-
3
-
-
35948973608
-
Concurrent secrets
-
In: Lafortune, S., Lin, F., Tilbury, D. (eds.) Ann Arbor, July 2006
-
Badouel, E., Bednarczyk, M., Borzyszkowski, A., Caillaud, B., Darondeau, P.: Concurrent secrets. In: Lafortune, S., Lin, F., Tilbury, D. (eds.) 8th Workshop on Discrete Event Systems, WODES'06. Ann Arbor, July 2006 (2006)
-
(2006)
8th Workshop on Discrete Event Systems, WODES'06
-
-
Badouel, E.1
Bednarczyk, M.2
Borzyszkowski, A.3
Caillaud, B.4
Darondeau, P.5
-
4
-
-
0025641513
-
A Logic of Communication in a Hostile Environment
-
In: June 1990 IEEE Computer Society Press, New York
-
Bieber, P.: A Logic of Communication in a Hostile Environment. In: Computer Security Foundations Workshop, June 1990, vol. 3, pp. 14-22. IEEE Computer Society Press, New York (1990)
-
(1990)
Computer Security Foundations Workshop
, vol.3
, pp. 14-22
-
-
Bieber, P.1
-
5
-
-
84860453083
-
Modelling dynamic opacity using Petri nets with silent actions
-
In: Kluwer, Dordrecht
-
Bryans, J.W., Koutny, M., Ryan, P.Y.A.: Modelling dynamic opacity using Petri nets with silent actions. In: Proceedings of IFIP TC1 WG1.7 Workshop on Formal Aspects of Security and Trust, pp. 159-172. Kluwer, Dordrecht (2004)
-
(2004)
Proceedings of IFIP TC1 WG1.7 Workshop on Formal Aspects of Security and Trust
, pp. 159-172
-
-
Bryans, J.W.1
Koutny, M.2
Ryan, P.Y.A.3
-
6
-
-
13544267513
-
Modelling opacity using Petri nets
-
Bryans, J.W., Koutny, M., Ryan, P.Y.A.: Modelling opacity using Petri nets. Electron. Notes Theor. Comput. Sci. 121, 101-115 (2005)
-
(2005)
Electron. Notes Theor. Comput. Sci.
, vol.121
, pp. 101-115
-
-
Bryans, J.W.1
Koutny, M.2
Ryan, P.Y.A.3
-
7
-
-
85050550846
-
Abstract interpretation: A unified lattice model for static analysis of programs by construction or approximation of fixpoints
-
In: ACM Press, New York
-
Cousot, P., Cousot, R.: Abstract interpretation: A unified lattice model for static analysis of programs by construction or approximation of fixpoints. In: 4th ACM Symposium on Principles of Programming Languages, pp. 238-252. ACM Press, New York (1977)
-
(1977)
4th ACM Symposium on Principles of Programming Languages
, pp. 238-252
-
-
Cousot, P.1
Cousot, R.2
-
8
-
-
0000963996
-
Abstract interpretation frameworks
-
Cousot P., Cousot R.: Abstract interpretation frameworks. J. Log. Comput. 2(4), 511-547 (1992)
-
(1992)
J. Log. Comput.
, vol.2
, Issue.4
, pp. 511-547
-
-
Cousot, P.1
Cousot, R.2
-
9
-
-
0020720357
-
On the security of public key protocols
-
Dolev D., Yao A.C.: On the security of public key protocols. IEEE Trans. Inf. Theory 29(2), 198-208 (1983)
-
(1983)
IEEE Trans. Inf. Theory
, vol.29
, Issue.2
, pp. 198-208
-
-
Dolev, D.1
Yao, A.C.2
-
11
-
-
54549092090
-
Andrea Maggiolo-Schettini, and Paolo Milazzo. Security in communicating hierarchical transaction-based timed automata
-
In: Warsaw University. ISBN 978-83-88374-28-9
-
Gruska, D.P.: Andrea Maggiolo-Schettini, and Paolo Milazzo. Security in communicating hierarchical transaction-based timed automata. In: Concurrency, Specification and Programming, CS&P'07, pp. 267-278, Warsaw University. ISBN 978-83-88374-28-9 (2007)
-
(2007)
Concurrency, Specification and Programming, CS&P'07
, pp. 267-278
-
-
Gruska, D.P.1
-
13
-
-
0007441079
-
The minimal coverability graph for Petri nets
-
Finkel A.: The minimal coverability graph for Petri nets. Lect. Notes Comput. Sci. 674, 210-243 (1993)
-
(1993)
Lect. Notes Comput. Sci.
, vol.674
, pp. 210-243
-
-
Finkel, A.1
-
15
-
-
84988393004
-
Classification of Security Properties: Information flow
-
In: LNCS
-
Focardi, R., Gorrieri, R.: Classification of Security Properties: Information flow. In: Foundations of Security Analysis and Design. LNCS, vol. 2171, pp. 331-396 (2000)
-
(2000)
Foundations of Security Analysis and Design
, vol.2171
, pp. 331-396
-
-
Focardi, R.1
Gorrieri, R.2
-
16
-
-
35048861845
-
Efficient, verifiable shuffle decryption and its requirement of unlinkability
-
In: Bao, F., Deng, R.H., Zhou, J. (eds.) Springer, Heidelberg
-
Furukawa, J.: Efficient, verifiable shuffle decryption and its requirement of unlinkability. In: Bao, F., Deng, R.H., Zhou, J. (eds.) Public Key Cryptography. Lecture Notes in Computer Science, vol. 2947, pp. 319-332. Springer, Heidelberg (2004)
-
(2004)
Public Key Cryptography. Lecture Notes in Computer Science
, vol.2947
, pp. 319-332
-
-
Furukawa, J.1
-
18
-
-
34548643386
-
Observation based system security
-
Gruska D.P.: Observation based system security. Fundam. Inform. 79 (3-4), 335-346 (2007)
-
(2007)
Fundam. Inform.
, vol.79
, Issue.3-4
, pp. 335-346
-
-
Gruska, D.P.1
-
20
-
-
84956860311
-
Compiling and verifying security protocols
-
Jacquemard, F., Rusinowitch, M., Vigneron, L.: Compiling and verifying security protocols. In: Logic Programming and Automated Reasoning, pp. 131-160 (2000)
-
(2000)
Logic Programming and Automated Reasoning
, pp. 131-160
-
-
Jacquemard, F.1
Rusinowitch, M.2
Vigneron, L.3
-
23
-
-
0024928980
-
A Logic of Knowledge and Belief for Reasoning about Security
-
In: June 1989 IEEE Computer Society Press, New York
-
Moser, L.: A Logic of Knowledge and Belief for Reasoning about Security. In: Computer Security Foundations Workshop, June 1989, vol. 2, pp. 57-63. IEEE Computer Society Press, New York (1989)
-
(1989)
Computer Security Foundations Workshop
, vol.2
, pp. 57-63
-
-
Moser, L.1
-
24
-
-
33646179393
-
Verics 2004: A Model Checker of Real-Time and Multi-agent Systems
-
Nabialek, W., Niewiadomski, A., Penczek, W., Polórla, A., Szreter, M.: Verics 2004: A Model Checker of Real-Time and Multi-agent Systems. In: Concurrency, Specification and Programming, pp. 88-99 (2004)
-
(2004)
Concurrency, Specification and Programming
, pp. 88-99
-
-
Nabialek, W.1
Niewiadomski, A.2
Penczek, W.3
Polórla, A.4
Szreter, M.5
-
25
-
-
0006010789
-
A Calculus of Information Flow
-
O'Halloran, C.: A Calculus of Information Flow. In: ESORICS, pp. 147-159 (1990)
-
(1990)
ESORICS
, pp. 147-159
-
-
O'Halloran, C.1
-
26
-
-
54549122421
-
Structural concepts for trust, contract and security management for a virtual chemical engineering organisation
-
Periorellis, P., Townson, C., English, P.: Structural concepts for trust, contract and security management for a virtual chemical engineering organisation. In: PST 2004, 2004. http://dev.hil.unb.ca/ Texts/PST/
-
(2004)
PST 2004
-
-
Periorellis, P.1
Townson, C.2
English, P.3
-
28
-
-
4544306821
-
-
Technical Report TR-04-01, King's College, London, January
-
Raimondi, F., Lomuscio, A.: Verification of Multiagent Systems via ordered binary decision diagrams: An algorithm and its implementation. Technical Report TR-04-01, King's College, London, January 2004
-
(2004)
Verification of Multiagent Systems Via Ordered Binary Decision Diagrams: An Algorithm and Its Implementation
-
-
Raimondi, F.1
Lomuscio, A.2
-
29
-
-
0003912011
-
-
Reisig, W., Rozenberg, G. (eds.): LNCS 1491 & 1492
-
Reisig, W., Rozenberg, G. (eds.): Lectures on Petri nets. LNCS 1491 & 1492 (1998)
-
(1998)
Lectures on Petri Nets
-
-
|