.2664
, pp. 199-218
-
-
Bossi, A.1
Focardi, R.2
Piazza, C.3
Rossi, S.4
-
8
-
-
84855661226
-
Refinement operators and information flow security
-
IEEE Computer Society Press
-
A. Bossi, R. Focardi, C. Piazza, and S. Rossi. Refinement Operators and Information Flow Security. In Proc. of the 1st IEEE Int. Conference on Software Engineering and Formal Methods (SEFM'OS), pages 44-53. IEEE Computer Society Press, 2003.
-
(2003)
Proc. of the 1st IEEE Int. Conference on Software Engineering and Formal Methods (SEFM'OS)
, pp. 44-53
-
-
Bossi, A.1
Focardi, R.2
Piazza, C.3
Rossi, S.4
-
9
-
-
3242706680
-
Verifying persistent security properties
-
To appear
-
A. Bossi, R. Focardi, C. Piazza, and S. Rossi. Verifying Persistent Security Properties. Computer Languages, Systems and Structures, 2003. To appear. Available at http ://www.dsi.unive.it/~srossi/c103. ps.gz.
-
(2003)
Computer Languages, Systems and Structures
-
-
Bossi, A.1
Focardi, R.2
Piazza, C.3
Rossi, S.4
-
10
-
-
0142218855
-
Information flow security and recursive systems
-
Proc. of the Italian Conference on Theoretical Computer Science (ICTCS'03). Springer-Verlag
-
A. Bossi, D. Macedonio, C. Piazza, and S. Rossi. Information Flow Security and Recursive Systems. In Proc. of the Italian Conference on Theoretical Computer Science (ICTCS'03), volume 2841 of LNCS, pages 369-382. Springer-Verlag, 2003.
-
(2003)
LNCS
, vol.2841
, pp. 369-382
-
-
Bossi, A.1
Macedonio, D.2
Piazza, C.3
Rossi, S.4
-
11
-
-
84877738879
-
Communication interference in mobile boxed ambients
-
M. Agrawal and A. Seth, editors, Proc. of Int. Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS'02). Springer-Verlag
-
M. Bugliesi, S. Crafa, M. Merro, and V. Sassone. Communication Interference in Mobile Boxed Ambients. In M. Agrawal and A. Seth, editors, Proc. of Int. Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS'02), volume 2556 of LNCS, pages 71-84. Springer-Verlag, 2002.
-
(2002)
LNCS
, vol.2556
, pp. 71-84
-
-
Bugliesi, M.1
Crafa, S.2
Merro, M.3
Sassone, V.4
-
13
-
-
84974776068
-
A classification of security properties for process algebras
-
R. Focardi and R. Gorrieri. A Classification of Security Properties for Process Algebras. Journal of Computer Security, 3(1):5-33, 1994/1995.
-
(1994)
Journal of Computer Security
, vol.3
, Issue.1
, pp. 5-33
-
-
Focardi, R.1
Gorrieri, R.2
-
14
-
-
84988393004
-
Classification of security properties (part I: Information flow)
-
R. Focardi and R. Gorrieri, editors, Proc. of Foundations of Security Analysis and Design (FOSAD'01). Springer-Verlag
-
R. Focardi and R. Gorrieri. Classification of Security Properties (Part I: Information Flow). In R. Focardi and R. Gorrieri, editors, Proc. of Foundations of Security Analysis and Design (FOSAD'01), volume 2171 of LNCS, pages 331-396. Springer-Verlag, 2001.
-
(2001)
LNCS
, vol.2171
, pp. 331-396
-
-
Focardi, R.1
Gorrieri, R.2
-
16
-
-
84974597207
-
Non interference for the analysis of cryptographic protocols
-
U. Montanari, J. D. P. Rolim, and E. Welzl, editors, Proc. of Int. Colloquium on Automata, Languages and Programming (ICALP'00). Springer-Verlag
-
R. Focardi, R. Gorrieri, and F. Martinelli. Non Interference for the Analysis of Cryptographic Protocols. In U. Montanari, J. D. P. Rolim, and E. Welzl, editors, Proc. of Int. Colloquium on Automata, Languages and Programming (ICALP'00), volume 1853 of LNCS, pages 744-755. Springer-Verlag, 2000.
-
(2000)
LNCS
, vol.1853
, pp. 744-755
-
-
Focardi, R.1
Gorrieri, R.2
Martinelli, F.3
-
21
-
-
35248873844
-
A simple language for real-time cryptographic protocol analysis
-
P. Degano, editor, Proc. of European Symposium on Programming (ESOP'03). Springer-Verlag
-
R. Gorrieri, E. Locatelli, and F. Martinelli. A simple language for real-time cryptographic protocol analysis. In P. Degano, editor, Proc. of European Symposium on Programming (ESOP'03), volume 2618 of LNCS, pages 114-128. Springer-Verlag, 2003.
-
(2003)
LNCS
, vol.2618
, pp. 114-128
-
-
Gorrieri, R.1
Locatelli, E.2
Martinelli, F.3
-
23
-
-
84944059120
-
Unwinding possibilistic security properties
-
Proc. of the European Symposium on Research in Computer Security (ESoRiCS'00). Springer-Verlag
-
H. Mantel. Unwinding Possibilistic Security Properties. In Proc. of the European Symposium on Research in Computer Security (ESoRiCS'00), volume 2895 of LNCS, pages 238-254. Springer-Verlag, 2000.
-
(2000)
LNCS
, vol.2895
, pp. 238-254
-
-
Mantel, H.1
-
24
-
-
0031645024
-
Partial model checking and theorem proving for ensuring security properties
-
IEEE Computer Society Press
-
F. Martinelli. Partial Model Checking and Theorem Proving for Ensuring Security Properties. In Proc. of the IEEE Computer Security Foundations Workshop (CSFW'98), pages 44-52. IEEE Computer Society Press, 1998.
-
(1998)
Proc. of the IEEE Computer Security Foundations Workshop (CSFW'98)
, pp. 44-52
-
-
Martinelli, F.1
-
28
-
-
84969347374
-
CCS dynamic bisimulation is progressing
-
Proc. of the Int. Symposium on Mathematical Foundations of Computer Science (MFCS'91). Springer-Verlag
-
U. Montanari and V. Sassone. CCS Dynamic Bisimulation is Progressing. In Proc. of the Int. Symposium on Mathematical Foundations of Computer Science (MFCS'91), volume 520 of LNCS, pages 346-356. Springer-Verlag, 1991.
-
(1991)
LNCS
, vol.520
, pp. 346-356
-
-
Montanari, U.1
Sassone, V.2
-
31
-
-
0003142759
-
A CSP formulation of non-interference and unwinding
-
P. Y. A. Ryan. A CSP Formulation of Non-Interference and Unwinding. Cipher, pages 19-27, 1991.
-
(1991)
Cipher
, pp. 19-27
-
-
Ryan, P.Y.A.1
|