-
2
-
-
33745658881
-
-
J. Bryans, M. Koutny, L. Mazaré, and P. Y. A. Ryan, Opacity generalised to transition systems, in Revised Selected Papers of the 3rd International Workshop on Formal Aspects in Security and Trust (FAST'05), ser. Lecture Notes in Computer Science, T. Dimitrakos, F. Martinelli, P. Y. A. Ryan, and S. A. Schneider, Eds., 3866. Newcastle upon Tyne, UK: Springer, 2006, pp. 81-95.
-
J. Bryans, M. Koutny, L. Mazaré, and P. Y. A. Ryan, "Opacity generalised to transition systems," in Revised Selected Papers of the 3rd International Workshop on Formal Aspects in Security and Trust (FAST'05), ser. Lecture Notes in Computer Science, T. Dimitrakos, F. Martinelli, P. Y. A. Ryan, and S. A. Schneider, Eds., vol. 3866. Newcastle upon Tyne, UK: Springer, 2006, pp. 81-95.
-
-
-
-
3
-
-
33746373966
-
Preserving secrecy under refinement
-
Springer
-
R. Alur, P. Cerný, and S. Zdancewic, "Preserving secrecy under refinement," in ICALP '06: Proceedings (Part II) of the 33rd International Colloquium on Automata, Languages and Programming, Springer, 2006, pp. 107-118.
-
(2006)
ICALP '06: Proceedings (Part II) of the 33rd International Colloquium on Automata, Languages and Programming
, pp. 107-118
-
-
Alur, R.1
Cerný, P.2
Zdancewic, S.3
-
4
-
-
53149117183
-
Construction de moniteurs pour la surveillance de propriétés de sécurité
-
Lyon, France, October
-
J. Dubreil, T. Jéron, and H. Marchand, "Construction de moniteurs pour la surveillance de propriétés de sécurité," in 6ème Colloque Francophone sur la Modélisation des Systèmes Réactifs, Lyon, France, October 2007.
-
(2007)
6ème Colloque Francophone sur la Modélisation des Systèmes Réactifs
-
-
Dubreil, J.1
Jéron, T.2
Marchand, H.3
-
5
-
-
35948973608
-
Concurrent secrets
-
extended version of a Wodes'06 paper
-
E. Badouel, M. Bednarczyk, A. Borzyszkowski, B. Caillaud, and P. Darondeau, "Concurrent secrets," Discrete Event Dynamic Systems, vol. 17, pp. 425-446, 2007, extended version of a Wodes'06 paper.
-
(2007)
Discrete Event Dynamic Systems
, vol.17
, pp. 425-446
-
-
Badouel, E.1
Bednarczyk, M.2
Borzyszkowski, A.3
Caillaud, B.4
Darondeau, P.5
-
6
-
-
84881225236
-
Enforceable security policies
-
F. B. Schneider, "Enforceable security policies," ACM Trans. Inf. Syst. Secur., vol. 3, no. 1, pp. 30-50, 2000.
-
(2000)
ACM Trans. Inf. Syst. Secur
, vol.3
, Issue.1
, pp. 30-50
-
-
Schneider, F.B.1
-
7
-
-
13444275220
-
Edit automata: Enforcement mechanisms for run-time security policies
-
J. Ligatti, L. Bauer, and D. Walker, "Edit automata: enforcement mechanisms for run-time security policies," Int. J. Inf. Sec., vol. 4, no. 1-2, pp. 2-16, 2005.
-
(2005)
Int. J. Inf. Sec
, vol.4
, Issue.1-2
, pp. 2-16
-
-
Ligatti, J.1
Bauer, L.2
Walker, D.3
-
9
-
-
0025475618
-
Formulas for calculating supremal controllable and normal sublanguages
-
R. D. Brandt, V. Garg, R. Kumar, F. Lin, S. I. Marcus, and W. M. Wonham, "Formulas for calculating supremal controllable and normal sublanguages," Systems & Control Letters, vol. 15, no. 2, pp. 111-117, 1990.
-
(1990)
Systems & Control Letters
, vol.15
, Issue.2
, pp. 111-117
-
-
Brandt, R.D.1
Garg, V.2
Kumar, R.3
Lin, F.4
Marcus, S.I.5
Wonham, W.M.6
-
10
-
-
84972541021
-
A lattice-theoretical fixpoint theorem and its applications
-
A. Tarski, "A lattice-theoretical fixpoint theorem and its applications," Pacific Journal of Mathematics, vol. 5, pp. 285-309, 1955.
-
(1955)
Pacific Journal of Mathematics
, vol.5
, pp. 285-309
-
-
Tarski, A.1
|