-
1
-
-
84890865854
-
Access control based on execution history
-
Martín Abadi and Cédric Fournet. Access control based on execution history. In NDSS, 2003.
-
(2003)
NDSS
-
-
Abadi, M.1
Fournet, C.2
-
2
-
-
70349394182
-
Securing Java with local policies
-
Massimo Bartoletti, Gabriele Costa, Pierpaolo Degano, Fabio Martinelli, and Roberto Zunino. Securing Java with local policies. In Workshop on Formal Techniques for Java-like Programs, 2008.
-
(2008)
Workshop on Formal Techniques for Java-like Programs
-
-
Bartoletti, M.1
Costa, G.2
Degano, P.3
Martinelli, F.4
Zunino, R.5
-
3
-
-
24644498665
-
History-based access control with local policies
-
Massimo Bartoletti, Pierpaolo Degano, and Gian Luigi Ferrari. History-based access control with local policies. In FoSSaCS, pages 316-332, 2005.
-
(2005)
FoSSaCS
, pp. 316-332
-
-
Bartoletti, M.1
Degano, P.2
Ferrari, G.L.3
-
4
-
-
70449384902
-
Planning and verifying service composition
-
(Abridged version In Proc. 18th Computer Security Foundations Workshop (CSFW), 2005)
-
Massimo Bartoletti, Pierpaolo Degano, and Gian Luigi Ferrari. Planning and verifying service composition. Journal of Computer Security (JCS), 17(5):799-837, 2009. (Abridged version In Proc. 18th Computer Security Foundations Workshop (CSFW), 2005).
-
(2009)
Journal of Computer Security (JCS)
, vol.17
, Issue.5
, pp. 799-837
-
-
Bartoletti, M.1
Degano, P.2
Ferrari, G.L.3
-
5
-
-
38049092991
-
Secure service orchestration
-
Massimo Bartoletti, Pierpaolo Degano, Gian Luigi Ferrari, and Roberto Zunino. Secure service orchestration. In FOSAD, pages 24-74, 2007.
-
(2007)
FOSAD
, pp. 24-74
-
-
Bartoletti, M.1
Degano, P.2
Ferrari, G.L.3
Zunino, R.4
-
6
-
-
0021870594
-
Algebra of communicating processes with abstraction
-
Jan A. Bergstra and Jan Willem Klop. Algebra of communicating processes with abstraction. Theor. Comput. Sci., 37:77-121, 1985.
-
(1985)
Theor. Comput. Sci.
, vol.37
, pp. 77-121
-
-
Bergstra, J.A.1
Klop, J.W.2
-
7
-
-
0034963556
-
Model checking security properties of control flow graphs
-
Frédéric Besson, Thomas P. Jensen, and Daniel Le Métayer. Model checking security properties of control flow graphs. Journal of Computer Security, 9(3):217-250, 2001.
-
(2001)
Journal of Computer Security
, vol.9
, Issue.3
, pp. 217-250
-
-
Besson, F.1
Jensen, T.P.2
Le Métayer, D.3
-
8
-
-
0002953320
-
A symbolic semantics for the pi-calculus
-
Michele Boreale and Rocco De Nicola. A symbolic semantics for the pi-calculus. Inf. Comput., 126(1):34-52, 1996.
-
(1996)
Inf. Comput.
, vol.126
, Issue.1
, pp. 34-52
-
-
Boreale, M.1
De Nicola, R.2
-
9
-
-
67650301851
-
Contract-driven implementation of choreographies
-
Mario Bravetti, Ivan Lanese, and Gianluigi Zavattaro. Contract-driven implementation of choreographies. In TGC, pages 1-18, 2008.
-
(2008)
TGC
, pp. 1-18
-
-
Bravetti, M.1
Lanese, I.2
Zavattaro, G.3
-
10
-
-
33744948281
-
Choreography and orchestration: A synergic approach for system design
-
Nadia Busi, Roberto Gorrieri, Claudio Guidi, Roberto Lucchi, and Gianluigi Zavattaro. Choreography and orchestration: A synergic approach for system design. In ICSOC, pages 228-240, 2005.
-
(2005)
ICSOC
, pp. 228-240
-
-
Busi, N.1
Gorrieri, R.2
Guidi, C.3
Lucchi, R.4
Zavattaro, G.5
-
12
-
-
13444275220
-
Edit automata: Enforcement mechanisms for run-time security policies
-
Jay Ligatti, Lujo Bauer, and David Walker. Edit automata: enforcement mechanisms for run-time security policies. Int. J. Inf. Sec., 4(1-2):2-16, 2005.
-
(2005)
Int. J. Inf. Sec.
, vol.4
, Issue.1-2
, pp. 2-16
-
-
Ligatti, J.1
Bauer, L.2
Walker, D.3
-
13
-
-
43149123592
-
Synthesis of web services orchestrators in a timed setting
-
Fabio Martinelli and Ilaria Matteucci. Synthesis of web services orchestrators in a timed setting. In WS-FM, pages 124-138, 2007.
-
(2007)
WS-FM
, pp. 124-138
-
-
Martinelli, F.1
Matteucci, I.2
-
14
-
-
0003866744
-
Ccs without tau's
-
Rocco De Nicola and Matthew Hennessy. Ccs without tau's. In TAPSOFT, Vol.1, pages 138-152, 1987.
-
(1987)
TAPSOFT
, vol.1
, pp. 138-152
-
-
De Nicola, R.1
Hennessy, M.2
-
15
-
-
84881225236
-
Enforceable security policies
-
Fred B. Schneider. Enforceable security policies. ACM Trans. Inf. Syst. Secur., 3(1):30-50, 2000.
-
(2000)
ACM Trans. Inf. Syst. Secur.
, vol.3
, Issue.1
, pp. 30-50
-
-
Schneider, F.B.1
-
16
-
-
35048838770
-
History effects and verification
-
Christian Skalka and Scott F. Smith. History effects and verification. In APLAS, pages 107-128, 2004.
-
(2004)
APLAS
, pp. 107-128
-
-
Skalka, C.1
Smith, S.F.2
-
17
-
-
77953850520
-
-
Gabriele Costa's web page. extended version
-
Gabriele Costa's web page. Secure service composition with symbolic effects (extended version), 2009. http://www.di.unipi.it/~costa/data/papers/ssc- extended.pdf.
-
(2009)
Secure Service Composition with Symbolic Effects
-
-
|