-
1
-
-
0026154452
-
The existence of refinement mappings
-
M. Abadi and L. Lamport, The existence of refinement mappings, Theoretical Computer Science 82(2) (1991), 253-284.
-
(1991)
Theoretical Computer Science
, vol.82
, Issue.2
, pp. 253-284
-
-
Abadi, M.1
Lamport, L.2
-
3
-
-
33646723032
-
Quantified interference: Information theory and information flow
-
Barcelona, Spain, April
-
D. Clark, S. Hunt and P. Malacaria, Quantified interference: Information theory and information flow, in: Workshop on Issues in the Theory of Security, Barcelona, Spain, April 2004.
-
(2004)
Workshop on Issues in the Theory of Security
-
-
Clark, D.1
Hunt, S.2
Malacaria, P.3
-
5
-
-
20844445346
-
Quantitative information flow, relations and polymorphic types
-
D. Clark, S. Hunt and P. Malacaria, Quantitative information flow, relations and polymorphic types, Journal of Logic and Computation 18(2) (2005), 181-199.
-
(2005)
Journal of Logic and Computation
, vol.18
, Issue.2
, pp. 181-199
-
-
Clark, D.1
Hunt, S.2
Malacaria, P.3
-
6
-
-
28144442041
-
Belief in information flow
-
Aix-en-Provence, France, June
-
M.R. Clarkson, A.C. Myers and F.B. Schneider, Belief in information flow, in Proc. 18th IEEE Computer Security Foundations Workshop, Aix-en-Provence, France, June 2005, pp. 31-45.
-
(2005)
Proc. 18th IEEE Computer Security Foundations Workshop
, pp. 31-45
-
-
Clarkson, M.R.1
Myers, A.C.2
Schneider, F.B.3
-
9
-
-
0344875573
-
Approximate non-interference
-
A. Di Pierro, C. Hankin and H. Wiklicky, Approximate non-interference, Journal of Computer Security 12(1) (2004), 37-81.
-
(2004)
Journal of Computer Security
, vol.12
, Issue.1
, pp. 37-81
-
-
Di Pierro, A.1
Hankin, C.2
Wiklicky, H.3
-
10
-
-
18544383932
-
Measuring the confinement of probabilistic systems
-
A. Di Pierro, C. Hankin and H. Wiklicky, Measuring the confinement of probabilistic systems, Theoretical Computer Science 340(1) (2005), 53-56.
-
(2005)
Theoretical Computer Science
, vol.340
, Issue.1
, pp. 53-56
-
-
Di Pierro, A.1
Hankin, C.2
Wiklicky, H.3
-
11
-
-
1142263341
-
Limiting privacy breaches in privacy preserving data mining
-
San Diego, CA
-
A. Evfimievski, J. Gehrke and R. Srikant, Limiting privacy breaches in privacy preserving data mining, in: Proc. ACM Symp. on Principles of Database Systems, San Diego, CA, 2003, pp. 211- 222.
-
(2003)
Proc. ACM Symp. on Principles of Database Systems
, pp. 211-222
-
-
Evfimievski, A.1
Gehrke, J.2
Srikant, R.3
-
12
-
-
0004012196
-
-
Chapman and Hall/CRC, Boca Raton, FL
-
A. Gelman, J.B. Carlin, H.S. Stern and D.B. Rubin, Bayesian Data Analysis, Chapman and Hall/CRC, Boca Raton, FL, 2004.
-
(2004)
Bayesian Data Analysis
-
-
Gelman, A.1
Carlin, J.B.2
Stern, H.S.3
Rubin, D.B.4
-
13
-
-
0020299523
-
Security policies and security models
-
Oakland, CA, April
-
J.A. Goguen and J. Meseguer, Security policies and security models, in: Proc. IEEE Symp. on Security and Privacy, Oakland, CA, April 1982, pp. 11-20.
-
(1982)
Proc. IEEE Symp. on Security and Privacy
, pp. 11-20
-
-
Goguen, J.A.1
Meseguer, J.2
-
15
-
-
0032047481
-
A logical approach to multilevel security of probabilistic systems
-
J.W. Gray III and P.F. Syverson, A logical approach to multilevel security of probabilistic systems, Distributed Computing 11(2) (1998), 73-90.
-
(1998)
Distributed Computing
, vol.11
, Issue.2
, pp. 73-90
-
-
Gray Iii, J.W.1
Syverson, P.F.2
-
16
-
-
84948775046
-
Secrecy in multiagent systems
-
Cape Breton, NS, Canada
-
J. Halpern and K. O'Neill, Secrecy in multiagent systems, in: Proceedings of the 15th IEEE Computer Security Foundations Workshop, Cape Breton, NS, Canada, 2002, pp. 32-46.
-
(2002)
Proceedings of the 15th IEEE Computer Security Foundations Workshop
, pp. 32-46
-
-
Halpern, J.1
O'Neill, K.2
-
17
-
-
33646018220
-
Anonymity and information hiding inmultiagent systems
-
Pacific Grove, CA
-
J. Halpern and K. O'Neill, Anonymity and information hiding inmultiagent systems, in: Proceedings of the 16th IEEE Computer Security Foundations Workshop, Pacific Grove, CA, 2003, pp. 75-88.
-
(2003)
Proceedings of the 16th IEEE Computer Security Foundations Workshop
, pp. 75-88
-
-
Halpern, J.1
O'Neill, K.2
-
19
-
-
0027665952
-
Knowledge, probability, and adversaries
-
J.Y. Halpern and M.R. Tuttle, Knowledge, probability, and adversaries, Journal of the ACM 40(4) (1993), 917-962.
-
(1993)
Journal of the ACM
, vol.40
, Issue.4
, pp. 917-962
-
-
Halpern, J.Y.1
Tuttle, M.R.2
-
21
-
-
49649138413
-
Subjective probability: A judgment of representativeness
-
D. Kahneman and A. Tversky, Subjective probability: A judgment of representativeness, Cognitive Psychology 3 (1972), 430-454.
-
(1972)
Cognitive Psychology
, vol.3
, pp. 430-454
-
-
Kahneman, D.1
Tversky, A.2
-
22
-
-
0029969593
-
The base rate fallacy reconsidered: Descriptive, normative, and methodological challenges
-
J.J. Koehler, The base rate fallacy reconsidered: Descriptive, normative, and methodological challenges, Behavioral and Brain Sciences 19(1) (1996), 51-53.
-
(1996)
Behavioral and Brain Sciences
, vol.19
, Issue.1
, pp. 51-53
-
-
Koehler, J.J.1
-
24
-
-
84948775168
-
Quantifying information flow
-
Cape Breton, NS, Canada
-
G. Lowe, Quantifying information flow, in: Proceedings of the 15th IEEE Computer Security Foundations Workshop, Cape Breton, NS, Canada, 2002, pp. 18-31.
-
(2002)
Proceedings of the 15th IEEE Computer Security Foundations Workshop
, pp. 18-31
-
-
Lowe, G.1
-
27
-
-
11344255900
-
A probabilistic approach to information hiding
-
Chapter 20, Springer, New York, NY
-
A. McIver and C. Morgan, A probabilistic approach to information hiding, in: Programming Methodology, Chapter 20, Springer, New York, NY, 2003, pp. 441-460.
-
(2003)
Programming Methodology
, pp. 441-460
-
-
McIver, A.1
Morgan, C.2
-
28
-
-
22144496087
-
-
Springer, New York, NY
-
A. McIver and C. Morgan, Abstraction, Refinement and Proof for Probabilistic Systems, Springer, New York, NY, 2004.
-
(2004)
Abstraction Refinement and Proof for Probabilistic Systems
-
-
McIver, A.1
Morgan, C.2
-
30
-
-
84974747891
-
Proving noninterference and functional correctness using traces
-
J. McLean, Proving noninterference and functional correctness using traces, Journal of Computer Security 1(1) (1992), 37-57.
-
(1992)
Journal of Computer Security
, vol.1
, Issue.1
, pp. 37-57
-
-
McLean, J.1
-
32
-
-
0011603942
-
-
PhD thesis, Stanford University, 1979; available as technical report, XEROX PARC
-
L.H. Ramshaw, Formalizing the analysis of algorithms, PhD thesis, Stanford University, 1979; available as technical report, XEROX PARC, 1981.
-
(1981)
Formalizing the Analysis of Algorithms
-
-
Ramshaw, L.H.1
-
33
-
-
0029232082
-
CSP and determinism in security modeling
-
Oakland, CA
-
A.W. Roscoe, CSP and determinism in security modelling, in: Proc. IEEE Symp. on Security and Privacy, Oakland, CA, 1995, pp. 114-127.
-
(1995)
Proc. IEEE Symp. on Security and Privacy
, pp. 114-127
-
-
Roscoe, A.W.1
-
34
-
-
0038118932
-
A model of information
-
Washington, DC, September
-
D. Sutherland, A model of information, in: Proceedings of the 9th National Computer Security Conference, Washington, DC, September 1986, pp. 175-183.
-
(1986)
Proceedings of the 9th National Computer Security Conference
, pp. 175-183
-
-
Sutherland, D.1
-
36
-
-
0001909368
-
Confinement properties for programming languages
-
D. Volpano and G. Smith, Confinement properties for programming languages, SIGACT News 29(3) (1998), 33-42.
-
(1998)
SIGACT News
, vol.29
, Issue.3
, pp. 33-42
-
-
Volpano, D.1
Smith, G.2
-
40
-
-
0025135716
-
Information flow in nondeterministic systems
-
Oakland, CA
-
J.T. Wittbold and D. Johnson, Information flow in nondeterministic systems, in: Proceedings of the 1990 IEEE Symposium on Security and Privacy, Oakland, CA, 1990, pp. 144-161.
-
(1990)
Proceedings of the 1990 IEEE Symposium on Security and Privacy
, pp. 144-161
-
-
Wittbold, J.T.1
Johnson, D.2
-
41
-
-
84942242915
-
Observational determinism for concurrent program security
-
Pacific Grove, CA
-
S. Zdancewic and A.C. Myers, Observational determinism for concurrent program security, in: Proceedings of the 16th IEEE Computer Security Foundations Workshop, Pacific Grove, CA, 2003, pp. 29-43.
-
(2003)
Proceedings of the 16th IEEE Computer Security Foundations Workshop
, pp. 29-43
-
-
Zdancewic, S.1
Myers, A.C.2
|