-
1
-
-
84957668700
-
-
TACS’97, LNCS, 611-637, Springer
-
Abadi, M., Secrecy by typing in security protocols. TACS’97, LNCS, 611-637, Springer, 1997.
-
(1997)
Secrecy by Typing in Security Protocols
-
-
Abadi, M.1
-
2
-
-
0005363804
-
A core calculus of dependency
-
ACM
-
Abadi, M., Banerjee, A., Heintze, N. and Riecke, J., A core calculus of dependency, POPL’99, ACM, 1999.
-
(1999)
POPL’99
-
-
Abadi, M.1
Banerjee, A.2
Heintze, N.3
Riecke, J.4
-
3
-
-
84947235213
-
Secure Communications Processing for Distributed Languages
-
IEEE
-
Abadi, M., Fournet, C. and Gonthier, G., Secure Communications Processing for Distributed Languages. LICS’98, 868-883, IEEE, 1998.
-
(1998)
LICS’98
, pp. 868-883
-
-
Abadi, M.1
Fournet, C.2
Gonthier, G.3
-
4
-
-
0027574302
-
Computational Interpretation of Linear Logic
-
Abramsky, S., Computational Interpretation of Linear Logic. TCS, vol 111, 1993.
-
(1993)
TCS
, vol.111
-
-
Abramsky, S.1
-
5
-
-
84945976575
-
Control Flow Analysis of n- Calculus
-
LNCS 1466, Springer
-
Bodei, C, Degano, P., Nielson, F., and Nielson, H. Control Flow Analysis of n- Calculus. CONCUR’98, LNCS 1466, 84-98, Springer, 1998.
-
(1998)
CONCUR’98
, pp. 84-98
-
-
Bodei, C.1
Degano, P.2
Nielson, F.3
Nielson, H.4
-
6
-
-
0030681154
-
The pi-calculus in direct style
-
ACM
-
Boudol, G., The pi-calculus in direct style, POPL’97, 228-241, ACM, 1997.
-
(1997)
POPL’97
, pp. 228-241
-
-
Boudol, G.1
-
7
-
-
0017517624
-
Certification of programs for secure information flow
-
ACM
-
Denning, D. and Denning, P., Certification of programs for secure information flow. Communication of ACM, ACM, 20:504-513, 1997.
-
(1997)
Communication of ACM
, vol.20
, pp. 504-513
-
-
Denning, D.1
Denning, P.2
-
8
-
-
0001439194
-
The compositional security checker: A tool for the verification of information flow security properties
-
Focardi, R. and Gorrieri, R., The compositional security checker: A tool for the verification of information flow security properties. IEEE Transactions on Software Engineering, 23(9), 1997.
-
(1997)
IEEE Transactions on Software Engineering
, vol.23
, Issue.9
-
-
Focardi, R.1
Gorrieri, R.2
-
9
-
-
4043088311
-
Types and Subtypes for Client-Server Interactions
-
LNCS 1576, Springer
-
Gay, S. and Hole, M., Types and Subtypes for Client-Server Interactions, ESOP’99, LNCS 1576, 74-90, Springer, 1999.
-
(1999)
ESOP’99
, pp. 74-90
-
-
Gay, S.1
Hole, M.2
-
10
-
-
0023171371
-
Linear Logic
-
Girard, J.-Y., Linear Logic, TCS, Vol. 50, 1-102, 1987.
-
(1987)
TCS
, vol.50
, pp. 1-102
-
-
Girard, J.-Y.1
-
14
-
-
85029492434
-
Types for Dyadic Interaction
-
LNCS 715
-
Honda, K., Types for Dyadic Interaction. CONCUR’93, LNCS 715, 509-523, 1993.
-
(1993)
CONCUR’93
, pp. 509-523
-
-
Honda, K.1
-
15
-
-
0029719979
-
Composing Processes
-
ACM
-
Honda, K., Composing Processes, POPL’96, 344-357, ACM, 1996.
-
(1996)
POPL’96
, pp. 344-357
-
-
Honda, K.1
-
16
-
-
84947208033
-
-
QMW CS technical report 767
-
A full version of the present paper, QMW CS technical report 767, 1999. Available at http://www.dcs.qmw.ac.uk/~kohei.
-
(1999)
-
-
-
17
-
-
0029404929
-
On Reduction-Based Process Semantics
-
Honda, K. and Yoshida, N. On Reduction-Based Process Semantics. TCS. 151, 437-486, 1995.
-
(1995)
TCS
, vol.151
, pp. 437-486
-
-
Honda, K.1
Yoshida, N.2
-
18
-
-
0000423953
-
Game-theoretic analysis of call-by-value computation
-
Honda, K. and Yoshida, N. Game-theoretic analysis of call-by-value computation. TCS, 221 (1999), 393-456, 1999.
-
(1999)
TCS
, vol.221
, pp. 393-456
-
-
Honda, K.1
Yoshida, N.2
-
19
-
-
0008540715
-
Pi-calculus, dialogue games and PCF
-
ACM
-
Hyland, M. and Ong, L., Pi-calculus, dialogue games and PCF, FPCA’93, ACM, 1995.
-
(1995)
FPCA’93
-
-
Hyland, M.1
Ong, L.2
-
20
-
-
0029706996
-
Linear types and n-calculus
-
Kobayashi, N., Pierce, B., and Turner, D., Linear types and n-calculus, POPL’96, 358-371, 1996.
-
(1996)
POPL’96
, pp. 358-371
-
-
Kobayashi, N.1
Pierce, B.2
Turner, D.3
-
21
-
-
0025251975
-
Interaction Nets
-
ACM
-
Lafont, Y., Interaction Nets, POPL’90, 95-108, ACM, 1990.
-
(1990)
POPL’90
, pp. 95-108
-
-
Lafont, Y.1
-
22
-
-
0026222347
-
Bisimulation through probabilistic testing
-
Larsen, K. and Skou, A. Bisimulation through probabilistic testing. Information and Computation, 94:1-28, 1991.
-
(1991)
Information and Computation
, vol.94
, pp. 1-28
-
-
Larsen, K.1
Skou, A.2
-
23
-
-
84978984428
-
A Virtual Machine for the TyCO Process Calculus
-
LNCS 1702, Springer
-
Lopes, L, Silva, F. and Vasconcelos, F. A Virtual Machine for the TyCO Process Calculus. PPDP’99, 244-260, LNCS 1702, Springer, 1999.
-
(1999)
PPDP’99
, pp. 244-260
-
-
Lopes, L.1
Silva, F.2
Vasconcelos, F.3
-
24
-
-
0005462619
-
-
MCS technical report, University of Leicester, 1999/3
-
Lowe, G. Defining Information Flow. MCS technical report, University of Leicester, 1999/3, 1999.
-
(1999)
Defining Information Flow
-
-
Lowe, G.1
-
27
-
-
44049113210
-
A Calculus of Mobile Processes
-
Milner, R., Parrow, J.G. and Walker, D.J., A Calculus of Mobile Processes, Info. & Comp. 100(1), pp.1-77, 1992.
-
(1992)
Info. & Comp
, vol.100
, Issue.1
, pp. 1-77
-
-
Milner, R.1
Parrow, J.G.2
Walker, D.J.3
-
28
-
-
0001518312
-
Typing and subtyping for mobile processes
-
Pierce, B and Sangiorgi D, Typing and subtyping for mobile processes, MSCS 6(5):409-453, 1996.
-
(1996)
MSCS
, vol.6
, Issue.5
, pp. 409-453
-
-
Pierce, B.1
Sangiorgi, D.2
-
29
-
-
0029713842
-
Intensional Specifications of Security Protocols
-
IEEE
-
Roscoe, A. W. Intensional Specifications of Security Protocols, CSFW’96, IEEE, 1996.
-
(1996)
CSFW’96
-
-
Roscoe, A.W.1
-
30
-
-
0030260547
-
π-calculus, internal mobility, and agent-passing calculi
-
Sangiorgi, D. π-calculus, internal mobility, and agent-passing calculi. TCS, 167(2):235-271, 1996.
-
(1996)
TCS
, vol.167
, Issue.2
, pp. 235-271
-
-
Sangiorgi, D.1
-
32
-
-
85024747258
-
Typed concurrent objects
-
LNCS 821, Springer
-
Vasconcelos, V., Typed concurrent objects. ECOOP’94, LNCS 821, pp.100-117. Springer, 1994.
-
(1994)
ECOOP’94
, pp. 100-117
-
-
Vasconcelos, V.1
-
33
-
-
0031648455
-
Secure information flow in a multi-threaded imperative language
-
ACM
-
Volpano, D. and Smith, G., Secure information flow in a multi-threaded imperative language, pp.355-364, POPL’98, ACM, 1998.
-
(1998)
POPL’98
, pp. 355-364
-
-
Volpano, D.1
Smith, G.2
-
35
-
-
0030370740
-
A Sound type system for secure flow analysis
-
Volpano, D., Smith, G. and Irvine, C., A Sound type system for secure flow analysis. J. Computer Security, 4(2,3):167-187, 1996.
-
(1996)
J. Computer Security
, vol.4
, Issue.2-3
, pp. 167-187
-
-
Volpano, D.1
Smith, G.2
Irvine, C.3
-
36
-
-
34250620825
-
Graph Types for Mobile Processes
-
LNCS 1180, Springer, 1996. The full version as LFCS Technical Report, ECS-LFCS-96-350
-
Yoshida, N. Graph Types for Mobile Processes. FST/TCS’16, LNCS 1180, pp.371-386, Springer, 1996. The full version as LFCS Technical Report, ECS-LFCS-96-350, 1996
-
(1996)
FST/TCS’16
, pp. 371-386
-
-
Yoshida, N.1
|