-
1
-
-
33746373966
-
Preserving secrecy under refinement
-
Bugliesi, M, Preneel, B, Sassone, V, Wegener, I, eds, ICALP 2006, Springer, Heidelberg
-
Alur, R., Černý, P., Zdancewic, S.: Preserving secrecy under refinement. In: Bugliesi, M., Preneel, B., Sassone, V., Wegener, I. (eds.) ICALP 2006. LNCS, vol. 4052, pp. 107-118. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4052
, pp. 107-118
-
-
Alur, R.1
Černý, P.2
Zdancewic, S.3
-
2
-
-
35948973608
-
Concurrent secrets
-
Badouel, E., Bednarczyk, M., Borzyszkowski, A., Caillaud, B., Darondeau, P.: Concurrent secrets. Discrete Event Dynamic Systems 17, 425-446 (2007)
-
(2007)
Discrete Event Dynamic Systems
, vol.17
, pp. 425-446
-
-
Badouel, E.1
Bednarczyk, M.2
Borzyszkowski, A.3
Caillaud, B.4
Darondeau, P.5
-
4
-
-
26844508455
-
Automated Verification of Selected Equivalences for Security Protocols
-
Chicago, IL, June, 2005
-
Blanchet, B., Abadi, M., Fournet, C.: Automated Verification of Selected Equivalences for Security Protocols. In: 20th IEEE Symposium on Logic in Computer Science (LICS 2005), Chicago, IL, June 2005, pp. 331-340 (2005)
-
(2005)
20th IEEE Symposium on Logic in Computer Science (LICS
, pp. 331-340
-
-
Blanchet, B.1
Abadi, M.2
Fournet, C.3
-
5
-
-
54549090072
-
Opacity generalised to transition systems
-
Bryans, J.W., Koutny, M., Mazaré, L., Ryan, P.: Opacity generalised to transition systems. International Journal of Information Security 7(6), 421-435 (2008)
-
(2008)
International Journal of Information Security
, vol.7
, Issue.6
, pp. 421-435
-
-
Bryans, J.W.1
Koutny, M.2
Mazaré, L.3
Ryan, P.4
-
7
-
-
34547091940
-
Integrating formal verification and conformance testing for reactive systems
-
Constant, C., Jéron, T., Marchand, H., Rusu, V.: Integrating formal verification and conformance testing for reactive systems. IEEE Transactions on Software Engineering 33(8), 558-574 (2007)
-
(2007)
IEEE Transactions on Software Engineering
, vol.33
, Issue.8
, pp. 558-574
-
-
Constant, C.1
Jéron, T.2
Marchand, H.3
Rusu, V.4
-
8
-
-
33745877300
-
-
Darmaillacq, V., Fernandez, J.-C., Groz, R., Mounier, L., Richier, J.-L.: Test generation for network security rules. In: Uyar, M.Ü., Duale, A.Y., Fecko, M.A. (eds.) TestCom 2006. LNCS, 3964, pp. 341-356. Springer, Heidelberg (2006)
-
Darmaillacq, V., Fernandez, J.-C., Groz, R., Mounier, L., Richier, J.-L.: Test generation for network security rules. In: Uyar, M.Ü., Duale, A.Y., Fecko, M.A. (eds.) TestCom 2006. LNCS, vol. 3964, pp. 341-356. Springer, Heidelberg (2006)
-
-
-
-
9
-
-
53149144288
-
Opacity enforcing control synthesis
-
Gothenburg, Sweden
-
Dubreil, J., Darondeau, Ph., Marchand, H.: Opacity enforcing control synthesis. In: Workshop on Discrete Event Systems, WODES 2008, Gothenburg, Sweden (2008)
-
(2008)
Workshop on Discrete Event Systems, WODES
-
-
Dubreil, J.1
Darondeau, P.2
Marchand, H.3
-
10
-
-
70549100256
-
Supervisory control for opacity
-
Technical Report 1921, IRISA February
-
Dubreil, J., Darondeau, Ph., Marchand, H.: Supervisory control for opacity. Technical Report 1921, IRISA (February 2009)
-
(2009)
-
-
Dubreil, J.1
Darondeau, P.2
Marchand, H.3
-
13
-
-
0033353968
-
Towards a completeness result for model checking of security protocols
-
Lowe, G.: Towards a completeness result for model checking of security protocols. Journal of Computer Security 7(2-3), 89-146 (1999)
-
(1999)
Journal of Computer Security
, vol.7
, Issue.2-3
, pp. 89-146
-
-
Lowe, G.1
-
14
-
-
84881225236
-
Enforceable security policies
-
Schneider, F.B.: Enforceable security policies. ACM Trans. Inf. Syst. Secur. 3(1), 30-50 (2000)
-
(2000)
ACM Trans. Inf. Syst. Secur
, vol.3
, Issue.1
, pp. 30-50
-
-
Schneider, F.B.1
-
15
-
-
84888268734
-
Testing concurrent systems: A formal approach
-
Baeten, J.C.M, Mauw, S, eds, CONCUR 1999, Springer, Heidelberg
-
Tretmans, J.: Testing concurrent systems: A formal approach. In: Baeten, J.C.M., Mauw, S. (eds.) CONCUR 1999. LNCS, vol. 1664, pp. 46-65. Springer, Heidelberg (1999)
-
(1999)
LNCS
, vol.1664
, pp. 46-65
-
-
Tretmans, J.1
|