-
2
-
-
3042529082
-
A process-algebraic approach for the analysis of probabilistic non interference
-
A. Aldini, M. Bravetti, and R. Gorrieri, "A Process-Algebraic Approach for the Analysis of Probabilistic Non Interference," J. Computer Security, Vol. 12, pp. 191-245, 2004.
-
(2004)
J. Computer Security
, vol.12
, pp. 191-245
-
-
Aldini, A.1
Bravetti, M.2
Gorrieri, R.3
-
3
-
-
44249128398
-
Estimating the maximum information leakage
-
A. Aldini and A. Di Pierro, "Estimating the Maximum Information Leakage," Int'l J. Information Security, Vol. 7, pp. 219-242, 2008.
-
(2008)
Int'l J. Information Security
, vol.7
, pp. 219-242
-
-
Aldini, A.1
Di Pierro, A.2
-
4
-
-
84992591899
-
Verifying automata specifications of probabilistic real-time systems
-
R. Alur, C. Courcoubetis, and D.L. Dill, "Verifying Automata Specifications of Probabilistic Real-Time Systems," Proc. Workshop Real-Time: Theory in Practice, pp. 28-44, 1992.
-
(1992)
Proc. Workshop Real-time: Theory in Practice
, pp. 28-44
-
-
Alur, R.1
Courcoubetis, C.2
Dill, D.L.3
-
7
-
-
0037834671
-
A decidable notion of timed non interference
-
R. Barbuti and L. Tesei, "A Decidable Notion of Timed Non Interference," Fundamenta Informaticae, Vol. 54, pp. 137-150, 2003.
-
(2003)
Fundamenta Informaticae
, vol.54
, pp. 137-150
-
-
Barbuti, R.1
Tesei, L.2
-
8
-
-
0037427688
-
On probabilistic timed automata
-
D. Beauquier, "On Probabilistic Timed Automata," Theoretical Computer Science, Vol. 292, pp. 65-84, 2003.
-
(2003)
Theoretical Computer Science
, vol.292
, pp. 65-84
-
-
Beauquier, D.1
-
10
-
-
67349145950
-
Quantifying information leakage in process calculi
-
M. Boreale, "Quantifying Information Leakage in Process Calculi," Information and Computation, Vol. 207, pp. 699-725, 2009.
-
(2009)
Information and Computation
, vol.207
, pp. 699-725
-
-
Boreale, M.1
-
12
-
-
0005411573
-
Towards quantitative verification of probabilistic systems (Extended abstract)
-
F. van Breugel and J. Worrel, "Towards Quantitative Verification of Probabilistic Systems (Extended Abstract)," Proc. Int'l Colloquium Automata, Languages, and Programming, pp. 421-432, 2001.
-
(2001)
Proc. Int'l Colloquium Automata, Languages, and Programming
, pp. 421-432
-
-
Van Breugel, F.1
Worrel, J.2
-
14
-
-
84947796708
-
Decidability of bisimulation equivalences for parallel timer processes
-
K. Cerans, "Decidability of Bisimulation Equivalences for Parallel Timer Processes," Proc. Int'l Conf. Computer Aided Verification, pp. 302-315, 1992.
-
(1992)
Proc. Int'l Conf. Computer Aided Verification
, pp. 302-315
-
-
Cerans, K.1
-
15
-
-
20844445346
-
Quantitative information flow, relations and polymorphic types
-
D. Clark, S. Hunt, and P. Malacaria, "Quantitative Information Flow, Relations and Polymorphic Types," J. Logic and Computation, Vol. 18, pp. 181-199, 2005.
-
(2005)
J. Logic and Computation
, vol.18
, pp. 181-199
-
-
Clark, D.1
Hunt, S.2
Malacaria, P.3
-
16
-
-
68949207198
-
Bisimulation for demonic schedulers
-
K. Chatzikokolakis, G. Norman, and D. Parker, "Bisimulation for Demonic Schedulers," Proc. Int'l Conf. Foundations of Software Science and Computational Structures, pp. 318-332, 2009.
-
(2009)
Proc. Int'l Conf. Foundations of Software Science and Computational Structures
, pp. 318-332
-
-
Chatzikokolakis, K.1
Norman, G.2
Parker, D.3
-
18
-
-
0023861309
-
The dining cryptographers problem: Unconditional sender and recipient untraceability
-
D. Chaum, "The Dining Cryptographers Problem: Unconditional Sender and Recipient Untraceability," J. Cryptology, Vol. 1, pp. 65-75, 1988.
-
(1988)
J. Cryptology
, vol.1
, pp. 65-75
-
-
Chaum, D.1
-
19
-
-
0036052667
-
The metric analogue of weak bisimulation for probabilistic processes
-
J. Desharnais, V. Gupta, R. Jagadeesan, and P. Panangaden, "The Metric Analogue of Weak Bisimulation for Probabilistic Processes," Proc. Ann. IEEE Symp. Logic in Computer Science, 2002.
-
(2002)
Proc. Ann. IEEE Symp. Logic in Computer Science
-
-
Desharnais, J.1
Gupta, V.2
Jagadeesan, R.3
Panangaden, P.4
-
20
-
-
34250629239
-
Tempus fugit: How to plug it
-
A. Di Pierro, C. Hankin, I. Siveroni, and H. Wiklicky, "Tempus Fugit: How to Plug It," J. Logic and Algebraic Programming, Vol. 72, pp. 173-190, 2007.
-
(2007)
J. Logic and Algebraic Programming
, vol.72
, pp. 173-190
-
-
Di Pierro, A.1
Hankin, C.2
Siveroni, I.3
Wiklicky, H.4
-
21
-
-
35248857469
-
Quantitative relations and approximate process equivalences
-
A. Di Pierro, C. Hankin, and H. Wiklicky, "Quantitative Relations and Approximate Process Equivalences," Proc. Int'l Conf. Concurrency Theory, pp. 508-522, 2003.
-
(2003)
Proc. Int'l Conf. Concurrency Theory
, pp. 508-522
-
-
Di Pierro, A.1
Hankin, C.2
Wiklicky, H.3
-
22
-
-
0344875573
-
Approximate non interference
-
A. Di Pierro, C. Hankin, and H. Wiklicky, "Approximate Non Interference," J. Computer Security, Vol. 12, pp. 37-82, 2004.
-
(2004)
J. Computer Security
, vol.12
, pp. 37-82
-
-
Di Pierro, A.1
Hankin, C.2
Wiklicky, H.3
-
23
-
-
18544383932
-
Measuring the confinement of probabilistic systems
-
A. Di Pierro, C. Hankin, and H. Wiklicky, "Measuring the Confinement of Probabilistic Systems," Theoretical Computer Science, Vol. 340, pp. 3-56, 2005.
-
(2005)
Theoretical Computer Science
, vol.340
, pp. 3-56
-
-
Di Pierro, A.1
Hankin, C.2
Wiklicky, H.3
-
24
-
-
57049127668
-
Quantifying timing leaks and cost optimisation
-
A. Di Pierro, C. Hankin, and H. Wiklicky, "Quantifying Timing Leaks and Cost Optimisation," Proc. Int'l Conf. Information and Comm. Security, pp. 81-96, 2008.
-
(2008)
Proc. Int'l Conf. Information and Comm. Security
, pp. 81-96
-
-
Di Pierro, A.1
Hankin, C.2
Wiklicky, H.3
-
26
-
-
84974776068
-
A classification of security properties
-
R. Focardi and R. Gorrieri, "A Classification of Security Properties," J. Computer Security, Vol. 3, pp. 5-33, 1995.
-
(1995)
J. Computer Security
, vol.3
, pp. 5-33
-
-
Focardi, R.1
Gorrieri, R.2
-
27
-
-
19144368123
-
Formal models of timing attacks on web privacy
-
R. Focardi, R. Gorrieri, R. Lanotte, A. Maggiolo-Schettini, F. Martinelli, S. Tini, and E. Tronci, "Formal Models of Timing Attacks on Web Privacy," Electronic Notes in Theoretical Computer Science, Vol. 62, pp. 229-243, 2001.
-
(2001)
Electronic Notes in Theoretical Computer Science
, vol.62
, pp. 229-243
-
-
Focardi, R.1
Gorrieri, R.2
Lanotte, R.3
Maggiolo-Schettini, A.4
Martinelli, F.5
Tini, S.6
Tronci, E.7
-
28
-
-
0033725594
-
Information flow analysis in a discrete-time process algebra
-
R. Focardi, R. Gorrieri, and F. Martinelli, "Information Flow Analysis in a Discrete-Time Process Algebra," Proc. 13th IEEE Computer Security Foundations Workshop, pp. 170-184, 2000.
-
(2000)
Proc. 13th IEEE Computer Security Foundations Workshop
, pp. 170-184
-
-
Focardi, R.1
Gorrieri, R.2
Martinelli, F.3
-
30
-
-
84974759639
-
Toward a mathematical foundation for information flow security
-
J.W. Gray III, "Toward a Mathematical Foundation for Information Flow Security," J. Computer Security, Vol. 1, pp. 255-294, 1992.
-
(1992)
J. Computer Security
, vol.1
, pp. 255-294
-
-
Gray III, J.W.1
-
32
-
-
0000217258
-
Symbolic model checking for real-time systems
-
T.A. Henzinger, X. Nicollin, J. Sifakis, and S. Yovine, "Symbolic Model Checking for Real-Time Systems," Information and Computation, Vol. 111, pp. 193-244, 1994.
-
(1994)
Information and Computation
, vol.111
, pp. 193-244
-
-
Henzinger, T.A.1
Nicollin, X.2
Sifakis, J.3
Yovine, S.4
-
34
-
-
0037036274
-
Automatic verification of real-time systems with discrete probability distribution
-
M. Kwiatkowska, G. Norman, R. Segala, and J. Sproston, "Automatic Verification of Real-Time Systems with Discrete Probability Distribution," Theoretical Computer Science, Vol. 282, pp. 101-150, 2002.
-
(2002)
Theoretical Computer Science
, vol.282
, pp. 101-150
-
-
Kwiatkowska, M.1
Norman, G.2
Segala, R.3
Sproston, J.4
-
35
-
-
77957752258
-
Symbolic model checking of probabilistic timed automata using backwards reachability
-
M. Kwiatkowska, R. Norman, and J. Sproston, "Symbolic Model Checking of Probabilistic Timed Automata Using Backwards Reachability," Technical Report CSR-03-10, Univ. of Birmingham, 2003.
-
(2003)
Technical Report CSR-03-10, Univ. of Birmingham
-
-
Kwiatkowska, M.1
Norman, R.2
Sproston, J.3
-
39
-
-
84947805982
-
From timed automata to logic - And back
-
F. Laroussinie, K.G. Larsen, and C. Weise, "From Timed Automata to Logic - And Back," Proc. Int'l Symp. Math. Foundations of Computer Science, pp. 27-41, 1995.
-
(1995)
Proc. Int'l Symp. Math. Foundations of Computer Science
, pp. 27-41
-
-
Laroussinie, F.1
Larsen, K.G.2
Weise, C.3
-
40
-
-
0006476072
-
Time abstracted bisimulation: Implicit specifications and decidability
-
K.G. Larsen and Y. Wang, "Time Abstracted Bisimulation: Implicit Specifications and Decidability," Information and Computation, Vol. 134, pp. 75-101, 1997.
-
(1997)
Information and Computation
, vol.134
, pp. 75-101
-
-
Larsen, K.G.1
Wang, Y.2
-
41
-
-
0023829319
-
Noninterference and the composability of security properties
-
D. McCullough, "Noninterference and the Composability of Security Properties," Proc. Symp. Research in Security and Privacy, pp. 177-186, 1988.
-
(1988)
Proc. Symp. Research in Security and Privacy
, pp. 177-186
-
-
McCullough, D.1
-
45
-
-
0000737870
-
Real-time behaviour of asynchronous agents
-
Y. Wang, "Real-Time Behaviour of Asynchronous Agents," Proc. Int'l Conf. Concurrency Theory, pp. 502-520, 1990.
-
(1990)
Proc. Int'l Conf. Concurrency Theory
, pp. 502-520
-
-
Wang, Y.1
|