-
1
-
-
0033353968
-
Towards a completeness result for model checking of security protocols
-
G. Lowe, "Towards a completeness result for model checking of security protocols," J. Comput. Security, vol.7, no.2-3, pp. 89-146, 1999
-
(1999)
J. Comput. Security
, vol.7
, Issue.2-3
, pp. 89-146
-
-
Lowe, G.1
-
2
-
-
26844508455
-
Automated verification of selected equivalences for security protocols
-
Chicago, IL Jun.
-
B. Blanchet, M. Abadi, and C. Fournet, "Automated verification of selected equivalences for security protocols," in Proc. 20th IEEE Symp. Logic Comput. Sci. (LICS'05), Chicago, IL, Jun. 2005, pp. 331-340.
-
(2005)
Proc. 20th IEEE Symp. Logic Comput. Sci. (LICS'05)
, pp. 331-340
-
-
Blanchet, B.1
Abadi, M.2
Fournet, C.3
-
3
-
-
26844532854
-
On the verification of intransitive noninterference in mulitlevel security
-
Oct.
-
N. Hadj-Alouane, S. Lafrance, F. Lin, J. Mullins, and M. Yeddes, "On the verification of intransitive noninterference in mulitlevel security," IEEE Trans. Syst., Man, Cybern. B, vol.35, no.5, pp. 948-957, Oct. 2005.
-
(2005)
IEEE Trans. Syst., Man, Cybern. B
, vol.35
, Issue.5
, pp. 948-957
-
-
Hadj-Alouane, N.1
Lafrance, S.2
Lin, F.3
Mullins, J.4
Yeddes, M.5
-
4
-
-
84881225236
-
Enforceable security policies
-
F. B. Schneider, "Enforceable security policies," ACM Trans. Inf. Syst. Secur., vol.3, no.1, pp. 30-50, 2000.
-
(2000)
ACM Trans. Inf. Syst. Secur.
, vol.3
, Issue.1
, pp. 30-50
-
-
Schneider, F.B.1
-
5
-
-
13444275220
-
Edit automata: Enforcement mechanisms for run-time security policies
-
J. Ligatti, L. Bauer, and D.Walker, "Edit automata: Enforcement mechanisms for run-time security policies," Int. J. Inf. Sec., vol.4, no.1-2, pp. 2-16, 2005.
-
(2005)
Int. J. Inf. Sec.
, vol.4
, Issue.1-2
, pp. 2-16
-
-
Ligatti, J.1
Bauer, L.2
Walker, D.3
-
6
-
-
33745877300
-
Test generation for network security rules
-
V. Darmaillacq, J.-C. Fernandez, R. Groz, L. Mounier, and J.-L. Richier, "Test generation for network security rules," in Proc. TestCom'06, 2006, vol.3964, pp. 341-356.
-
(2006)
Proc. TestCom'06
, vol.3964
, pp. 341-356
-
-
Darmaillacq, V.1
Fernandez, J.-C.2
Groz, R.3
Mounier, L.4
Richier, J.-L.5
-
7
-
-
38349070556
-
Information flow testing-The third path towards confidentiality guarantee
-
G. Le Guernic, "Information flow testing-The third path towards confidentiality guarantee," in Proc. Adv. Comput. Sci. (ASIAN'07), 2007, pp. 33-47.
-
(2007)
Proc. Adv. Comput. Sci. (ASIAN'07)
, pp. 33-47
-
-
Le Guernic, G.1
-
8
-
-
77952204321
-
Monitoring information flow by diagnosis techniques
-
Budapest, Hungary, Aug.
-
J. Dubreil, T. Jéron, and H. Marchand, "Monitoring information flow by diagnosis techniques," in Proc. Eur. Control Conf. (ECC), Budapest, Hungary, Aug. 2009, pp. 2854-2859.
-
(2009)
Proc. Eur. Control Conf. (ECC)
, pp. 2854-2859
-
-
Dubreil, J.1
Jéron, T.2
Marchand, H.3
-
10
-
-
13544269120
-
Using unification for opacity properties
-
7Workshop Issues Theory Security (WITS'04), Barcelona, Spain
-
L. Mazaré, "Using unification for opacity properties," in Proc. 4th IFIP WG1.7Workshop Issues Theory Security (WITS'04), Barcelona, Spain, 2004, pp. 165-176.
-
(2004)
Proc. 4th IFIP WG1
, pp. 165-176
-
-
Mazaré, L.1
-
11
-
-
54549090072
-
Opacity generalised to transition systems
-
May
-
J. W. Bryans, M. Koutny, L. Mazaré, and P. Y. A. Ryan, "Opacity generalised to transition systems," Int. J. Inform. Security, vol.7, no.6, pp. 421-435, May 2008.
-
(2008)
Int. J. Inform. Security
, vol.7
, Issue.6
, pp. 421-435
-
-
Bryans, J.W.1
Koutny, M.2
Mazaré, L.3
Ryan, P.Y.A.4
-
13
-
-
53149132772
-
Verification of initial-state opacity in security applications of des
-
Workshop Discrete Event Systems (WODES'08) , May
-
A. Saboori and C. Hadjicostis, "Verification of initial-state opacity in security applications of DES," in Proc. 9th Int. Workshop Discrete Event Systems (WODES'08) , May 2008, p. 6.
-
(2008)
Proc. 9th Int.
, pp. 6
-
-
Saboori, A.1
Hadjicostis, C.2
-
16
-
-
0030109707
-
Failure diagnosis using discrete event models
-
Mar.
-
M. Sampath, R. Sengupta, S. Lafortune, K. Sinaamohideen, and D. Teneketzis, "Failure diagnosis using discrete event models," IEEE Trans. Control Syst. Technol., vol.4, no.2, pp. 105-124, Mar. 1996.
-
(1996)
IEEE Trans. Control Syst. Technol.
, vol.4
, Issue.2
, pp. 105-124
-
-
Sampath, M.1
Sengupta, R.2
Lafortune, S.3
Sinaamohideen, K.4
Teneketzis, D.5
-
17
-
-
34250723460
-
Supervision patterns in discrete event systems diagnosis
-
Ann-Arbor, MI, Jul.
-
T. Jéron, H. Marchand, S. Pinchinat, and M.-O. Cordier, "Supervision patterns in discrete event systems diagnosis," in Proc. Workshop Discrete Event Syst. (WODES'06), Ann-Arbor, MI, Jul. 2006, pp. 262-268.
-
(2006)
Proc. Workshop Discrete Event Syst. (WODES'06)
, pp. 262-268
-
-
Jéron, T.1
Marchand, H.2
Pinchinat, S.3
Cordier, M.-O.4
-
18
-
-
0023104549
-
Supervisory control of a class of discrete event processes
-
Jan.
-
P. J. Ramadge and W. M. Wonham, "Supervisory control of a class of discrete event processes," SIAM J. Control Optim., vol.25, no.1, pp. 206-230, Jan. 1987.
-
(1987)
SIAM J. Control Optim.
, vol.25
, Issue.1
, pp. 206-230
-
-
Ramadge, P.J.1
Wonham, W.M.2
-
19
-
-
0024479313
-
The control of discrete event systems
-
Jan.
-
P. J. Ramadge and W. M.Wonham, "The control of discrete event systems," Proc. IEEE, vol.77, no.1, pp. 81-98, Jan. 1989.
-
(1989)
Proc. IEEE
, vol.77
, Issue.1
, pp. 81-98
-
-
Ramadge, P.J.1
Wonham, W.M.2
-
20
-
-
34250741060
-
A question of access: Decentralized control and communication strategies for security policies
-
Jun.
-
L. Ricker, "A question of access: Decentralized control and communication strategies for security policies," in Proc. 8th Int. Workshop Discrete Event Syst., Jun. 2006, pp. 58-63.
-
(2006)
Proc. 8th Int. Workshop Discrete Event Syst.
, pp. 58-63
-
-
Ricker, L.1
-
21
-
-
84860492177
-
Synthesis of non-interferent distributed systems
-
Jan.
-
F. Cassez, J. Mullins, and O. Roux, "Synthesis of non-interferent distributed systems," in Proc. 4th Int. Conf. Math. Methods, Models Architectures Comput. Network Security (MMM-ACNS'07), Jan. 2007, pp. 159-170.
-
(2007)
Proc. 4th Int. Conf. Math. Methods, Models Architectures Comput. Network Security (MMM-ACNS'07)
, pp. 159-170
-
-
Cassez, F.1
Mullins, J.2
Roux, O.3
-
22
-
-
35948973608
-
Concurrent secrets
-
DOI 10.1007/s10626-007-0020-5, Special Issue on WODES'06, Guest Editors: Stephane Lafortune, Feng Lin and Dawn Tilbury
-
E. Badouel, M. Bednarczyk, A. Borzyszkowski, B. Caillaud, and P. Darondeau, "Concurrent secrets," Discrete Event Dyn.. Syst., vol.17, pp. 425-446, 2008. (Pubitemid 350074185)
-
(2007)
Discrete Event Dynamic Systems: Theory and Applications
, vol.17
, Issue.4
, pp. 425-446
-
-
Badouel, E.1
Bednarczyk, M.2
Borzyszkowski, A.3
Caillaud, B.4
Darondeau, P.5
-
23
-
-
70449682552
-
A formula for the supremal controllable and opaque sublanguage arising in supervisory control
-
Mar.
-
S. Takai and Y. Oka, "A formula for the supremal controllable and opaque sublanguage arising in supervisory control," SICE J. Control, Meas., Syst. Integr., vol.1, no.4, pp. 307-312, Mar. 2008.
-
(2008)
SICE J. Control, Meas., Syst. Integr.
, vol.1
, Issue.4
, pp. 307-312
-
-
Takai, S.1
Oka, Y.2
-
24
-
-
53149144288
-
Opacity enforcing control synthesis
-
Gothenburg, Sweden,Mar.
-
J. Dubreil, P. Darondeau, and H. Marchand, "Opacity enforcing control synthesis," in Proc. Workshop Discrete Event Syst. (WODES'08), Gothenburg, Sweden, Mar. 2008, pp. 28-35.
-
(2008)
Proc. Workshop Discrete Event Syst. (WODES'08)
, pp. 28-35
-
-
Dubreil, J.1
Darondeau, P.2
Marchand, H.3
-
26
-
-
33746373966
-
Preserving secrecy under refinement
-
R. Alur, P. Černý, and S. Zdancewic, "Preserving secrecy under refinement," in Proc.: 33rd Int. Colloq. Automata, Language Programming (ICALP'06), 2006, pp. 107-118.
-
(2006)
Proc.: 33rd Int. Colloq. Automata, Language Programming (ICALP'06)
, pp. 107-118
-
-
Alur, P.1
Černý, R.2
Zdancewic, S.3
|