-
1
-
-
0001772130
-
Secrecy by Typing In Security protocols
-
M. Abadi. Secrecy by Typing In Security protocols. Journal of the ACM, 5(46):18– 36, September 1999
-
(1999)
Journal of the ACM
, vol.5
, Issue.46
-
-
Abadi, M.1
-
2
-
-
84937720349
-
Security protocols and specifications
-
Springer
-
M. Abadi. Security protocols and specifications. In FoSSaCS’99, LNCS 1578, pages 1–13. Springer, 1999
-
(1999)
FoSSaCS’99
, vol.1578
, pp. 1-13
-
-
Abadi, M.1
-
3
-
-
0035035153
-
Mobile Values, New names, and Secure Communication
-
ACM
-
M. Abadi, C. Fournet. Mobile Values, New names, and Secure Communication. In POPL’01, ACM, 2001
-
(2001)
POPL’01
-
-
Abadi, M.1
Fournet, C.2
-
4
-
-
84937555465
-
Secrecy Types for Asymmetric Communication
-
Springer
-
M. Abadi, B. Blanchet. Secrecy Types for Asymmetric Communication. In FoSSaCS’01, LNCS 2030, pages 25–41. Springer, 2001
-
(2001)
FoSSaCS’
, vol.2030
, pp. 25-41
-
-
Abadi, M.1
Blanchet, B.2
-
5
-
-
0003092378
-
A calculus for cryptographic protocols - The Spi calculus
-
M. Abadi and A. D. Gordon. A calculus for cryptographic protocols - The Spi calculus. Information and Computation 148, 1:1–70, January 1999
-
(1999)
Information and Computation
, vol.148
, Issue.1
, pp. 1-70
-
-
Abadi, M.1
Gordon, A.D.2
-
8
-
-
84945976575
-
Control flow analysis for the π-calculus
-
Springer
-
C. Bodei, P. Degano, F. Nielson, and H. Riis Nielson. Control flow analysis for the π-calculus. In CONCUR’98, LNCS 1466, pages 84–98. Springer, 1998
-
(1998)
CONCUR’98
, vol.1466
, pp. 84-98
-
-
Bodei, C.1
Degano, P.2
Nielson, F.3
Riis Nielson, H.4
-
9
-
-
0029711237
-
An approach to the formal verification of cryptographic protocols
-
ACMPress
-
D. Bolignano. An approach to the formal verification of cryptographic protocols. In 3rd ACM Conf. on Computer and Communications Security, pages 106–118. ACMPress, 1996
-
(1996)
3Rd ACM Conf. On Computer and Communications Security
, pp. 106-118
-
-
Bolignano, D.1
-
10
-
-
0000036723
-
Testing equivalence for mobile processes
-
M. Boreale and R. De Nicola. Testing equivalence for mobile processes. Informationand Computation, 120(2):279–303, August 1995
-
(1995)
Information
, vol.120
, Issue.2
, pp. 279-303
-
-
Boreale, M.1
De Nicola, R.2
-
11
-
-
0032670228
-
Types for mobile ambients
-
ACMPress
-
L. Cardelli and A.D. Gordon. Types for mobile ambients. In POPL’99, pages 79–92. ACMPress, 1999
-
(1999)
POPL’99
, pp. 79-92
-
-
Cardelli, L.1
Gordon, A.D.2
-
12
-
-
0000413440
-
Types for access control
-
R. De Nicola, G. Ferrari, and R. Pugliese, B. Venneri. Types for access control. Theoretical Computer Science 240(1): 215-254, June 2000
-
(2000)
Theoretical Computer Science
, vol.240
, Issue.1
, pp. 215-254
-
-
De Nicola, R.1
Ferrari, G.2
Pugliese, R.3
Venneri, B.4
-
13
-
-
0020845493
-
Testing equivalence for processes
-
R. De Nicola and M.C.B. Hennessy. Testing equivalence for processes. TheoreticalComputer Science, 34:83–133, 1984
-
(1984)
Theoretical
, vol.34
, pp. 83-133
-
-
De Nicola, R.1
Hennessy, M.2
-
14
-
-
0016949746
-
A Lattice Model of Secure Information Flow
-
D. E. Denning. A Lattice Model of Secure Information Flow. Communications ofthe ACM, pages 236–243, May 1976
-
(1976)
Communications Of
, pp. 236-243
-
-
Denning, D.E.1
-
15
-
-
0017517624
-
Certification of Programs for Secure Information Flow
-
D. E. Denning and P. J. Denning. Certification of Programs for Secure Information Flow. Communications of the ACM, pages 504–513, July 1977
-
(1977)
Communications of the ACM
, pp. 504-513
-
-
Denning, D.E.1
Denning, P.J.2
-
16
-
-
0020720357
-
On the security of public key protocols
-
D. Dolev and A.C. Yao. On the security of public key protocols. IEEE Transactionson Information Theory, IT-29(12):198–208, March 1983
-
(1983)
IEEE Transactions
, vol.29
, Issue.12
, pp. 198-208
-
-
Dolev, D.1
Yao, A.C.2
-
17
-
-
0020299523
-
Security policy and security models
-
IEEE Press
-
J.A. Goguen and J. Meseguer. Security policy and security models. In 1982IEEESymposium on Research on Security and Privacy, pages 11–20. IEEE Press, 1982
-
(1982)
1982IEEE
, pp. 11-20
-
-
Goguen, J.A.1
Meseguer, J.2
-
18
-
-
84957649493
-
Abstract interpretation of mobile ambients
-
R. R. Hansen, J. G. Jensen, F. Nielson, and H. R. Nielson. Abstract interpretation of mobile ambients. In SAS’99, LNCS 1694, pages 135–148, 1999
-
(1999)
SAS’99
, vol.1694
, pp. 135-148
-
-
Hansen, R.R.1
Jensen, J.G.2
Nielson, F.3
Nielson, H.R.4
-
19
-
-
0031701347
-
The SLam calculus: Programming with secrecy and integrity
-
ACMPress
-
N. Heintze and J.G Riecke. The SLam calculus: Programming with secrecy and integrity. In POPL’98, pages 365–377. ACMPress, 1998
-
(1998)
POPL’98
, pp. 365-377
-
-
Heintze, N.1
Riecke, J.G.2
-
21
-
-
19144372969
-
Flow logics and operational semantics
-
F. Nielson and H. R. Nielson. Flow logics and operational semantics. ElectronicNotes of Theoretical Computer Science, 10, 1998
-
(1998)
Electronic
-
-
Nielson, F.1
Nielson, H.R.2
-
22
-
-
35048826704
-
Validating firewalls in mobile ambients
-
F. Nielson, H. R. Nielson, R. R. Hansen, and J. G. Jensen. Validating firewalls in mobile ambients. In CONCUR’99, LNCS 1664, pages 463–477, 1999
-
(1999)
CONCUR’99
, vol.1664
, pp. 463-477
-
-
Nielson, F.1
Nielson, H.R.2
Hansen, R.R.3
Jensen, J.G.4
-
23
-
-
84945268253
-
Control-Flow Analysis in Cubic Time
-
F. Nielson, H. Seidl. Control-Flow Analysis in Cubic Time. In ESOP’01, LNCS2028, pages 252–268, 2001
-
(2001)
ESOP’01
, vol.2028
, pp. 252-268
-
-
Nielson, F.1
Seidl, H.2
-
24
-
-
0013162780
-
Semantics with Applications: A Formal Introduction
-
H. Riis Nielson and F. Nielson. Semantics with Applications: A Formal Introduction. Wiley Professional Computing. Wiley, 1992
-
(1992)
Wiley
-
-
Riis Nielson, H.1
Nielson, F.2
-
26
-
-
0030705795
-
Proving properties of security protocols by induction
-
IEEE
-
L.C. Paulson. Proving properties of security protocols by induction. In CSFW’97, pages 70–83. IEEE, 1997
-
(1997)
CSFW’97
, pp. 70-83
-
-
Paulson, L.C.1
-
27
-
-
0031675817
-
A typed language for distributed mobile processes
-
ACMPress
-
J. Riely and M. Hennessy. A typed language for distributed mobile processes. In POPL’98, pages 378–390. ACMPress, 1998
-
(1998)
POPL’98
, pp. 378-390
-
-
Riely, J.1
Hennessy, M.2
-
28
-
-
0032646395
-
Trust and partial typing in open systems of mobile agents
-
ACMPress
-
J. Riely and M. Hennessy. Trust and partial typing in open systems of mobile agents. In POPL’99, pages 93–104. ACMPress, 1999
-
(1999)
POPL’99
, pp. 93-104
-
-
Riely, J.1
Hennessy, M.2
-
29
-
-
0346166969
-
Language Issues in Mobile Program Security
-
Springer
-
D. Volpano and G. Smith. Language Issues in Mobile Program Security. In MobileAgent Security, LNCS 1419, pages 25–43. Springer, 1998
-
(1998)
Mobile
, vol.1419
, pp. 25-43
-
-
Volpano, D.1
Smith, G.2
-
30
-
-
0031633213
-
Probabilistic noninterference in a concurrent language
-
IEEE
-
D. Volpano and G. Smith. Probabilistic noninterference in a concurrent language. In CSFW’98, pages 34–43. IEEE, 1998
-
(1998)
CSFW’98
, pp. 34-43
-
-
Volpano, D.1
Smith, G.2
-
31
-
-
0031648455
-
Secure information flow in a multi-threaded imperative language
-
ACMPress
-
D. Volpano and G. Smith. Secure information flow in a multi-threaded imperative language. In POPL’98, pages 355–364. ACMPress, 1998
-
(1998)
POPL’98
, pp. 355-364
-
-
Volpano, D.1
Smith, G.2
|