-
1
-
-
0002652530
-
Security protocols and their properties
-
F. L. Bauer and R. Steinbrueggen, editors, IOS Press, 20th Int. Summer School, Marktoberdorf, Germany
-
M. Abadi. Security protocols and their properties. In F.L. Bauer and R. Steinbrueggen, editors, Foundations of Secure Computation, pages 39-60. IOS Press, 2000. 20th Int. Summer School, Marktoberdorf, Germany.
-
(2000)
Foundations of Secure Computation
, pp. 39-60
-
-
Abadi, M.1
-
2
-
-
0003092378
-
A calculus for cryptographic protocols: The spi calculus
-
January
-
M. Abadi and Andrew D. Gordon. A calculus for cryptographic protocols: The spi calculus. Information and Computation, 148(1):1-70, January 1999.
-
(1999)
Information and Computation
, vol.148
, Issue.1
, pp. 1-70
-
-
Abadi, M.1
Gordon, A.D.2
-
5
-
-
84885216946
-
Reconciling two views of cryptography (invited lecture)
-
Japan, August
-
M. Abadi and P. Rogaway. Reconciling two views of cryptography (invited lecture). In TCS 2000 (IFIP conference), Japan, August 2000.
-
(2000)
TCS 2000 (IFIP Conference)
-
-
Abadi, M.1
Rogaway, P.2
-
7
-
-
2942751834
-
A logical basis for component-based systems engineering
-
M. Broy and R. Steinbruggen, editors, IOS Press
-
M. Broy. A logical basis for component-based systems engineering. In M. Broy and R. Steinbruggen, editors, Calculational System Design. IOS Press, 1999.
-
(1999)
Calculational System Design
-
-
Broy, M.1
-
11
-
-
84895411666
-
Formal and informal specifications of a secure system component: First results in a comparative study
-
M. Naftalin, B. T. Denvir, and M. Bertran, editors, Springer
-
S. Fitzgerald, T. M. Brookes, M. A. Green, and P. G. Larsen. Formal and informal specifications of a secure system component: first results in a comparative study. In M. Naftalin, B. T. Denvir, and M. Bertran, editors, FME'94: Industrial Benefit of Formal Methods, pages 35-44. Springer, 1994.
-
(1994)
FME'94: Industrial Benefit of Formal Methods
, pp. 35-44
-
-
Fitzgerald, S.1
Brookes, T.M.2
Green, M.A.3
Larsen, P.G.4
-
12
-
-
0003422822
-
Tool supported Specification and Simulation of Distributed Systems
-
F. Huber, S. Molterer, A. Rausch, B. Schatz, M. Sihling, and O. Slotosch. Tool supported Specification and Simulation of Distributed Systems. In International Symposium on Software Engineering for Parallel and Distributed Systems, pages 155-164, 1998.
-
(1998)
International Symposium on Software Engineering for Parallel and Distributed Systems
, pp. 155-164
-
-
Huber, F.1
Molterer, S.2
Rausch, A.3
Schatz, B.4
Sihling, M.5
Slotosch, O.6
-
15
-
-
84885216103
-
Secure information flow for concurrent processes
-
C. Palamidessi, editor, Pennsylvania, Springer
-
Jan Jürjens. Secure information flow for concurrent processes. In C. Palamidessi, editor, CONCUR 2000 (11th International Conference on Concurrency Theory), volume 1877 of LNCS, pages 395-409, Pennsylvania, 2000. Springer.
-
(2000)
CONCUR 2000 (11th International Conference on Concurrency Theory), Volume 1877 of LNCS
, pp. 395-409
-
-
Jürjens, J.1
-
16
-
-
84944220091
-
Towards development of secure systems using UML
-
H. Hußmann, editor, Springer, to be published
-
Jan Jürjens. Towards development of secure systems using UML. In H. Hußmann, editor, Fundamental Approaches to Software Engineering, LNCS. Springer, 2001. to be published.
-
(2001)
Fundamental Approaches to Software Engineering, LNCS
-
-
Jürjens, J.1
-
17
-
-
84881166476
-
Formal modelling and simulation in the development of a security-critical message processing system
-
P. G. Larsen, S. Fitzgerald, T. M. Brookes, and M. A. Green. Formal modelling and simulation in the development of a security-critical message processing system. In Formal Methods, Modelling and Simulation for Systems Engineering, 1995.
-
(1995)
Formal Methods, Modelling and Simulation for Systems Engineering
-
-
Larsen, P.G.1
Fitzgerald, S.2
Brookes, T.M.3
Green, M.A.4
-
20
-
-
0003307796
-
Security models
-
John Marciniak, editor, Wiley & Sons, Inc.
-
J. McLean. Security models. In John Marciniak, editor, Encyclopedia of Software Engineering. Wiley & Sons, Inc., 1994.
-
(1994)
Encyclopedia of Software Engineering
-
-
McLean, J.1
-
21
-
-
0002426876
-
A general theory of composition for a class of possibilistic properties
-
J. McLean. A general theory of composition for a class of "possibilistic" properties. IEEE Transactions on Software Engineering, 22(1):53-67, 1996.
-
(1996)
IEEE Transactions on Software Engineering
, vol.22
, Issue.1
, pp. 53-67
-
-
McLean, J.1
-
22
-
-
0026850058
-
Using traces based on procedure calls to reason about com-posability
-
C. Meadows. Using traces based on procedure calls to reason about com-posability. In IEEE Symposium on Security and Privacy, pages 177 - 188, 1992.
-
(1992)
IEEE Symposium on Security and Privacy
, pp. 177-188
-
-
Meadows, C.1
-
23
-
-
0001566477
-
Formal verification of cryptographic protocols: A survey
-
C. Meadows. Formal verification of cryptographic protocols: A survey. In Asiacrypt 96, 1996.
-
(1996)
Asiacrypt
, vol.96
-
-
Meadows, C.1
-
25
-
-
0002219322
-
An attack on a recursive authentication protocol
-
P. Ryan and S. Schneider. An attack on a recursive authentication protocol. Inform. Proc. Letters, 65:7-10, 1998.
-
(1998)
Inform Proc. Letters
, vol.65
, pp. 7-10
-
-
Ryan, P.1
Schneider, S.2
-
29
-
-
0016555241
-
The protection of information in computer systems
-
September
-
J. Saltzer and M. Schroeder. The protection of information in computer systems. Proceedings of the IEEE, 63(9):1278-1308, September 1975.
-
(1975)
Proceedings of the IEEE
, vol.63
, Issue.9
, pp. 1278-1308
-
-
Saltzer, J.1
Schroeder, M.2
-
30
-
-
0033719707
-
Secure composition of untrusted code: Wrappers and causality types
-
P. Sewell and J. Vitek. Secure composition of untrusted code: Wrappers and causality types. In CSFW, 2000.
-
(2000)
CSFW
-
-
Sewell, P.1
Vitek, J.2
|