-
1
-
-
0033353968
-
Towards a completeness result for model checking of security protocols
-
Lowe, G.: Towards a completeness result for model checking of security protocols. Journa of Computer Security 7(2-3), 89-146 (1999)
-
(1999)
Journa of Computer Security
, vol.7
, Issue.2-3
, pp. 89-146
-
-
Lowe, G.1
-
2
-
-
26844508455
-
Automated Verification of Selected Equivalences for Security Protocols
-
Chicago, IL, pp, IEEE Computer Society, Los Alamitos
-
Blanchet, B., Abadi, M., Fournet, C.: Automated Verification of Selected Equivalences for Security Protocols. In: 20th IEEE Symposium on Logic in Computer Science (LICS 2005), Chicago, IL, pp. 331-340. IEEE Computer Society, Los Alamitos (2005)
-
(2005)
20th IEEE Symposium on Logic in Computer Science (LICS
, pp. 331-340
-
-
Blanchet, B.1
Abadi, M.2
Fournet, C.3
-
3
-
-
26844532854
-
On the verification of intransitive noninterference in mulitlevel security
-
Hadj-Alouane, N., Lafrance, S., Lin, F., Mullins, J., Yeddes, M.: On the verification of intransitive noninterference in mulitlevel security. IEEE Transaction On Systems, Man, And Cybernetics-Part B: Cybernetics 35(5), 948-957 (2005)
-
(2005)
IEEE Transaction On Systems, Man, And Cybernetics-Part B: Cybernetics
, vol.35
, Issue.5
, pp. 948-957
-
-
Hadj-Alouane, N.1
Lafrance, S.2
Lin, F.3
Mullins, J.4
Yeddes, M.5
-
4
-
-
84881225236
-
Enforceable security policies
-
Schneider, F.B.: Enforceable security policies. ACM Trans. Inf. Syst. Secur. 3(1), 30-50 (2000)
-
(2000)
ACM Trans. Inf. Syst. Secur
, vol.3
, Issue.1
, pp. 30-50
-
-
Schneider, F.B.1
-
5
-
-
13444275220
-
Edit automata: Enforcement mechanisms for run-time security policies
-
Ligatti, J., Bauer, L., Walker, D.: Edit automata: enforcement mechanisms for run-time security policies. Int. J. Inf. Sec. 4(1-2), 2-16 (2005)
-
(2005)
Int. J. Inf. Sec
, vol.4
, Issue.1-2
, pp. 2-16
-
-
Ligatti, J.1
Bauer, L.2
Walker, D.3
-
6
-
-
33745877300
-
-
Darmaillacq, V., Fernandez, J.C., Groz, R.,Mounier, L., Richier, J.L.: Test generation for network security rules. In: Uyar, M.Ü., Duale, A.Y., Fecko, M.A. (eds.) TestCom 2006. LNCS, 3964, pp. 341-356. Springer, Heidelberg (2006)
-
Darmaillacq, V., Fernandez, J.C., Groz, R.,Mounier, L., Richier, J.L.: Test generation for network security rules. In: Uyar, M.Ü., Duale, A.Y., Fecko, M.A. (eds.) TestCom 2006. LNCS, vol. 3964, pp. 341-356. Springer, Heidelberg (2006)
-
-
-
-
7
-
-
38349070556
-
-
Le Guernic, G.: Information flow testing - the third path towards confidentiality guarantee. In: Cervesato, I. (ed.) ASIAN 2007. LNCS, 4846, pp. 33-47. Springer, Heidelberg (2007)
-
Le Guernic, G.: Information flow testing - the third path towards confidentiality guarantee. In: Cervesato, I. (ed.) ASIAN 2007. LNCS, vol. 4846, pp. 33-47. Springer, Heidelberg (2007)
-
-
-
-
8
-
-
71549148636
-
-
Dubreil, J., Jéron, T., Marchand, H.: Monitoring information flow by diagnosis techniques. Technical Report 1901, IRISA (August 2008)
-
Dubreil, J., Jéron, T., Marchand, H.: Monitoring information flow by diagnosis techniques. Technical Report 1901, IRISA (August 2008)
-
-
-
-
9
-
-
54549090072
-
Opacity generalised to transition systems
-
Bryans, J., Koutny, M., Mazaré, L., Ryan, P.: Opacity generalised to transition systems. International Journal of Information Security 7(6), 421-435 (2008)
-
(2008)
International Journal of Information Security
, vol.7
, Issue.6
, pp. 421-435
-
-
Bryans, J.1
Koutny, M.2
Mazaré, L.3
Ryan, P.4
-
10
-
-
33746373966
-
Preserving secrecy under refinement
-
Bugliesi, M, Preneel, B, Sassone, V, Wegener, I, eds, ICALP 2006, Springer, Heidelberg
-
Alur, R., Černý, P., Zdancewic, S.: Preserving secrecy under refinement. In: Bugliesi, M., Preneel, B., Sassone, V., Wegener, I. (eds.) ICALP 2006. LNCS, vol. 4052, pp. 107-118. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4052
, pp. 107-118
-
-
Alur, R.1
Černý, P.2
Zdancewic, S.3
-
11
-
-
35948973608
-
Concurrent secrets
-
Badouel, E., Bednarczyk, M., Borzyszkowski, A., Caillaud, B., Darondeau, P.: Concurrent secrets. Discrete Event Dynamic Systems 17, 425-446 (2007)
-
(2007)
Discrete Event Dynamic Systems
, vol.17
, pp. 425-446
-
-
Badouel, E.1
Bednarczyk, M.2
Borzyszkowski, A.3
Caillaud, B.4
Darondeau, P.5
-
12
-
-
53149144288
-
Opacity enforcing control synthesis
-
Göteborg, Sweden, May, 2008
-
Dubreil, J., Darondeau, P., Marchand, H.: Opacity enforcing control synthesis. In: Proceedings of the 9th International Workshop on Discrete Event Systems (WODES 2008), Göteborg, Sweden, May 2008, pp. 28-35 (2008)
-
(2008)
Proceedings of the 9th International Workshop on Discrete Event Systems (WODES
, pp. 28-35
-
-
Dubreil, J.1
Darondeau, P.2
Marchand, H.3
-
13
-
-
71549145559
-
Opacity enforcing control synthesis
-
Technical Report 1921, IRISA February
-
Dubreil, J., Darondeau, P., Marchand, H.: Opacity enforcing control synthesis. Technical Report 1921, IRISA (February 2009)
-
(2009)
-
-
Dubreil, J.1
Darondeau, P.2
Marchand, H.3
-
14
-
-
70449682552
-
A formula for the supremal controllable and opaque sublanguage arising in supervisory control
-
Takai, S., Oka, Y.: A formula for the supremal controllable and opaque sublanguage arising in supervisory control. SICE Journal of Control, Measurement, and System Integration 1(4), 307-312 (2008)
-
(2008)
SICE Journal of Control, Measurement, and System Integration
, vol.1
, Issue.4
, pp. 307-312
-
-
Takai, S.1
Oka, Y.2
-
15
-
-
53149128468
-
Fault diagnosis with static or dynamic diagnosers
-
Cassez, F., Tripakis, S.: Fault diagnosis with static or dynamic diagnosers. Fundamenta Informatica 88(4), 497-540 (2008)
-
(2008)
Fundamenta Informatica
, vol.88
, Issue.4
, pp. 497-540
-
-
Cassez, F.1
Tripakis, S.2
-
16
-
-
71549121902
-
Dynamic Observers for the Synthesis of Opaque Systems
-
Technical Report 1930, IRISA May
-
Cassez, F., Dubreil, J., Marchand, H.: Dynamic Observers for the Synthesis of Opaque Systems. Technical Report 1930, IRISA (May 2009)
-
(2009)
-
-
Cassez, F.1
Dubreil, J.2
Marchand, H.3
-
17
-
-
0015773009
-
-
Stockmeyer, L.J., Meyer, A.R.: Word problems requiring exponential time: Preliminary report. In: STOC, pp. 1-9. ACM, New York (1973)
-
Stockmeyer, L.J., Meyer, A.R.: Word problems requiring exponential time: Preliminary report. In: STOC, pp. 1-9. ACM, New York (1973)
-
-
-
-
18
-
-
37149023024
-
Model checking on trees with path equivalences
-
Grumberg, O, Huth,M, eds, TACAS 2007, Springer, Heidelberg
-
Alur, R., Cerný, P., Chaudhuri, S.:Model checking on trees with path equivalences. In: Grumberg, O., Huth,M. (eds.) TACAS 2007. LNCS, vol. 4424, pp. 664-678. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4424
, pp. 664-678
-
-
Alur, R.1
Cerný, P.2
Chaudhuri, S.3
-
19
-
-
0001434559
-
Borel determinacy
-
Martin, D.A.: Borel determinacy. Annals of Mathematics 102(2), 363-371 (1975)
-
(1975)
Annals of Mathematics
, vol.102
, Issue.2
, pp. 363-371
-
-
Martin, D.A.1
-
20
-
-
38149135474
-
On the synthesis of strategies in infinite games
-
Mayr, E.W, Puech, C, eds, STACS 1995, Springer, Heidelberg , Invited talk
-
Thomas,W.: On the synthesis of strategies in infinite games. In:Mayr, E.W., Puech, C. (eds.) STACS 1995. LNCS, vol. 900, pp. 1-13. Springer, Heidelberg (1995), Invited talk
-
(1995)
LNCS
, vol.900
, pp. 1-13
-
-
Thomas, W.1
-
21
-
-
0001391363
-
A characterization of the minimum mean cycle in a digraph
-
Karp, R.: A characterization of the minimum mean cycle in a digraph. Discrete Mathematics 23, 309-311 (1978)
-
(1978)
Discrete Mathematics
, vol.23
, pp. 309-311
-
-
Karp, R.1
-
22
-
-
0030143640
-
The complexity of mean payoff games on graphs
-
Zwick, U., Paterson, M.: The complexity of mean payoff games on graphs. Theoretical Computer Science 158(1-2), 343-359 (1996)
-
(1996)
Theoretical Computer Science
, vol.158
, Issue.1-2
, pp. 343-359
-
-
Zwick, U.1
Paterson, M.2
|