-
2
-
-
0037834671
-
A decidable notion of timed noninterference
-
Barbuti, R., & Tesei, L. (2003). A decidable notion of timed noninterference. Fundamenta Informaticae, 54, 137-150.
-
(2003)
Fundamenta Informaticae
, vol.54
, pp. 137-150
-
-
Barbuti, R.1
Tesei, L.2
-
3
-
-
37149048216
-
A certified lightweight non-interference java bytecode verifier
-
R. De Nicola (Ed.) Braga: Springer-Verlag
-
Barthe, G., Pichardie, D., & Rezk, T. (2007). A certified lightweight non-interference java bytecode verifier. In R. De Nicola (Ed.), Proceedings of the 16th European conference on Programming (ESOP'07) (pp. 125-140). Braga: Springer-Verlag.
-
(2007)
Proceedings of the 16th European Conference on Programming (ESOP'07)
, pp. 125-140
-
-
Barthe, G.1
Pichardie, D.2
Rezk, T.3
-
4
-
-
70350455940
-
Synthesis of non-interferent timed systems
-
September In J. Ouaknine & F.W. Vaandrager (Eds.) Budapest: Springer
-
Benattar, G., Cassez, F., Lime, D., & Roux, O.H. (2009, September). Synthesis of non-interferent timed systems. In J. Ouaknine & F.W. Vaandrager (Eds.), Proceedings of the 7th International Conference on Formal Modeling and Analysis of Timed Systems (FORMATS'09), Lecture Notes in Computer Science (Vol. 5813, pp. 28-42). Budapest: Springer.
-
(2009)
Proceedings of the 7th International Conference on Formal Modeling and Analysis of Timed Systems (FORMATS'09), Lecture Notes in Computer Science
, vol.5813
, pp. 28-42
-
-
Benattar, G.1
Cassez, F.2
Lime, D.3
Roux, O.H.4
-
5
-
-
35348884907
-
Exposing private information by timing web applications
-
P. Patel-Schneider & P. Shenoy (Eds.) Banff, Alberta, Canada: ACM
-
Bortz, A., & Boneh, D. (2007). Exposing private information by timing web applications. In P. Patel-Schneider & P. Shenoy (Eds.), Proceedings of the 16th International Conference on World Wide Web (WWW '07) (pp. 621-628). Banff, Alberta, Canada: ACM.
-
(2007)
Proceedings of the 16th International Conference on World Wide Web (WWW '07)
, pp. 621-628
-
-
Bortz, A.1
Boneh, D.2
-
6
-
-
34249893892
-
Compositional information flow security for concurrent programs
-
Bossi, A., Piazza, C., & Rossi, S. (2007). Compositional information flow security for concurrent programs. Journal of Computer Security, 15, 373-416.
-
(2007)
Journal of Computer Security
, vol.15
, pp. 373-416
-
-
Bossi, A.1
Piazza, C.2
Rossi, S.3
-
7
-
-
35248875802
-
Timed control with partial observability
-
July In W.H. Jr & F. Somenzi (Eds.) Boulder, CO: Springer
-
Bouyer, P., D'Souza, D., Madhusudan, P., & Petit, A. (2003, July). Timed control with partial observability. In W.H. Jr & F. Somenzi (Eds.), Proceedings of the 15th International Conference on Computer Aided Verification (CAV'03), Lecture Notes in Computer Science (Vol. 2725, pp. 180-192). Boulder, CO: Springer.
-
(2003)
Proceedings of the 15th International Conference on Computer Aided Verification (CAV'03), Lecture Notes in Computer Science
, vol.2725
, pp. 180-192
-
-
Bouyer, P.1
D'souza, D.2
Madhusudan, P.3
Petit, A.4
-
8
-
-
70350624877
-
The dark side of timed opacity
-
June In J. H. Park, H.-H. Chen, M. Atiquzzaman, C. Lee, T, Kim, & S.-S. Yeo (Eds.) Seoul: Springer
-
Cassez, F. (2009, June). The dark side of timed opacity. In J. H. Park, H.-H. Chen, M. Atiquzzaman, C. Lee, T, Kim, & S.-S. Yeo (Eds.), Proceedings of the 3rd International Conference on Information Security and Assurance (ISA'09), Lecture Notes in Computer Science (Vol. 5576, pp. 21-30). Seoul: Springer.
-
(2009)
Proceedings of the 3rd International Conference on Information Security and Assurance (ISA'09), Lecture Notes in Computer Science
, vol.5576
, pp. 21-30
-
-
Cassez, F.1
-
9
-
-
71549125929
-
Dynamic observers for the synthesis of opaque systems
-
October In Z. Liu & A.P. Ravn (Eds.) Macao, China: Springer
-
Cassez, F., Dubreil, J., &Marchand, H. (2009, October). Dynamic observers for the synthesis of opaque systems. In Z. Liu & A.P. Ravn (Eds.), 7th International Symposium on Automated Technology for Verification and Analysis (ATVA'09), Lecture Notes in Computer Science (Vol. 5799, pp. 352-367).Macao, China: Springer
-
(2009)
7th International Symposium on Automated Technology for Verification and Analysis (ATVA'09), Lecture Notes in Computer Science
, vol.5799
, pp. 352-367
-
-
Cassez, F.1
Dubreil, J.2
Marchand, H.3
-
10
-
-
84857190463
-
Synthesis of opaque systems with static and dynamicmasks
-
Cassez, F., Dubreil, J., & Marchand, H. (2012). Synthesis of opaque systems with static and dynamicmasks. Formal Methods in System Design, 40, 88-115.
-
(2012)
Formal Methods in System Design
, vol.40
, pp. 88-115
-
-
Cassez, F.1
Dubreil, J.2
Marchand, H.3
-
11
-
-
68949166100
-
Synthesis of noninterferent systems
-
V. Gorodetsky, I. Kotenko, & V. Skormin (Eds.) St. Petersburg, Russia: Springer
-
Cassez, F., Mullins, J., & Roux, O.H. (2007). Synthesis of noninterferent systems. In V. Gorodetsky, I. Kotenko, & V. Skormin (Eds.), 4th International Conference on Mathematical Methods,Models and Architectures forComputer Network Security (MMM-ACNS'07), Communications in Computer and Information Science (Vol. 1, pp. 307-321). St. Petersburg, Russia: Springer.
-
(2007)
4th International Conference on Mathematical Methods,Models and Architectures ForComputer Network Security (MMM-ACNS'07), Communications in Computer and Information Science
, vol.1
, pp. 307-321
-
-
Cassez, F.1
Mullins, J.2
Roux, O.H.3
-
13
-
-
84937406851
-
Timed control synthesis for external specifications
-
H. Alt & A. Ferreira (Eds.) Antibes-Juan les Pins, France: Springer
-
D'Souza, D., & Madhusudan, P. (2002). Timed control synthesis for external specifications. In H. Alt & A. Ferreira (Eds.), 19th Annual Symposium on Theoretical Aspects of Computer Science (STACS'02), Lecture Notes in Computer Science (Vol. 2285, pp. 571-582). Antibes-Juan les Pins, France: Springer.
-
(2002)
19th Annual Symposium on Theoretical Aspects of Computer Science (STACS'02), Lecture Notes in Computer Science
, vol.2285
, pp. 571-582
-
-
D'souza, D.1
Madhusudan, P.2
-
14
-
-
23144453688
-
An automata based approach for verifying information flow properties
-
D'Souza, D., Raghavendra, K.R., & Sprick, B. (2005). An automata based approach for verifying information flow properties. Electronic Notes in Theoretical Computer Science, 135, 39-58.
-
(2005)
Electronic Notes in Theoretical Computer Science
, vol.135
, pp. 39-58
-
-
D'souza, D.1
Raghavendra, K.R.2
Sprick, B.3
-
15
-
-
0034449227
-
Timing attacks on Web privacy
-
P. Samarati (Ed.) New York, NY: ACM Press
-
Felten, E.W., & Schneider, M.A. (2000). Timing attacks on Web privacy. In P. Samarati (Ed.), CCS '00: Proceedings of the 7th ACMConference on Computer and Communications Security, Athens (pp. 25-32). New York, NY: ACM Press.
-
(2000)
CCS '00: Proceedings of the 7th ACMConference on Computer and Communications Security, Athens
, pp. 25-32
-
-
Felten, E.W.1
Schneider, M.A.2
-
17
-
-
0003313017
-
Using non-interference for the analysis of security protocols
-
September In H. Orman&C. Meadows (Eds.) Piscataway, NJ: Rutgers University
-
Focardi, R., Ghelli, A., & Gorrieri, R. (1997, September). Using non-interference for the analysis of security protocols. In H. Orman&C. Meadows (Eds.), Proceedings of DIMACSWorkshop on Design and Formal Verification of Security Protocols. Piscataway, NJ: Rutgers University.
-
(1997)
Proceedings of DIMACSWorkshop on Design and Formal Verification of Security Protocols
-
-
Focardi, R.1
Ghelli, A.2
Gorrieri, R.3
-
18
-
-
0001439194
-
The compositional security checker: A tool for the verification of information flow security properties
-
Focardi, R., & Gorrieri, R. (1997). The compositional security checker: A tool for the verification of information flow security properties. IEEE Transactions on Software Engineering, 23, 550-571.
-
(1997)
IEEE Transactions on Software Engineering
, vol.23
, pp. 550-571
-
-
Focardi, R.1
Gorrieri, R.2
-
19
-
-
84988393004
-
Classification of security properties (Part I: Information flow)
-
R. Focardi & R. Gorrieri (Eds.) Heidelberg: Springer-Verlag
-
Focardi, R., & Gorrieri, R. (2001). Classification of security properties (Part I: Information flow). In R. Focardi & R. Gorrieri (Eds.), Foundations of Security Analysis and Design I: FOSAD 2000 Tutorial Lectures, Lecture Notes in Computer Science (Vol. 2171, pp. 331-396). Heidelberg: Springer-Verlag.
-
(2001)
Foundations of Security Analysis and Design I: FOSAD 2000 Tutorial Lectures, Lecture Notes in Computer Science
, vol.2171
, pp. 331-396
-
-
Focardi, R.1
Gorrieri, R.2
-
20
-
-
34250004057
-
Noninterference control synthesis for security timed automata
-
August In M. Backes & A. Scedrov (Eds.) San Francisco, CA: Elsevier
-
Gardey, G., Mullins, J., & Roux, O.H. (2005, August). Noninterference control synthesis for security timed automata. In M. Backes & A. Scedrov (Eds.), 3rd International Workshop on Security Issues in Concurrency (SecCo'05), Electronic Notes in Theoretical Computer Science (pp. 33-53). San Francisco, CA: Elsevier.
-
(2005)
3rd International Workshop on Security Issues in Concurrency (SecCo'05), Electronic Notes in Theoretical Computer Science
, pp. 33-53
-
-
Gardey, G.1
Mullins, J.2
Roux, O.H.3
-
21
-
-
21344432090
-
Characterizing intransitive noninterference for 3-domain security policieswith observability
-
Hadj-Alouane, N.B., Lafrance, S., Lin, F., Mullins, J., & Yeddes, M. (2005a). Characterizing intransitive noninterference for 3-domain security policieswith observability. IEEE Transaction on Automatic Control, 50, 948-958.
-
(2005)
IEEE Transaction on Automatic Control
, vol.50
, pp. 948-958
-
-
Hadj-Alouane, N.B.1
Lafrance, S.2
Lin, F.3
Mullins, J.4
Yeddes, M.5
-
22
-
-
26844532854
-
On the verification of intransitive noninterference in multilevel security
-
Hadj-Alouane, N.B., Lafrance, S., Lin, F., Mullins, J., & Yeddes, M. (2005b).On the verification of intransitive noninterference in multilevel security. IEEE Transactions on Systems, Man and Cybernetics, 35, 948-958.
-
(2005)
IEEE Transactions on Systems, Man and Cybernetics
, vol.35
, pp. 948-958
-
-
Hadj-Alouane, N.B.1
Lafrance, S.2
Lin, F.3
Mullins, J.4
Yeddes, M.5
-
23
-
-
84951072180
-
Discrete-time control for rectangular hybrid automata
-
P. Degano, R. Gorrieri, & A. Marchetti-Spaccamela (Eds.) Bologna, Italy: Santa Barabara
-
Henzinger, T., & Kopke, P. (1997). Discrete-time control for rectangular hybrid automata. In P. Degano, R. Gorrieri, & A. Marchetti-Spaccamela (Eds.), International Colloquium on Automata, Languages and Programming (ICALP'97) (pp. 582-593). Bologna, Italy: Santa Barabara.
-
(1997)
International Colloquium on Automata, Languages and Programming (ICALP'97)
, pp. 582-593
-
-
Henzinger, T.1
Kopke, P.2
-
24
-
-
43449093752
-
Formalizing non-interference for a simple bytecode language in Coq
-
Kammuller, F. (2008). Formalizing non-interference for a simple bytecode language in Coq. Formal Aspects of Computing, 20, 259-275.
-
(2008)
Formal Aspects of Computing
, vol.20
, pp. 259-275
-
-
Kammuller, F.1
-
25
-
-
84943632039
-
Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems
-
N. Koblitz (Ed.) Santa Barabara, CA: Springer-Verlag
-
Kocher, P.C. (1996). Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems. In N. Koblitz (Ed.), International CryptologyConference (CRYPTO'96) (pp. 104-113). Santa Barabara, CA: Springer-Verlag.
-
(1996)
International CryptologyConference (CRYPTO'96)
, pp. 104-113
-
-
Kocher, P.C.1
-
26
-
-
84889014267
-
Cross-origin pixel stealing: Timing attacks using CSS filters
-
V. Gligor & M. Yung (Eds.) Berlin: ACM
-
Kotcher, R., Pei, Y., Jumde, P., & Jackson, C. (2013). Cross-origin pixel stealing: timing attacks using CSS filters. In V. Gligor & M. Yung (Eds.), Proceedings of the 2013 ACM SIGSAC conference on computer and communications security (pp. 1055-1062). Berlin: ACM.
-
(2013)
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security
, pp. 1055-1062
-
-
Kotcher, R.1
Pei, Y.2
Jumde, P.3
Jackson, C.4
-
27
-
-
70449657350
-
Noninterference for a practical DIFC-based operating system
-
A.Myers&D. Evans (Eds.) Washington, DC: IEEE Computer Society
-
Krohn, M., & Tromer, E. (2009). Noninterference for a practical DIFC-based operating system. In A.Myers&D. Evans (Eds.), Proceedings of the 2009 30th IEEE Symposium on Security and Privacy (pp. 61-76). Washington, DC: IEEE Computer Society.
-
(2009)
Proceedings of the 2009 30th IEEE Symposium on Security and Privacy
, pp. 61-76
-
-
Krohn, M.1
Tromer, E.2
-
28
-
-
0037581263
-
Synthesis with incomplete information
-
H. Barringer, M. Fisher, D. Gabbay & G. Gough (Eds.) Manchester, UK: Kluwer
-
Kupferman, O., & Vardi, M. (1997). Synthesis with incomplete information. In H. Barringer, M. Fisher, D. Gabbay & G. Gough (Eds.), Proceedings of the 2nd International Conference on Temporal Logic (ICTL'97) (pp. 91-106). Manchester, UK: Kluwer.
-
(1997)
Proceedings of the 2nd International Conference on Temporal Logic (ICTL'97)
, pp. 91-106
-
-
Kupferman, O.1
Vardi, M.2
-
29
-
-
0034439108
-
Effective control synthesis for des under partial observations
-
Sydney, Australia: IEEE
-
Lamouchi, H., & Thistle, J. (2000). Effective control synthesis for DES under partial observations. In IEEE Conference on Decision and Control (pp. 22-28). Sydney, Australia: IEEE.
-
(2000)
IEEE Conference on Decision and Control
, pp. 22-28
-
-
Lamouchi, H.1
Thistle, J.2
-
30
-
-
84878630347
-
The state-explosion problem from trace to bisimulation equivalence
-
J. Tiuryn (Ed.) Berlin, Germany: Springer-Verlag
-
Laroussinie, F., & Schnoebelen, P. (2000). The state-explosion problem from trace to bisimulation equivalence. In J. Tiuryn (Ed.), Foundations of Software Science and Computation Structures (FoSSaCS 2000), Lecture Notes in Computer Science (Vol. 1784, pp. 192-207). Berlin, Germany: Springer-Verlag.
-
(2000)
Foundations of Software Science and Computation Structures (FoSSaCS 2000), Lecture Notes in Computer Science
, vol.1784
, pp. 192-207
-
-
Laroussinie, F.1
Schnoebelen, P.2
-
31
-
-
0023995784
-
On observability of discrete-event systems
-
Lin, F., &Wonham, W. (1988). On observability of discrete-event systems. Information Sciences, 44, 173-198.
-
(1988)
Information Sciences
, vol.44
, pp. 173-198
-
-
Lin, F.1
Wonham, W.2
-
32
-
-
0029270831
-
Supervisory control of timed discrete-event systems under partial observation
-
Lin, F., & Wonham, W. (1995). Supervisory control of timed discrete-event systems under partial observation. IEEE Transactions on Automatic Control, 40, 558-562.
-
(1995)
IEEE Transactions on Automatic Control
, vol.40
, pp. 558-562
-
-
Lin, F.1
Wonham, W.2
-
33
-
-
84947771104
-
On the synthesis of discrete controllers for timed systems
-
E.W. Mayr, & C. Puech (Eds.) Munich, Germany: Springer
-
Maler, O., Pnueli, A., & Sifakis, J. (1995). On the synthesis of discrete controllers for timed systems. In E.W. Mayr, & C. Puech (Eds.), Annual Symposium on Theoretical Aspects of Computer Science (STACS '95) (pp. 229-242).Munich, Germany: Springer.
-
(1995)
Annual Symposium on Theoretical Aspects of Computer Science (STACS '95)
, pp. 229-242
-
-
Maler, O.1
Pnueli, A.2
Sifakis, J.3
-
35
-
-
68949196207
-
Modifying security policies for the satisfaction of intransitive noninterference
-
Moez, Y., Lin, F., & Ben Hadj-Alouane, N. (2009). Modifying security policies for the satisfaction of intransitive noninterference. IEEE Transactions on Automatic Control, 54, 1961-1966.
-
(2009)
IEEE Transactions on Automatic Control
, vol.54
, pp. 1961-1966
-
-
Moez, Y.1
Lin, F.2
Ben Hadj-Alouane, N.3
-
39
-
-
62949219238
-
Opacity-enforcing supervisory strategies for secure discrete event systems
-
Cancun, Mexico: IEEE
-
Saboori, A., & Hadjicostis, C. (2008). Opacity-enforcing supervisory strategies for secure discrete event systems. In the 47th IEEE Conference on Decision and Control (pp. 889-894). Cancun, Mexico: IEEE.
-
(2008)
The 47th IEEE Conference on Decision and Control
, pp. 889-894
-
-
Saboori, A.1
Hadjicostis, C.2
-
40
-
-
0015773009
-
Word problems requiring exponential time: Preliminary report
-
A.V. Aho, A.B. Borodin, R.L Constable, R.W. Floyd, M.A. Harrison, R.M. Karp, & H.R. Strong (Eds.) San Diego, CA: ACM
-
Stockmeyer, L.J., & Meyer, A.R. (1973). Word problems requiring exponential time: Preliminary report. In A.V. Aho, A.B. Borodin, R.L Constable, R.W. Floyd, M.A. Harrison, R.M. Karp, & H.R. Strong (Eds.), ACM Symposium on Theory of Computing (STOC'73) (pp. 1-9). San Diego, CA: ACM.
-
(1973)
ACM Symposium on Theory of Computing (STOC'73)
, pp. 1-9
-
-
Stockmeyer, L.J.1
Meyer, A.R.2
-
41
-
-
84955600342
-
Verifying abstractions of timed systems
-
U. Montanari & V. Sassone (Eds.) Pisa, Italy: Springer
-
Tasiran, S., Alur, R., Kurshan, R.P., & Brayton, R.K. (1996). Verifying abstractions of timed systems. In U. Montanari & V. Sassone (Eds.), Conference on Concurrency Theory (CONCUR' 96), Lecture Notes in Computer Science (Vol. 1119, pp. 546-562). Pisa, Italy: Springer.
-
(1996)
Conference on Concurrency Theory (CONCUR' 96), Lecture Notes in Computer Science
, vol.1119
, pp. 546-562
-
-
Tasiran, S.1
Alur, R.2
Kurshan, R.P.3
Brayton, R.K.4
-
42
-
-
33846606100
-
Algorithmic verification of noninterference properties
-
M. Beek & F. Gadducci (Eds.) Amsterdam, The Netherlands: Elsevier
-
van der Meyden, R., & Zhang, C. (2006). Algorithmic verification of noninterference properties. In M. Beek & F. Gadducci (Eds.), Proceedings of the Second International Workshop on Views on Designing Complex Architectures (VODCA 2006), Electronic Notes in Theoretical Computer Science (Vol. 168, pp. 61-75). Amsterdam, The Netherlands: Elsevier.
-
(2006)
Proceedings of the Second International Workshop on Views on Designing Complex Architectures (VODCA 2006), Electronic Notes in Theoretical Computer Science
, vol.168
, pp. 61-75
-
-
Van Der Meyden, R.1
Zhang, C.2
|