-
1
-
-
33748744443
-
Classification of security properties in a Linda-like process algebra
-
Aldini, A.: Classification of security properties in a Linda-like process algebra. J. of Science of Computer Programming 63, 16-38 (2006)
-
(2006)
J. of Science of Computer Programming
, vol.63
, pp. 16-38
-
-
Aldini, A.1
-
2
-
-
34447102446
-
-
Aldini, A., Bernardo, M.: A formal approach to the integrated analysis of security and QoS. J. of Reliability Engineering & System Safety 92, 1503-1520 (2007)
-
Aldini, A., Bernardo, M.: A formal approach to the integrated analysis of security and QoS. J. of Reliability Engineering & System Safety 92, 1503-1520 (2007)
-
-
-
-
3
-
-
3042529082
-
A process-algebraic approach for the analysis of probabilistic noninterference
-
Aldini, A., Bravetti, M., Gorrieri, R.: A process-algebraic approach for the analysis of probabilistic noninterference. J. of Computer Security 12, 191-245 (2004)
-
(2004)
J. of Computer Security
, vol.12
, pp. 191-245
-
-
Aldini, A.1
Bravetti, M.2
Gorrieri, R.3
-
4
-
-
21144453684
-
Two formal approaches for approximating noninterference properties
-
Focardi, R, Gorrieri, R, eds, FOSAD 2001, Springer, Heidelberg
-
Aldini, A., Bravetti, M., Di Pierro, A., Gorrieri, R., Hankin, C., Wiklicky, H.: Two formal approaches for approximating noninterference properties. In: Focardi, R., Gorrieri, R. (eds.) FOSAD 2001. LNCS, vol. 2946, pp. 1-43. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.2946
, pp. 1-43
-
-
Aldini, A.1
Bravetti, M.2
Di Pierro, A.3
Gorrieri, R.4
Hankin, C.5
Wiklicky, H.6
-
5
-
-
70349343181
-
Weak Markovian bisimilarity: Abstracting from prioritized/ weighted internal immediate actions
-
World Scientific, Singapore
-
Bernardo, M., Aldini, A.: Weak Markovian bisimilarity: abstracting from prioritized/ weighted internal immediate actions. In: 10th Italian Conf. on Theoretical Computer Science, pp. 39-56. World Scientific, Singapore (2007)
-
(2007)
10th Italian Conf. on Theoretical Computer Science
, pp. 39-56
-
-
Bernardo, M.1
Aldini, A.2
-
6
-
-
0037209771
-
Discrete time generative-reactive probabilistic processes with different advancing speeds
-
Bravetti, M., Aldini, A.: Discrete time generative-reactive probabilistic processes with different advancing speeds. Theoretical Comp. Science 290, 355-406 (2003)
-
(2003)
Theoretical Comp. Science
, vol.290
, pp. 355-406
-
-
Bravetti, M.1
Aldini, A.2
-
7
-
-
57049127668
-
Quantifying timing leaks and cost optimisation
-
Chen, L, Ryan, M.D, Wang, G, eds, ICICS 2008, Springer, Heidelberg
-
Di Pierro, A., Wiklicky, H.: Quantifying timing leaks and cost optimisation. In: Chen, L., Ryan, M.D., Wang, G. (eds.) ICICS 2008. LNCS, vol. 5308, pp. 81-96. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5308
, pp. 81-96
-
-
Di Pierro, A.1
Wiklicky, H.2
-
8
-
-
0033725594
-
Information flow analysis in a discrete-time process algebra
-
Focardi, R., Martinelli, F., Gorrieri, R.: Information flow analysis in a discrete-time process algebra. In: IEEE Computer Security Foundations Workshop, pp. 170-184 (2000)
-
(2000)
IEEE Computer Security Foundations Workshop
, pp. 170-184
-
-
Focardi, R.1
Martinelli, F.2
Gorrieri, R.3
-
10
-
-
0006419926
-
Reactive, generative and stratified models of probabilistic processes
-
van Glabbeek, R.J., Smolka, S.A., Steffen, B.: Reactive, generative and stratified models of probabilistic processes. Information and Comput. 121, 59-80 (1995)
-
(1995)
Information and Comput
, vol.121
, pp. 59-80
-
-
van Glabbeek, R.J.1
Smolka, S.A.2
Steffen, B.3
-
12
-
-
33646418700
-
A classification of time and/or probability dependent security properties
-
Lanotte, R., Maggiolo-Schettini, A., Troina, A.: A classification of time and/or probability dependent security properties. In: 3rd Int. Workshop on Quantitative Aspects of Programming Languages. ENTCS, vol. 153, pp. 177-193 (2005)
-
(2005)
3rd Int. Workshop on Quantitative Aspects of Programming Languages. ENTCS
, vol.153
, pp. 177-193
-
-
Lanotte, R.1
Maggiolo-Schettini, A.2
Troina, A.3
-
13
-
-
35048834771
-
Comparing countermeasures against interrupt-related covert channels in an information-theoretic framework
-
Mantel, H., Sudbrock, H.: Comparing countermeasures against interrupt-related covert channels in an information-theoretic framework. In: IEEE Computer Security Foundations Symposium, pp. 326-340 (2007)
-
(2007)
IEEE Computer Security Foundations Symposium
, pp. 326-340
-
-
Mantel, H.1
Sudbrock, H.2
-
19
-
-
18544362925
-
Probabilistic noninterference through weak probabilistic bisimulation
-
Smith, G.: Probabilistic noninterference through weak probabilistic bisimulation. In: IEEE Computer Security Foundations Workshop, pp. 3-13 (2003)
-
(2003)
IEEE Computer Security Foundations Workshop
, pp. 3-13
-
-
Smith, G.1
|