-
1
-
-
84859323837
-
On the decidability of non interference over unbounded petri nets
-
Procs. SecCo 2010
-
Best, E., Darondeau, P., Gorrieri, R.: On the Decidability of Non Interference over Unbounded Petri Nets. EPTCS 51, 16-33 (2010); Procs. SecCo 2010
-
(2010)
EPTCS
, vol.51
, Issue.16-33
-
-
Best, E.1
Darondeau, P.2
Gorrieri, R.3
-
2
-
-
35048832336
-
A survey on non-interference with Petri nets
-
Busi, N., Gorrieri, R.: A Survey on Non-Interference with Petri Nets. In: Desel, J., Reisig, W., Rozenberg, G. (eds.) Lectures on Concurrency and Petri Nets. LNCS, vol. 3098, pp. 328-344. Springer, Heidelberg (2004) (Pubitemid 39739362)
-
(2004)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.3098
, pp. 328-344
-
-
Busi, N.1
Gorrieri, R.2
-
3
-
-
33747039373
-
Positive non-interference in elementary and trace nets
-
In: Cortadella, J., Reisig, W. (eds.) Springer, Heidelberg
-
Busi, N., Gorrieri, R.: Positive Non-Interference in Elementary and Trace Nets. In: Cortadella, J., Reisig, W. (eds.) ICATPN 2004. LNCS, vol. 3099, pp. 1-16. Springer, Heidelberg (2004)
-
(2004)
ICATPN 2004. LNCS
, vol.3099
, pp. 1-16
-
-
Busi, N.1
Gorrieri, R.2
-
4
-
-
74049123448
-
Structural non-interference in elementary and trace nets
-
Busi, N., Gorrieri, R.: Structural Non-Interference in Elementary and Trace Nets. Mathematical Structures in Computer Science 19(6), 1065-1090 (2009)
-
(2009)
Mathematical Structures in Computer Science
, vol.19
, Issue.6
, pp. 1065-1090
-
-
Busi, N.1
Gorrieri, R.2
-
5
-
-
4944242009
-
Modelling downgrading in information flow security
-
IEEE Press, Los Alamitos
-
Bossi, A., Piazza, C., Rossi, S.: Modelling Downgrading in Information Flow Security. In: Procs. 17th IEEE Computer Security Foundations Workshop (CSFW 2004), pp. 187-201. IEEE Press, Los Alamitos (2004)
-
(2004)
Procs. 17th rftxt IEEE Computer Security Foundations Workshop (CSFW 2004
, pp. 187-201
-
-
Bossi, A.1
Piazza, C.2
Rossi, S.3
-
6
-
-
0037751119
-
Elementary net systems
-
In: Reisig, W., Rozenberg, G. (eds.) Springer, Heidelberg
-
Engelfriet, J., Rozenberg, G.: Elementary Net Systems. In: Reisig, W., Rozenberg, G. (eds.) APN 1998. LNCS, vol. 1491, pp. 12-121. Springer, Heidelberg (1998)
-
(1998)
APN 1998. LNCS
, vol.1491
, pp. 12-121
-
-
Engelfriet, J.1
Rozenberg, G.2
-
8
-
-
0001439194
-
The compositional security checker: A tool for the verification of information flow security properties
-
Focardi, R., Gorrieri, R.: The Compositional Security Checker: A Tool for the Verification of Information Flow Security Properties. IEEE Transactions on Software Engineering 23(9), 550-571 (1997) (Pubitemid 127828315)
-
(1997)
IEEE Transactions on Software Engineering
, vol.23
, Issue.9
, pp. 550-571
-
-
Focardi, R.1
Gorrieri, R.2
-
9
-
-
84988393004
-
Classification of Security Properties (Part I: Information Flow)
-
Foundations of Security Analysis and Design
-
Focardi, R., Gorrieri, R.: Classification of Security Properties (Part I: Information Flow). In: Focardi, R., Gorrieri, R. (eds.) FOSAD 2000. LNCS, vol. 2171, pp. 331-396. Springer, Heidelberg (2001) (Pubitemid 33364383)
-
(2001)
Lecture Notes in Computer Science
, Issue.2171
, pp. 331-396
-
-
Focardi, R.1
Gorrieri, R.2
-
10
-
-
67650649695
-
Structural noninterference at work: The petri net security checker
-
In: Degano, P., Guttman, J., Martinelli, F. (eds.) Springer, Heidelberg
-
Frau, S., Gorrieri, R., Ferigato, C.: Structural Noninterference at Work: The Petri Net Security Checker. In: Degano, P., Guttman, J., Martinelli, F. (eds.) FAST 2008. LNCS, vol. 5491, pp. 210-225. Springer, Heidelberg (2009)
-
(2009)
FAST 2008. LNCS
, vol.5491
, pp. 210-225
-
-
Frau, S.1
Gorrieri, R.2
Ferigato, C.3
-
11
-
-
21344432090
-
Characterizing intransitive noninterference for 3-domain security policies with observability
-
Hadj-Alouane, N.B., Lafrance, S., Lin, F., Mullins, J., Yeddes, M.M.: Characterizing Intransitive Noninterference for 3-Domain Security Policies With Observability. IEEE Transactions on Automatic Control 50(6), 920-925 (2005)
-
(2005)
IEEE Transactions on Automatic Control
, vol.50
, Issue.6
, pp. 920-925
-
-
Hadj-Alouane, N.B.1
Lafrance, S.2
Lin, F.3
Mullins, J.4
Yeddes, M.M.5
-
12
-
-
26844532854
-
-
IEEE Transactions on Systems, Man, and Cybernetics, Part B
-
Hadj-Alouane, N.B., Lafrance, S., Lin, F., Mullins, J., Yeddes, M.M.: On the verification of intransitive noninterference in multilevel security. IEEE Transactions on Systems, Man, and Cybernetics, Part B 35(5), 948-958 (2005)
-
(2005)
On the Verification of Intransitive Noninterference in Multilevel Security
, vol.35
, Issue.5
, pp. 948-958
-
-
Hadj-Alouane, N.B.1
Lafrance, S.2
Lin, F.3
Mullins, J.4
Yeddes, M.M.5
-
16
-
-
0041386390
-
Bisimulation-based nondeterministic admissible interference and ita applications to the analysis of cryptographic protocols
-
Preliminary version in Electronic Notes in Theoretical Computer Science 61, 1-24 (2002)
-
Lafrance, S., Mullins, J.: Bisimulation-based Nondeterministic Admissible Interference and ita Applications to the Analysis of Cryptographic Protocols. Information and Software Technology 45(11), 779-790 (2003); Preliminary version in Electronic Notes in Theoretical Computer Science 61, 1-24 (2002)
-
(2003)
Information and Software Technology
, vol.45
, Issue.11
, pp. 779-790
-
-
Lafrance, S.1
Mullins, J.2
-
17
-
-
38049082649
-
What, indeed, is intransitive noninterference?
-
In: Biskup, J., López, J. (eds.), Springer, Heidelberg
-
van der Meyden, R.: What, Indeed, Is Intransitive Noninterference? In: Biskup, J., López, J. (eds.) ESORICS 2007. LNCS, vol. 4734, pp. 235-250. Springer, Heidelberg (2007)
-
(2007)
ESORICS 2007. LNCS
, vol.4734
, pp. 235-250
-
-
Van Der Meyden, R.1
-
19
-
-
0042361083
-
Nondeterministic admissible interference
-
Mullins, J.: Nondeterministic Admissible Interference. Journal of Universal Computer Science 11, 1054-1070 (2000)
-
(2000)
Journal of Universal Computer Science
, vol.11
, pp. 1054-1070
-
-
Mullins, J.1
-
20
-
-
0029228214
-
Absorbing covers and intransitive noninterference
-
IEEE CS press, Los Alamitos
-
Pinsky, S.: Absorbing Covers and Intransitive Noninterference. In: Proc. of IEEE Symposium on Security and Privacy (SSP 1995), pp. 102-113. IEEE CS press, Los Alamitos (1995)
-
(1995)
Proc. of IEEE Symposium on Security and Privacy (SSP 1995
, pp. 102-113
-
-
Pinsky, S.1
-
24
-
-
84949243805
-
Mathematical Models of Computer Security
-
Foundations of Security Analysis and Design
-
Ryan, P.Y.A.: Mathematical Models of Computer Security. In: Focardi, R., Gorrieri, R. (eds.) FOSAD 2000. LNCS, vol. 2171, pp. 1-62. Springer, Heidelberg (2001) (Pubitemid 33364378)
-
(2001)
Lecture Notes in Computer Science
, Issue.2171
, pp. 1-62
-
-
Ryan, P.Y.A.1
|