-
2
-
-
0011122743
-
Comparing the QoS of Internet Audio Mechanisms via Formal Methods
-
ACM Press
-
A. Aldini, M. Bernardo, R. Gorrieri, M. Roccetti, “Comparing the QoS of Internet Audio Mechanisms via Formal Methods”, ACM Transactions on Modelling and Computer Simulation, ACM Press, Vol. 11, N. 1, 2001
-
(2001)
ACM Transactions on Modelling and Computer Simulation
, vol.11
, Issue.1
-
-
Aldini, A.1
Bernardo, M.2
Gorrieri, R.3
Roccetti, M.4
-
4
-
-
58149326570
-
Axiomatizing Probabilistic Processes: ACP with Generative Probabilities
-
J.C.M. Baeten, J.A. Bergstra, S.A. Smolka, “Axiomatizing Probabilistic Processes: ACP with Generative Probabilities”, in Information and Comp. 121:234-255, 1995
-
(1995)
Information and Comp
, vol.121
, pp. 234-255
-
-
Baeten, J.1
Bergstra, J.A.2
Smolka, S.A.3
-
6
-
-
0037209771
-
-
Tech. Rep. UBLCS-2000-03, University of Bologna, Italy, to appear in Theoretical Computer Science
-
M. Bravetti, A. Aldini, “Discrete Time Generative-reactive Probabilistic Processes with Different Advancing Speeds”, Tech. Rep. UBLCS-2000-03, University of Bologna, Italy, to appear in Theoretical Computer Science, 2001
-
(2001)
Discrete Time Generative-Reactive Probabilistic Processes with Different Advancing Speeds
-
-
Bravetti, M.1
Aldini, A.2
-
7
-
-
84944098549
-
-
to appear in Proc. of 28th International Colloquium on Automata, Languages and Programming, Springer LNCS
-
F. van Breugel, J. Worrell, “Towards Quantitative Verification of Probabilistic Systems (extended abstract)”, to appear in Proc. of 28th International Colloquium on Automata, Languages and Programming, Springer LNCS, 2001
-
(2001)
Towards Quantitative Verification of Probabilistic Systems (Extended Abstract)
-
-
Van Breugel, F.1
Worrell, J.2
-
8
-
-
35048876622
-
Possibilistic Information Flow is safe for Probabilistic Non-Interference
-
D. Clark, C. Hankin, S. Hunt, R. Nagarajan, “Possibilistic Information Flow is safe for Probabilistic Non-Interference”, in Work. on Issues in the Theory of Security, 2000
-
(2000)
Work. On Issues in the Theory of Security
-
-
Clark, D.1
Hankin, C.2
Hunt, S.3
Nagarajan, R.4
-
10
-
-
0039926997
-
A Compiler for Analysing Cryptographic Protocols Using Non-Interference
-
A. Durante, R. Focardi, R. Gorrieri, “A Compiler for Analysing Cryptographic Protocols Using Non-Interference”, in ACM TOSEM, special issue on Software Engineering & Security, Volume 9(4), pages 489-530, 2000
-
(2000)
ACM TOSEM, Special Issue on Software Engineering & Security
, vol.9
, Issue.4
, pp. 489-530
-
-
Durante, A.1
Focardi, R.2
Gorrieri, R.3
-
11
-
-
84944070422
-
Analysing Time Dependent Security Properties in CSP Using PVS
-
Springer LNCS 1895
-
N. Evans, S. Schneider, “Analysing Time Dependent Security Properties in CSP Using PVS”, in Proc. Symposium on Research in Computer Security, pp. 222-237, Springer LNCS 1895, 2000
-
(2000)
Proc. Symposium on Research in Computer Security
, pp. 222-237
-
-
Evans, N.1
Schneider, S.2
-
12
-
-
84974776068
-
A Classification of Security Properties
-
R. Focardi, R. Gorrieri, “A Classification of Security Properties”, Journal of Computer Security, 3(1):5-33, 1995
-
(1995)
Journal of Computer Security
, vol.3
, Issue.1
, pp. 5-33
-
-
Focardi, R.1
Gorrieri, R.2
-
13
-
-
0001439194
-
The Compositional Security Checker: A Tool for the Verification of Information Flow Security Properties
-
R. Focardi, R. Gorrieri, “The Compositional Security Checker: A Tool for the Verification of Information Flow Security Properties”, IEEE Trans. Sof. Eng., 27:550-571, 1997
-
(1997)
IEEE Trans. Sof. Eng
, vol.27
, pp. 550-571
-
-
Focardi, R.1
Gorrieri, R.2
-
14
-
-
0033725594
-
Information Flow Analysis in a Discrete- Time Process Algebra
-
R. Focardi, R. Gorrieri, F. Martinelli, “Information Flow Analysis in a Discrete- Time Process Algebra”, in Proc. of 13th IEEE Computer Security Foundations Work., pp. 170-184, 2000
-
(2000)
Proc. Of 13Th IEEE Computer Security Foundations Work
, pp. 170-184
-
-
Focardi, R.1
Gorrieri, R.2
Martinelli, F.3
-
15
-
-
84974597207
-
Non Interference for the Analysis of Cryptographic Protocols
-
R. Focardi, R. Gorrieri, F. Martinelli, “Non Interference for the Analysis of Cryptographic Protocols”, in Proc. of 27th International Colloquium on Automata, Languages and Programming, Springer LNCS 1853, pp. 354-372, 2000
-
(2000)
Proc. Of 27Th International Colloquium on Automata, Languages and Programming, Springer LNCS 1853
, pp. 354-372
-
-
Focardi, R.1
Gorrieri, R.2
Martinelli, F.3
-
16
-
-
0006419926
-
Reactive, Generative andStr atified Models of Probabilistic Processes
-
R.J. van Glabbeek, S.A. Smolka, B. Steffen, “Reactive, Generative andStr atified Models of Probabilistic Processes”, in Information and Comp. 121:59-80, 1995
-
(1995)
Information and Comp
, vol.121
, pp. 59-80
-
-
Van Glabbeek, R.J.1
Smolka, S.A.2
Steffen, B.3
-
18
-
-
84974759639
-
Towarda Mathematical Foundation for Information Flow Security
-
J.W. Gray, “Towarda Mathematical Foundation for Information Flow Security”, Journal of Computer Security, 1:255-294, 1992
-
(1992)
Journal of Computer Security
, vol.1
, pp. 255-294
-
-
Gray, J.W.1
-
28
-
-
0001868056
-
Noninterference through Determinism
-
Springer LNCS 875
-
A. W. Roscoe, J.C.P. Woodcock, L. Wulf, “Noninterference through Determinism”, in Proc. European Symposium on Research in Computer Security, pp. 33-53, Springer LNCS 875, 1994
-
(1994)
Proc. European Symposium on Research in Computer Security
, pp. 33-53
-
-
Roscoe, A.W.1
Woodcock, J.2
Wulf, L.3
-
30
-
-
84957869855
-
A Per Model of Secure Information Flow in Sequential Programs
-
A. Sabelfeld, D. Sands, “A Per Model of Secure Information Flow in Sequential Programs”, in Proc. of 8th European Symposium on Programming, Springer LNCS 1576, pg. 40-58, 1999
-
(1999)
Proc. Of 8Th European Symposium on Programming, Springer LNCS 1576
, pp. 40-58
-
-
Sabelfeld, A.1
Sands, D.2
|