-
1
-
-
0022420723
-
Defining liveness
-
(Oct.)
-
Alpern, B., " Schneider, F., Defining liveness. Inf. Process. Lett. 21, 4 (Oct.), 181-185, 1985.
-
(1985)
Inf. Process. Lett.
, vol.21
, Issue.4
, pp. 181-185
-
-
Alpern, B.1
Schneider, F.2
-
2
-
-
0023558367
-
Recognizing safety and liveness
-
Alpern, B., " Schneider, F., Recognizing safety and liveness. Distributed Computing, 2:117-126, 1987.
-
(1987)
Distributed Computing
, vol.2
, pp. 117-126
-
-
Alpern, B.1
Schneider, F.2
-
4
-
-
14844332191
-
More enforceable security policies
-
Cervesato, I. (Ed.)
-
Bauer, L., " Ligatti, J., " Walker, D., More enforceable security policies. In Cervesato, I. (Ed.), Foundations of Computer Security: Proceedings of the FLoC'02 workshop on Foundations of Computer Security (2002), pp. 95-104.
-
(2002)
Foundations of Computer Security: Proceedings of the FLoC'02 Workshop on Foundations of Computer Security
, pp. 95-104
-
-
Bauer, L.1
Ligatti, J.2
Walker, D.3
-
5
-
-
79551552320
-
Safety, liveness, and information flow: Dependability revisited
-
Karl, W. Becker, J. Gropietsch, K.E. Hochberger, Ch. Maehle, E. (eds.), Frankfurt am Main, Germany
-
Benenson, Z., " Freiling, F.C., " Holz, Th., " Kesdogan, D., " Penso, L.D.: Safety, Liveness, and Information Flow: Dependability Revisited. In: Karl, W., Becker, J., Gropietsch, K.E., Hochberger, Ch., Maehle, E. (eds.) ARCS 2006-19th International Conference on Architecture of Computing Systems, Workshops Proceedings, pp. 56-65. Frankfurt am Main, Germany (2006).
-
(2006)
ARCS 2006-19th International Conference on Architecture of Computing Systems, Workshops Proceedings
, pp. 56-65
-
-
Benenson, Z.1
Freiling, F.C.2
Holz, Th.3
Kesdogan, D.4
Penso, L.D.5
-
6
-
-
0003872263
-
-
Stockton Press, New York
-
Caelli, W., " Longley, D., " Shain, M., Information security handbook, Stockton Press, New York, 1991.
-
(1991)
Information Security Handbook
-
-
Caelli, W.1
Longley, D.2
Shain, M.3
-
7
-
-
51749086409
-
Hyperproperties
-
(Pittsburgh, PA, June, ), IEEE Computer Society (2008)
-
Clarkson, M. R., " Schneider, F.B., Hyperproperties, Proceedings 21st IEEE Computer Security Foundations Symposium (Pittsburgh, PA, June 2008), IEEE Computer Society (2008), pp. 51-65.
-
(2008)
Proceedings 21st IEEE Computer Security Foundations Symposium
, pp. 51-65
-
-
Clarkson, M.R.1
Schneider, F.B.2
-
8
-
-
0000911801
-
Abstract interpretation and application to logic programs
-
Cousot, P., " Cousot, R., Abstract interpretation and application to logic programs, Journal of Logic Programming, 13(2-3):103-179, 1992. http://www.di.ens.fr/-cousot/COUSOTpapers/JLP92.shtml.
-
(1992)
Journal of Logic Programming
, vol.13
, Issue.2-3
, pp. 103-179
-
-
Cousot, P.1
Cousot, R.2
-
9
-
-
79955028147
-
Partial approximative set theory
-
Ponta Delgada (Azores), Portugal, June 30 - July 4, 2010, Abstract and Handout Booklet, To appear
-
Csajbók, Z., Partial Approximative Set Theory, In Programs, Proofs, Processes, Sixth Conference on Computability in Europe, CiE 2010, Ponta Delgada (Azores), Portugal, June 30 - July 4, 2010, Abstract and Handout Booklet, 2010. To appear.
-
(2010)
Programs, Proofs, Processes, Sixth Conference on Computability in Europe, CiE 2010
-
-
Csajbók, Z.1
-
10
-
-
79551566257
-
Partial approximative set theory: A view from galois connections
-
Kovács, Emöd (ed.) et al., January 27-30, Eger, Hungary. Eger: Eszterházy Károly College. To appear
-
Csajbók, Z., Partial Approximative Set Theory: A View from Galois Connections, In Kovács, Emöd (ed.) et al., Proceedings of the 8th international conference on applied informatics (ICAI 2010), January 27-30, 2010, Eger, Hungary. Eger: Eszterházy Károly College. To appear.
-
(2010)
Proceedings of the 8th International Conference on Applied Informatics (ICAI 2010)
-
-
Csajbók, Z.1
-
11
-
-
0004232136
-
-
Second edition, Cambridge University Press, Cambridge
-
Davey, B. A., " Priestley, H. A.: Introduction to Lattices and Order, Second edition, Cambridge University Press, Cambridge, 2002.
-
(2002)
Introduction to Lattices and Order
-
-
Davey, B.A.1
Priestley, H.A.2
-
12
-
-
33745567039
-
-
Kluwer Academic Publishers, Dordrecht, London, Boston
-
Denecke, K., " Erné, M., " Wismath, S.L., Galois Connections and Applications, Kluwer Academic Publishers, Dordrecht, London, Boston, 2004.
-
(2004)
Galois Connections and Applications
-
-
Denecke, K.1
Erné, M.2
Wismath, S.L.3
-
13
-
-
0004024352
-
-
World Scientific, Singapore
-
Diekert, V., " Rozenberg, G., The Book of Traces, World Scientific, Singapore, 1995.
-
(1995)
The Book of Traces
-
-
Diekert, V.1
Rozenberg, G.2
-
14
-
-
35248813940
-
Approximation operators in qualitative data analysis
-
H. de Swart et al. (Eds.): TARSKI, Springer-Verlag, Berlin, Heidelberg
-
Düntsch, I., " Gediga, G., Approximation Operators in Qualitative Data Analysis, In: H. de Swart et al. (Eds.): TARSKI, Lecture Notes in Computer Science Vol. 2929, Springer-Verlag, Berlin, Heidelberg, 214-230, 2003.
-
(2003)
Lecture Notes in Computer Science
, vol.2929
, pp. 214-230
-
-
Düntsch, I.1
Gediga, G.2
-
15
-
-
0027892934
-
A primer on Galois connections
-
S. Andima et al. (eds.), New York
-
Erné, M., " Koslowski, J., " Melton, A., " Strecker, G. E., A primer on Galois connections. In: S. Andima et al. (eds.), Papers on General Topology and its Applications. 7th Summer Conf. Wisconsin. Annals New York Acad. Sci. 704, New York (1994), pp. 103-125.
-
(1994)
Papers on General Topology and its Applications. 7th Summer Conf. Wisconsin. Annals New York Acad. Sci.
, vol.704
, pp. 103-125
-
-
Erné, M.1
Koslowski, J.2
Melton, A.3
Strecker, G.E.4
-
16
-
-
84988393004
-
Classification of security properties (Part I: Information flow)
-
volume 2171 of Lecture Notes in Computer Science, Springer
-
Focardi, R., " Gorrieri, R., Classification of security properties (Part I: Information flow). In Foundations of Security Analysis and Design 2000, volume 2171 of Lecture Notes in Computer Science, pages 331-396. Springer, 2001.
-
(2001)
Foundations of Security Analysis and Design 2000
, pp. 331-396
-
-
Focardi, R.1
Gorrieri, R.2
-
17
-
-
16244373256
-
Continuous lattices and domains
-
Cambridge University Press
-
Gierz, G., " Hofmann, K. H., " Keimel, K., " Lawson, J. D., " Mislove, M., " Scott, D.S., Continuous Lattices and Domains, Encyclopedia of Mathematics and its Applications 93, Cambridge University Press, 2003.
-
(2003)
Encyclopedia of Mathematics and its Applications
, vol.93
-
-
Gierz, G.1
Hofmann, K.H.2
Keimel, K.3
Lawson, J.D.4
Mislove, M.5
Scott, D.S.6
-
19
-
-
38049075550
-
Lattice theory for rough sets
-
LNCS, Springer, Heidelberg
-
Järvinen, J., Lattice theory for rough sets, In: Transactions on Rough Sets VI. LNCS, vol. 4374, Springer, Heidelberg, 2007, pp. 400-498.
-
(2007)
Transactions on Rough Sets VI
, vol.4374
, pp. 400-498
-
-
Järvinen, J.1
-
20
-
-
0017472779
-
Proving the correctness of multiprocess programs
-
Mar.
-
Lamport, L., Proving the correctness of multiprocess programs. IEEE Transactions of Software Engineering, 3(2):125-143, Mar. 1977.
-
(1977)
IEEE Transactions of Software Engineering
, vol.3
, Issue.2
, pp. 125-143
-
-
Lamport, L.1
-
21
-
-
13444275220
-
Edit automata: Enforcement mechanisms for run-time security policies
-
February
-
Ligatti, J., " Bauer, L., " Walker, D., Edit Automata: Enforcement mechanisms for run-time security policies. International Journal of Information Security, 4(1-2):2-16, February 2005.
-
(2005)
International Journal of Information Security
, vol.4
, Issue.1-2
, pp. 2-16
-
-
Ligatti, J.1
Bauer, L.2
Walker, D.3
-
23
-
-
85034819445
-
Trace theory
-
W. Brauer et al. editors, Petri Nets, number 255 in Lecture Notes in Computer Science, Berlin-Heidelberg-New York, Springer
-
Mazurkiewicz, A., Trace Theory, In W. Brauer et al., editors, Petri Nets, Applications and Relationship to other Models of Concurrency, number 255 in Lecture Notes in Computer Science, pages 279-324, Berlin-Heidelberg-New York, 1987, Springer.
-
(1987)
Applications and Relationship to Other Models of Concurrency
, pp. 279-324
-
-
Mazurkiewicz, A.1
-
25
-
-
35248854997
-
Developing dynamic security policies
-
San Francisco, CA, USA, IEEE Computer Society Press, May 29-31
-
Naldurg, P., " Campbell, R.H., " Mickunas, M.D., Developing Dynamic Security Policies, Proceedings of the 2002 DARPA Active Networks Conference and Exposition (DANCE 2002), San Francisco, CA, USA, IEEE Computer Society Press, May 29-31, 2002.
-
(2002)
Proceedings of the 2002 DARPA Active Networks Conference and Exposition (DANCE 2002)
-
-
Naldurg, P.1
Campbell, R.H.2
Mickunas, M.D.3
-
26
-
-
79551573790
-
A geometry of approximation
-
Springer
-
Pagliani, P. and Chakraborty, M., A Geometry of Approximation. Rough Set Theory: Logic, Algebra and Topology of Conceptual Patterns, Trends in Logic, Vol. 27, Springer, 2008.
-
(2008)
Rough Set Theory: Logic, Algebra and Topology of Conceptual Patterns, Trends in Logic
, vol.27
-
-
Pagliani, P.1
Chakraborty, M.2
-
30
-
-
0012889295
-
A language-based approach to security
-
Lecture Notes in Computer Science, Springer-Verlag
-
Schneider, F.B., " Morrisett, G., " Harper, R., A Language-Based Approach to Security. In: Informatics: 10 Years Back, 10 Years Ahead. Lecture Notes in Computer Science, Vol. 2000. Springer-Verlag, 2001. pp. 86-101.
-
(2001)
Informatics: 10 Years Back, 10 Years Ahead
, vol.2000
, pp. 86-101
-
-
Schneider, F.B.1
Morrisett, G.2
Harper, R.3
-
31
-
-
0021011078
-
Powerdomains and predicate transformers: A topological view
-
J. Diaz, editor, Berlin, Springer-Verlag. Lecture Notes in Computer Science Vol. 154
-
Smyth, M.B., Powerdomains and predicate transformers: a topological view, In J. Diaz, editor, Automata, Languages and Programming, pages 662-675, Berlin, 1983. Springer-Verlag. Lecture Notes in Computer Science Vol. 154.
-
(1983)
Automata, Languages and Programming
, pp. 662-675
-
-
Smyth, M.B.1
-
32
-
-
0001744565
-
Topology
-
Abramsky, S." Gabbay, D.M." Maibaum, T.S.E. (eds.), Background: Mathematical Stuctures, Clarendon Press, Oxford
-
Smyth, M.B., Topology, In Abramsky, S., " Gabbay, D.M., " Maibaum, T.S.E. (eds.): Handbook of Logic in Computer Science. Volume I. Background: Mathematical Stuctures, pp. 641-761, Clarendon Press, Oxford, 1992.
-
(1992)
Handbook of Logic in Computer Science
, vol.1
, pp. 641-761
-
-
Smyth, M.B.1
-
33
-
-
0000815146
-
Sur l'extension de l'ordre partiel
-
Szpilrajn, E., Sur l'extension de l'ordre partiel, Fund. Math. 16 (1930), pp. 386-389.
-
(1930)
Fund. Math.
, vol.16
, pp. 386-389
-
-
Szpilrajn, E.1
|