-
1
-
-
33746064873
-
The Shadow Knows: Refinement of ignorance in sequential programs
-
Proc. of 8th Int. Conf. on Mathematics of Program Construction. Uustalu T. (Ed). MPC 2006, Kuressaare, July 2006, Springer, Berlin
-
Morgan C. The Shadow Knows: Refinement of ignorance in sequential programs. In: Uustalu T. (Ed). Proc. of 8th Int. Conf. on Mathematics of Program Construction. MPC 2006, Kuressaare, July 2006. Lect. Notes in Comput. Sci. vol. 4014 (2006), Springer, Berlin 359-378
-
(2006)
Lect. Notes in Comput. Sci.
, vol.4014
, pp. 359-378
-
-
Morgan, C.1
-
2
-
-
84976773567
-
Program development by stepwise refinement
-
Wirth N. Program development by stepwise refinement. Commun. ACM 14 4 (1971) 221-227
-
(1971)
Commun. ACM
, vol.14
, Issue.4
, pp. 221-227
-
-
Wirth, N.1
-
3
-
-
0038610515
-
On the correctness of refinement steps in program development
-
Report A-1978-4, Dept. of Comput. Sci, Univ. of Helsinki
-
R.-J. Back, On the correctness of refinement steps in program development, Report A-1978-4, Dept. of Comput. Sci., Univ. of Helsinki, 1978
-
(1978)
-
-
Back, R.-J.1
-
4
-
-
84945708698
-
An axiomatic basis for computer programming
-
583
-
Hoare C.A.R. An axiomatic basis for computer programming. Commun. ACM 12 10 (1969) 576-580 583
-
(1969)
Commun. ACM
, vol.12
, Issue.10
, pp. 576-580
-
-
Hoare, C.A.R.1
-
6
-
-
0003648103
-
-
Prentice Hall, New York URL: http://web.comlab.ox.ac.uk/oucl/publications/books/PfS/
-
Morgan C. Programming from Specifications. 2nd ed. Prentice Hall Int. Series in Comput. Sci. (1994), Prentice Hall, New York. http://web.comlab.ox.ac.uk/oucl/publications/books/PfS/ URL: http://web.comlab.ox.ac.uk/oucl/publications/books/PfS/
-
(1994)
Prentice Hall Int. Series in Comput. Sci.
-
-
Morgan, C.1
-
9
-
-
0023834494
-
Security specifications
-
S& P '88, Oakland, CA, 1988, IEEE CS Press, Los Alamitos, CA
-
Jacob J. Security specifications. Proc. of 1988 IEEE Symp. on Security and Privacy. S& P '88, Oakland, CA, 1988 (1988), IEEE CS Press, Los Alamitos, CA 14-23
-
(1988)
Proc. of 1988 IEEE Symp. on Security and Privacy
, pp. 14-23
-
-
Jacob, J.1
-
11
-
-
84948775046
-
Secrecy in multiagent systems
-
CSFW 2002 Cape Breton, NS, June 2002, IEEE CS Press, Los Alamitos, CA
-
Halpern J., and O'Neill K. Secrecy in multiagent systems. Proc. of 15th IEEE Computer Security Foundations Wksh. CSFW 2002 Cape Breton, NS, June 2002 (2002), IEEE CS Press, Los Alamitos, CA 32-46
-
(2002)
Proc. of 15th IEEE Computer Security Foundations Wksh
, pp. 32-46
-
-
Halpern, J.1
O'Neill, K.2
-
12
-
-
0003744223
-
-
Cornell University Press, Ithaca, NY New edition prepared by V. F. Hendricks and J. Symons (King's College London Publications, London, 2005)
-
Hintikka J. Knowledge and Belief: An Introduction to the Logic of the Two Notions (1962), Cornell University Press, Ithaca, NY New edition prepared by V. F. Hendricks and J. Symons (King's College London Publications, London, 2005)
-
(1962)
Knowledge and Belief: An Introduction to the Logic of the Two Notions
-
-
Hintikka, J.1
-
13
-
-
0025460546
-
Knowledge and common knowledge in a distributed environment
-
Halpern J.Y., and Moses Y. Knowledge and common knowledge in a distributed environment. J. ACM 37 3 (1990) 549-587
-
(1990)
J. ACM
, vol.37
, Issue.3
, pp. 549-587
-
-
Halpern, J.Y.1
Moses, Y.2
-
14
-
-
0003730235
-
-
MIT Press, Cambridge, MA
-
Fagin R., Halpern J., Moses Y., and Vardi M. Reasoning about Knowledge (1995), MIT Press, Cambridge, MA
-
(1995)
Reasoning about Knowledge
-
-
Fagin, R.1
Halpern, J.2
Moses, Y.3
Vardi, M.4
-
16
-
-
67349180613
-
-
Unpublished notes, URL
-
C. Morgan, Unpublished notes "060320 atomicity", 2006, URL: http://www.cse.unsw.edu.au/~carrollm/Notes/
-
(2006)
060320 atomicity
-
-
Morgan, C.1
-
17
-
-
0023861309
-
The dining cryptographers problem: Unconditional sender and recipient untraceability
-
Chaum D. The dining cryptographers problem: Unconditional sender and recipient untraceability. J. Cryptol. 1 1 (1988) 65-75
-
(1988)
J. Cryptol.
, vol.1
, Issue.1
, pp. 65-75
-
-
Chaum, D.1
-
18
-
-
0034836335
-
Preserving information flow properties under refinement
-
S& P 2001, Oakland, CA, May 2001, IEEE CS Press, Los Alamitos, CA
-
Mantel H. Preserving information flow properties under refinement. Proc. of 2001 IEEE Symp. Security and Privacy. S& P 2001, Oakland, CA, May 2001 (2001), IEEE CS Press, Los Alamitos, CA 78-91
-
(2001)
Proc. of 2001 IEEE Symp. Security and Privacy
, pp. 78-91
-
-
Mantel, H.1
-
19
-
-
34548402917
-
-
Univ. of New South Wales, Sydney
-
K. Engelhardt, Y. Moses, R. van der Meyden, Unpublished report, Univ. of New South Wales, Sydney, 2005
-
(2005)
Unpublished report
-
-
Engelhardt, K.1
Moses, Y.2
van der Meyden, R.3
-
20
-
-
33646018220
-
Anonymity and information hiding in multiagent systems
-
CSFW 2003, Pacific Grove, CA, June/July 2003, IEEE CS Press, Los Alamitos, CA
-
Halpern J., and O'Neill K. Anonymity and information hiding in multiagent systems. Proc. of 16th IEEE Computer Security Foundations Wksh. CSFW 2003, Pacific Grove, CA, June/July 2003 (2003), IEEE CS Press, Los Alamitos, CA 75-88
-
(2003)
Proc. of 16th IEEE Computer Security Foundations Wksh
, pp. 75-88
-
-
Halpern, J.1
O'Neill, K.2
-
21
-
-
0021177508
-
Unwinding and inference control
-
S& P '84, Oakland, CA, Apr. 1984, IEEE CS Press, Washington, CA
-
Goguen J., and Meseguer J. Unwinding and inference control. Proc. of 1984 IEEE Symp. on Security and Privacy. S& P '84, Oakland, CA, Apr. 1984 (1984), IEEE CS Press, Washington, CA 75-86
-
(1984)
Proc. of 1984 IEEE Symp. on Security and Privacy
, pp. 75-86
-
-
Goguen, J.1
Meseguer, J.2
-
22
-
-
84976675687
-
Information transmission in sequential programs
-
Cohen E. Information transmission in sequential programs. ACM SIGOPS Operating Syst. Rev. 11 5 (1977) 133-139
-
(1977)
ACM SIGOPS Operating Syst. Rev.
, vol.11
, Issue.5
, pp. 133-139
-
-
Cohen, E.1
-
23
-
-
0037251378
-
Language-based information-flow security
-
Sabelfeld A., and Myers A. Language-based information-flow security. IEEE J. Sel. Areas Commun. 21 1 (2003) 5-19
-
(2003)
IEEE J. Sel. Areas Commun.
, vol.21
, Issue.1
, pp. 5-19
-
-
Sabelfeld, A.1
Myers, A.2
-
24
-
-
0033751850
-
A semantic approach to secure information flow
-
Leino K., and Joshi R. A semantic approach to secure information flow. Sci. Comput. Programming 37 1-3 (2000) 113-138
-
(2000)
Sci. Comput. Programming
, vol.37
, Issue.1-3
, pp. 113-138
-
-
Leino, K.1
Joshi, R.2
-
26
-
-
35048828759
-
A model for delimited information release
-
Revised Papers from Mext-NSF-JSPS Int. Symp. on Software Security: Theories and Systems, 2003, Tokyo, Nov. 2003. Futatsugi K., Mizoguchi F., and Yonezaki N. (Eds), Springer, Berlin
-
Sabelfeld A., and Myers A. A model for delimited information release. In: Futatsugi K., Mizoguchi F., and Yonezaki N. (Eds). Revised Papers from Mext-NSF-JSPS Int. Symp. on Software Security: Theories and Systems, 2003, Tokyo, Nov. 2003. Lect. Notes in Comput. Sci. vol. 3233 (2004), Springer, Berlin 174-191
-
(2004)
Lect. Notes in Comput. Sci.
, vol.3233
, pp. 174-191
-
-
Sabelfeld, A.1
Myers, A.2
-
28
-
-
0033701251
-
Possibilistic definitions of security-an assembly kit
-
CSFW 2000, Cambridge, July 2000, IEEE CS Press, Los Alamitos, CA
-
Mantel H. Possibilistic definitions of security-an assembly kit. Proc. of 13th IEEE Computer Security Foundations Wksh. CSFW 2000, Cambridge, July 2000 (2000), IEEE CS Press, Los Alamitos, CA 185-199
-
(2000)
Proc. of 13th IEEE Computer Security Foundations Wksh
, pp. 185-199
-
-
Mantel, H.1
-
29
-
-
84855661226
-
Refinement operators and information flow security
-
SEFM 2003, IEEE CS Press, Los Alamitos, CA
-
Bossi A., Focardi R., Piazza C., and Rossi S. Refinement operators and information flow security. Proc. of 1st Int. Conf. on Software Engineering and Formal Methods. SEFM 2003 (2003), IEEE CS Press, Los Alamitos, CA 44-53
-
(2003)
Proc. of 1st Int. Conf. on Software Engineering and Formal Methods
, pp. 44-53
-
-
Bossi, A.1
Focardi, R.2
Piazza, C.3
Rossi, S.4
-
30
-
-
43049170808
-
-
Springer, New York URL: http://www.cse.unsw.edu.au/~carrollm/arp/
-
McIver A., and Morgan C. Abstraction, Refinement and Proof for Probabilistic Systems. Technical Monographs in Computer Science (2005), Springer, New York. http://www.cse.unsw.edu.au/~carrollm/arp/ URL: http://www.cse.unsw.edu.au/~carrollm/arp/
-
(2005)
Technical Monographs in Computer Science
-
-
McIver, A.1
Morgan, C.2
-
31
-
-
0020978071
-
Decentralisation of process nets with centralised control
-
PODC '83, Montreal, Aug. 1983, ACM Press, New York
-
Back R.-J., and Kurki-Suonio R. Decentralisation of process nets with centralised control. Proc. of 2nd Ann. ACM SIGACT-SIGOPS Symp. on Principles of Distributed Computing. PODC '83, Montreal, Aug. 1983 (1983), ACM Press, New York 131-142
-
(1983)
Proc. of 2nd Ann. ACM SIGACT-SIGOPS Symp. on Principles of Distributed Computing
, pp. 131-142
-
-
Back, R.-J.1
Kurki-Suonio, R.2
|