-
2
-
-
84948833881
-
-
D. Clark, S. Hunt, and P. Malacaria. private communication. July 2001
-
D. Clark, S. Hunt, and P. Malacaria. private communication. July 2001.
-
-
-
-
3
-
-
85050550846
-
Abstract Interpretation: A Unified Lattice Model for Static Analysis of Programs by Construction or Approximation of Fixpoints
-
Los Angeles
-
P. Cousot and R. Cousot. Abstract Interpretation: A Unified Lattice Model for Static Analysis of Programs by Construction or Approximation of Fixpoints. In Symposium on Principles of Programming Languages (POPL), pages 238-252, Los Angeles, 1977.
-
(1977)
Symposium on Principles of Programming Languages (POPL)
, pp. 238-252
-
-
Cousot, P.1
Cousot, R.2
-
4
-
-
0029403439
-
Nondeterminism and Infinite Computations in Constraint Programming
-
F.S. de Boer, A. Di Pierro, and C. Palamidessi. Nondeterminism and Infinite Computations in Constraint Programming. Theoretical Computer Science, 151(1):37-78, 1995.
-
(1995)
Theoretical Computer Science
, vol.151
, Issue.1
, pp. 37-78
-
-
De Boer, F.S.1
Di Pierro, A.2
Palamidessi, C.3
-
5
-
-
0012799565
-
Probabilistic confinement in a declarative framework
-
Declarative Programming - Selected Papers from AGP 2000 - La Havana, Cuba, Elsevier
-
A. Di Pierro, C. Hankin, and H. Wiklicky. Probabilistic confinement in a declarative framework. In Declarative Programming - Selected Papers from AGP 2000 - La Havana, Cuba, volume 48 of Electronic Notes in Theoretical Computer Science, pages 1-23. Elsevier, 2001.
-
(2001)
Electronic Notes in Theoretical Computer Science
, vol.48
, pp. 1-23
-
-
Di Pierro, A.1
Hankin, C.2
Wiklicky, H.3
-
6
-
-
0031645080
-
An operational semantics for Probabilistic Concurrent Constraint Programming
-
P. Iyer, Y. Choo, and D. Schmidt, editors, IEEE Computer Society Press
-
A. Di Pierro and H. Wiklicky. An operational semantics for Probabilistic Concurrent Constraint Programming. In P. Iyer, Y. Choo, and D. Schmidt, editors, ICCL'98 - International Conference on Computer Languages, pages 174-183. IEEE Computer Society Press, 1998.
-
(1998)
ICCL'98 - International Conference on Computer Languages
, pp. 174-183
-
-
Di Pierro, A.1
Wiklicky, H.2
-
7
-
-
84896771832
-
Probabilistic Concurrent Constraint Programming: Towards a fully abstract model
-
L. Brim, J. Gruska, and J. Zlatuska, editors, MFCS'98 - Mathematical Foundations of Computer Science, Berlin - New York, August Springer Verlag
-
A. Di Pierro and H. Wiklicky. Probabilistic Concurrent Constraint Programming: Towards a fully abstract model. In L. Brim, J. Gruska, and J. Zlatuska, editors, MFCS'98 - Mathematical Foundations of Computer Science, volume 1450 of Lecture Notes in Computer Science, pages 446-455, Berlin - New York, August 1998. Springer Verlag.
-
(1998)
Lecture Notes in Computer Science
, vol.1450
, pp. 446-455
-
-
Di Pierro, A.1
Wiklicky, H.2
-
8
-
-
0020299523
-
Security Policies and Security Models
-
IEEE Computer Society Press
-
J. Goguen and J. Meseguer. Security Policies and Security Models. In IEEE Symposium on Security and Privacy, pages 11-20. IEEE Computer Society Press, 1982.
-
(1982)
IEEE Symposium on Security and Privacy
, pp. 11-20
-
-
Goguen, J.1
Meseguer, J.2
-
10
-
-
0010974144
-
-
American Mathematical Society, Providence, Rhode Island, second revised edition
-
C. M. Grinstead and J.L. Snell. Introduction to Probability. American Mathematical Society, Providence, Rhode Island, second revised edition, 1997.
-
(1997)
Introduction to Probability
-
-
Grinstead, C.M.1
Snell, J.L.2
-
11
-
-
0003062448
-
Cryptanalysis of Diffie-Hellman, RSA, DSS, and other cryptosystems using timing attacks
-
D. Coppersmith, editor, Advances in Cryptology, CRYPTO '95: 15th Annual International Cryptology Conference, Santa Barbara, California, USA, August 27-31, 1995, Berlin - Heidelberg - London, Springer-Verlag
-
P. C. Kocher. Cryptanalysis of Diffie-Hellman, RSA, DSS, and other cryptosystems using timing attacks. In D. Coppersmith, editor, Advances in Cryptology, CRYPTO '95: 15th Annual International Cryptology Conference, Santa Barbara, California, USA, August 27-31, 1995, volume 963 of Lecture Notes in Computer Science, pages 171-183, Berlin - Heidelberg - London, 1995. Springer-Verlag.
-
(1995)
Lecture Notes in Computer Science
, vol.963
, pp. 171-183
-
-
Kocher, P.C.1
-
12
-
-
0026222347
-
Bisimulation through probabilistic testing
-
September
-
K.G. Larsen and A. Skou. Bisimulation through probabilistic testing. Information and Computation, 94(1):1-28, September 1991.
-
(1991)
Information and Computation
, vol.94
, Issue.1
, pp. 1-28
-
-
Larsen, K.G.1
Skou, A.2
-
15
-
-
0034829266
-
Non-interference, who needs it?
-
Cape Breton, Nova Scotia, Canada, June IEEE
-
P.Y.A. Ryan, J. McLean, J. Millen, and V. Gilgor. Non-interference, who needs it? In Proceedings of the 14th IEEE Computer Security Foundations Workshop, pages 237-238, Cape Breton, Nova Scotia, Canada, June 2001. IEEE.
-
(2001)
Proceedings of the 14th IEEE Computer Security Foundations Workshop
, pp. 237-238
-
-
Ryan, P.Y.A.1
McLean, J.2
Millen, J.3
Gilgor, V.4
-
16
-
-
0035067847
-
Process algebra and non-interference
-
Special Issue on CSFW-12
-
P.Y.A. Ryan and S.A. Schneider. Process algebra and non-interference. Journal of Computer Security, 9(1/2):75-103, 2001. Special Issue on CSFW-12.
-
(2001)
Journal of Computer Security
, vol.9
, Issue.1-2
, pp. 75-103
-
-
Ryan, P.Y.A.1
Schneider, S.A.2
-
17
-
-
84957869855
-
A per model of secure information flow in sequential programs
-
ESOP'99, Springer Verlag
-
A. Sabelfeld and D. Sands. A per model of secure information flow in sequential programs. In ESOP'99, number 1576 in Lecture Notes in Computer Science, pages 40-58. Springer Verlag, 1999.
-
(1999)
Lecture Notes in Computer Science
, Issue.1576
, pp. 40-58
-
-
Sabelfeld, A.1
Sands, D.2
-
21
-
-
0003885668
-
Mathematical Statistics
-
Springer Verlag, New York - Berlin - Heidelberg
-
J. Shao. Mathematical Statistics. Springer Texts in Statistics. Springer Verlag, New York - Berlin - Heidelberg, 1999.
-
(1999)
Springer Texts in Statistics
-
-
Shao, J.1
-
22
-
-
0031648455
-
Secure information flow in a multi-threaded imperative language
-
San Diego, California, ACM
-
G. Smith and D. Volpano. Secure information flow in a multi-threaded imperative language. In Symposium on Principles of Programming Languages (POPL'98), pages 355-364, San Diego, California, 1998. ACM.
-
(1998)
Symposium on Principles of Programming Languages (POPL'98)
, pp. 355-364
-
-
Smith, G.1
Volpano, D.2
-
24
-
-
84879525367
-
Towards quantitative verification of probabilistic transition systems
-
ICALP: 28th International Colloquium on Automata, Languages and Programming, Springer Verlag
-
F. van Breugel and J. Worrell. Towards quantitative verification of probabilistic transition systems. In ICALP: 28th International Colloquium on Automata, Languages and Programming, volume 2076 of Lecture Notes in Computer Science, pages 421-432. Springer Verlag, 2001.
-
(2001)
Lecture Notes in Computer Science
, vol.2076
, pp. 421-432
-
-
Van Breugel, F.1
Worrell, J.2
-
25
-
-
0001909368
-
Confinement properties for programming languages
-
September
-
D. Volpano and G. Smith. Confinement properties for programming languages. SIGACTNews, 29(3):33-42, September 1998.
-
(1998)
SIGACTNews
, vol.29
, Issue.3
, pp. 33-42
-
-
Volpano, D.1
Smith, G.2
|