-
1
-
-
33746373966
-
Preserving secrecy under refinement
-
DOI 10.1007/11787006-10, Automata, Languages and Programming - 33rd International Colloquium, ICALP 2006, Proceedings
-
Alur R, Černý P, Zdancewic S (2006) Preserving secrecy under refinement. In: ICALP'06: proceedings (Part II) of the 33rd international colloquium on automata, languages and programming. Springer, Berlin, pp 107-118 (Pubitemid 44113241)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4052
, pp. 107-118
-
-
Alur, R.1
Cerny, P.2
Zdancewic, S.3
-
2
-
-
35948973608
-
Concurrent secrets
-
DOI 10.1007/s10626-007-0020-5, Special Issue on WODES'06, Guest Editors: Stephane Lafortune, Feng Lin and Dawn Tilbury
-
Badouel E, Bednarczyk M, Borzyszkowski A, Caillaud B, Darondeau P (2007) Concurrent secrets. Discret Event Dyn Syst 17:425-446 (Pubitemid 350074185)
-
(2007)
Discrete Event Dynamic Systems: Theory and Applications
, vol.17
, Issue.4
, pp. 425-446
-
-
Badouel, E.1
Bednarczyk, M.2
Borzyszkowski, A.3
Caillaud, B.4
Darondeau, P.5
-
3
-
-
26844508455
-
Automated verification of selected equivalences for security protocols
-
Proceedings - 20th Annual IEEE symposium on Logic in Computer Science, LICS 2005
-
Blanchet B, Abadi M, Fournet C (2005) Automated verification of selected equivalences for security protocols. In: 20th IEEE symposium on logic in computer science (LICS 2005), Chicago, IL, June 2005. IEEE Computer Society, Los Alamitos, pp 331-340 (Pubitemid 41462579)
-
(2005)
Proceedings - Symposium on Logic in Computer Science
, pp. 331-340
-
-
Blanchet, B.1
Abadi, M.2
Fournet, C.3
-
4
-
-
54549090072
-
Opacity generalised to transition systems
-
Bryans J, Koutny M, Mazaré L, Ryan P (2008) Opacity generalised to transition systems. Int J Inf Secur 7(6):421-435
-
(2008)
Int J Inf Secur
, vol.7
, Issue.6
, pp. 421-435
-
-
Bryans, J.1
Koutny, M.2
Mazaré, L.3
Ryan, P.4
-
5
-
-
53149128468
-
Fault diagnosis with static or dynamic diagnosers
-
Cassez F, Tripakis S (2008) Fault diagnosis with static or dynamic diagnosers. Fundam Inform 88(4):497-540
-
(2008)
Fundam Inform
, vol.88
, Issue.4
, pp. 497-540
-
-
Cassez, F.1
Tripakis, S.2
-
6
-
-
68949166100
-
Synthesis of non-interferent systems
-
Communications in computer and inform science Springer, Berlin
-
Cassez F, Mullins J, Roux OH (2007) Synthesis of non-interferent systems. In: 4th int conf on mathematical methods, models and architectures for computer network security (MMM-ACNS'07). Communications in computer and inform science, vol 1. Springer, Berlin, pp 307-321
-
(2007)
4th Int Conf on Mathematical Methods, Models and Architectures for Computer Network Security (MMM-acns'07)
, vol.1
, pp. 307-321
-
-
Cassez, F.1
Mullins, J.2
Roux, O.H.3
-
7
-
-
71549125929
-
Dynamic observers for the synthesis of opaque systems
-
Liu Z, Ravn AP (eds) Macao SAR, China, October 2009. LNCS Springer, Berlin
-
Cassez F, Dubreil J, Marchand H (2009) Dynamic observers for the synthesis of opaque systems. In: Liu Z, Ravn AP (eds) 7th international symposium on automated technology for verification and analysis (ATVA'09), Macao SAR, China, October 2009. LNCS, vol 5799. Springer, Berlin, pp 352-367
-
(2009)
7th International Symposium on Automated Technology for Verification and Analysis (ATVA'09)
, vol.5799
, pp. 352-367
-
-
Cassez, F.1
Dubreil, J.2
Marchand, H.3
-
8
-
-
33745877300
-
Test generation for network security rules
-
LNCS
-
Darmaillacq V, Fernandez J-C, Groz R, Mounier L, Richier J-L (2006) Test generation for network security rules. In: TestCom 2006. LNCS, vol 3964
-
(2006)
TestCom 2006
, vol.3964
-
-
Darmaillacq, V.1
Fernandez, J.-C.2
Groz, R.3
Mounier, L.4
Richier, J.-L.5
-
9
-
-
0032642997
-
Efficient algorithms for optimum cycle mean and optimum cost to time ratio problems
-
New Orleans, Louisiana, United States. ACM, New York
-
Dasdan A, Irani S, Gupta R (1999) Efficient algorithms for optimum cycle mean and optimum cost to time ratio problems. In: Annual ACM IEEE design automation conference, New Orleans, Louisiana, United States. ACM, New York, pp 37-42
-
(1999)
Annual ACM IEEE Design Automation Conference
, pp. 37-42
-
-
Dasdan, A.1
Irani, S.2
Gupta, R.3
-
10
-
-
53149144288
-
Opacity enforcing control synthesis
-
Göteborg, Sweden, May 2008
-
Dubreil J, Darondeau P, Marchand H (2008) Opacity enforcing control synthesis. In: Proceedings of the 9th international workshop on discrete event systems (WODES'08), Göteborg, Sweden, May 2008, pp 28-35
-
(2008)
Proceedings of the 9th International Workshop on Discrete Event Systems (WODES'08)
, pp. 28-35
-
-
Dubreil, J.1
Darondeau, P.2
Marchand, H.3
-
11
-
-
84955199515
-
Monitoring confidentiality by diagnosis techniques
-
Budapest, Hungary, August 2009
-
Dubreil J, Jéron T, Marchand H (2009) Monitoring confidentiality by diagnosis techniques. In: European control conference, Budapest, Hungary, August 2009, pp 2584-2590
-
(2009)
European Control Conference
, pp. 2584-2590
-
-
Dubreil, J.1
Jéron, T.2
Marchand, H.3
-
14
-
-
84988393004
-
Classification of Security Properties (Part I: Information Flow)
-
Foundations of Security Analysis and Design
-
Focardi R, Gorrieri R (2001) Classification of security properties (part I: Information flow). In: Focardi R, Gorrieri R (eds) Foundations of security analysis and design I: FOSAD 2000 tutorial lectures. Lecture notes in computer science, vol 2171. Springer, Heidelberg, pp 331-396 (Pubitemid 33364383)
-
(2001)
Lecture Notes in Computer Science
, Issue.2171
, pp. 331-396
-
-
Focardi, R.1
Gorrieri, R.2
-
15
-
-
26844532854
-
On the verification of intransitive noninterference in multilevel security
-
Hadj-Alouane N, Lafrance S, Lin F, Mullins J, Yeddes M (2005) On the verification of intransitive noninterference in multilevel security. IEEE Trans Syst Man Cybern, Part B, Cybern 35(5):948-957
-
(2005)
IEEE Trans Syst Man Cybern, Part B, Cybern
, vol.35
, Issue.5
, pp. 948-957
-
-
Hadj-Alouane, N.1
Lafrance, S.2
Lin, F.3
Mullins, J.4
Yeddes, M.5
-
16
-
-
0001391363
-
A characterization of the minimum mean cycle in a digraph
-
Karp R (1978) A characterization of the minimum mean cycle in a digraph. Discrete Math 23:309-311
-
(1978)
Discrete Math
, vol.23
, pp. 309-311
-
-
Karp, R.1
-
17
-
-
38349070556
-
Information flow testing - The third path towards confidentiality guarantee
-
ASIAN 2007, Computer and network security. LNCS
-
Le Guernic G (2007) Information flow testing - the third path towards confidentiality guarantee. In: Advances in computer science, ASIAN 2007, Computer and network security. LNCS, vol 4846, pp 33-47
-
(2007)
Advances in Computer Science
, vol.4846
, pp. 33-47
-
-
Le Guernic, G.1
-
19
-
-
0033353968
-
Towards a completeness result for model checking of security protocols
-
Lowe G (1999) Towards a completeness result for model checking of security protocols. J Comput Secur 7(2-3):89-146 (Pubitemid 30524009)
-
(1999)
Journal of Computer Security
, vol.7
, Issue.2
, pp. 89-146
-
-
Lowe Gavin1
-
20
-
-
0001434559
-
Borel determinacy
-
Martin D (1975) Borel determinacy. Ann Math 102(2):363-371
-
(1975)
Ann Math
, vol.102
, Issue.2
, pp. 363-371
-
-
Martin, D.1
-
22
-
-
34250741060
-
A question of access: Decentralized control and communication strategies for security policies
-
DOI 10.1109/WODES.2006.1678408, 1678408, Proceedings - Eighth International Workshop on Discrete Event Systems, WODES 2006
-
Ricker SL (2006) A question of access: decentralized control and communication strategies for security policies. In: 8th international workshop on discrete event systems, June 2006, pp 58-63 (Pubitemid 46949241)
-
(2006)
Proceedings - Eighth International Workshop on Discrete Event Systems, WODES 2006
, pp. 58-63
-
-
Ricker, S.L.1
-
23
-
-
84881225236
-
Enforceable security policies
-
Schneider F (2000) Enforceable security policies. ACM Trans Inf Syst Secur 3(1):30-50
-
(2000)
ACM Trans Inf Syst Secur
, vol.3
, Issue.1
, pp. 30-50
-
-
Schneider, F.1
-
24
-
-
0015773009
-
Word problems requiring exponential time: Preliminary report
-
ACM, New York
-
Stockmeyer L, Meyer A (1973) Word problems requiring exponential time: Preliminary report. In: STOC. ACM, New York, pp 1-9
-
(1973)
STOC
, pp. 1-9
-
-
Stockmeyer, L.1
Meyer, A.2
-
25
-
-
70449682552
-
A formula for the supremal controllable and opaque sublanguage arising in supervisory control
-
Takai S, Oka Y (2008) A formula for the supremal controllable and opaque sublanguage arising in supervisory control. J Control Meas Syst Integr 1(4):307-312
-
(2008)
J Control Meas Syst Integr
, vol.1
, Issue.4
, pp. 307-312
-
-
Takai, S.1
Oka, Y.2
-
27
-
-
0030143640
-
The complexity of mean payoff games on graphs
-
Zwick U, Paterson M (1996) The complexity of mean payoff games on graphs. Theor Comput Sci 158(1-2):343-359 (Pubitemid 126411935)
-
(1996)
Theoretical Computer Science
, vol.158
, Issue.1-2
, pp. 343-359
-
-
Zwick, U.1
Paterson, M.2
|