-
1
-
-
0003092378
-
A calculus for Cryptographic Protocols: The Spi Calculus
-
Abadi, M. and Gordon, A.: A calculus for Cryptographic Protocols: the Spi Calculus, Information and Computation (1999)
-
(1999)
Information and Computation
-
-
Abadi, M.1
Gordon, A.2
-
2
-
-
0003400251
-
-
Tech report ESD-TR-75-306, Mitre Corp, Bedford, Ma
-
Bell, D. E. and LaPadula, L. J.: Secure Computer System: Unified Exposition and Multics Interpretation, Tech report ESD-TR-75-306, Mitre Corp, Bedford, Ma. (1976) 7
-
(1976)
Secure Computer System: Unified Exposition and Multics Interpretation
, pp. 7
-
-
Bell, D.E.1
Lapadula, L.J.2
-
7
-
-
0000015719
-
An Improved Failures Model for Communicating Sequential Processes Springer Verlag
-
Brookes, S. D. and Roscoe, A. W.: An Improved Failures Model for Communicating Sequential Processes Springer Verlag, Proceedings NSF-SERC Seminar on Concurrency (1985) 17
-
(1985)
Proceedings NSF-SERC Seminar on Concurrency
, pp. 17
-
-
Brookes, S.D.1
Roscoe, A.W.2
-
10
-
-
0012035918
-
Testing equivalence as a bisimulation equivalence
-
Cleaveland, R. and Hennessy, M.: Testing equivalence as a bisimulation equivalence. Formal Aspects of Computing, Volume 5, (1993) 1-20 44
-
(1993)
Formal Aspects of Computing
, vol.5
, pp. 1-20
-
-
Cleaveland, R.1
Hennessy, M.2
-
12
-
-
84947902524
-
-
Advances in Cryptology - EUROCRYPT ’96 (Lecture Notes in Computer Science 1070), Springer-Verlag
-
Coppersmith, D. et al.: Low-exponent RSA with related messages. In Advances in Cryptology - EUROCRYPT ’96 (Lecture Notes in Computer Science 1070), Springer-Verlag, (1996) 1-9 54
-
(1996)
Low-Exponent RSA with Related Messages
, pp. 1-9
-
-
Coppersmith, D.1
-
14
-
-
0028695025
-
Minimal cryptosystems and defining subliminal-freeness
-
Trondheim, Norway, June 27-July 1
-
Desmedt, Y. and Yung, M.: Minimal cryptosystems and defining subliminal-freeness. In Proceedings 1994 IEEE International Symposium on Information Theory, p. 347, Trondheim, Norway, June 27-July 1, (1994) 55
-
(1994)
Proceedings 1994 IEEE International Symposium on Information Theory
, pp. 347
-
-
Desmedt, Y.1
Yung, M.2
-
16
-
-
0039926997
-
A Compiler for Analysing Cryptographic Protocols using Non-Interference
-
Durante, A. et al: A Compiler for Analysing Cryptographic Protocols using Non-Interference, ACM Trans. on Soft.Eng. and Method, 9(4) (2000) 1-9 54
-
(2000)
ACM Trans. on Soft.Eng. and Method
, vol.9
, Issue.4
, pp. 1-9
-
-
Durante, A.1
-
17
-
-
85045337770
-
-
http://www.formal.demon.co.uk/36
-
-
-
-
19
-
-
84974776068
-
A Classification of Security Properties
-
Focardi, R. and Gorrieri, R.: A Classification of Security Properties, JCS, 3(1): (1995) 5-33 34, 46
-
(1995)
JCS
, vol.3
, Issue.1
, pp. 5-33
-
-
Focardi, R.1
Gorrieri, R.2
-
21
-
-
0001439194
-
The Compositional Security Checker: A Tool for the Verification of Information Flow Security Properties
-
Focardi, R., Gorrieri, R.: The Compositional Security Checker: A Tool for the Verification of Information Flow Security Properties. IEEE Trans. on Soft. Eng., 23(9): (1997) 550-571 16
-
(1997)
IEEE Trans. on Soft. Eng.
, vol.23
, Issue.9
, pp. 550-571
-
-
Focardi, R.1
Gorrieri, R.2
-
23
-
-
0030680628
-
The Specification and Implementation of Commercial Security Requirements including Dynamic Segregation of Duties
-
ACM Press
-
Foley, S. N.: The Specification and Implementation of Commercial Security Requirements including Dynamic Segregation of Duties, 4th ACM Conference on Computer and Communications Security, ACM Press, (1997) 10
-
(1997)
4Th ACM Conference on Computer and Communications Security
, pp. 10
-
-
Foley, S.N.1
-
24
-
-
0029391751
-
Algebraic Proofs of Consistency and Completeness
-
Gardiner, P.: Algebraic Proofs of Consistency and Completeness. Theoretic Computer Science, (1995) 150-161 34
-
(1995)
Theoretic Computer Science
, pp. 150-161
-
-
Gardiner, P.1
-
25
-
-
0005451427
-
Power simulation and its relation to traces and failures refinement
-
Gardiner, P.: Power simulation and its relation to traces and failures refinement, ENTCS, vol 32, URL: http://www.elsevier.nl/locate/entcs/volume32.html35
-
ENTCS
, vol.32
-
-
Gardiner, P.1
-
32
-
-
0016984825
-
Protection in operating systems
-
Harrison, M. A. et al: Protection in operating systems. Communications of the ACM, 19(8), August (1976) 461-471 9
-
(1976)
Communications of the ACM
, vol.19
, Issue.8
, pp. 461-471
-
-
Harrison, M.A.1
-
40
-
-
0032047528
-
-
Kang, M. H. et al: Design and Assurance Strategy for the NRL Pump, Computer, Vol. 31, No. 4, April (1998) 56-64 10
-
(1998)
Design and Assurance Strategy for the NRL Pump, Computer
, vol.31
, Issue.4
, pp. 56-64
-
-
Kang, M.H.1
-
44
-
-
0007969386
-
A Unifying Approach to Data-independence
-
Springer-Verlag, August
-
Lazic, R. and Nowak, D.: A Unifying Approach to Data-independence, In Proceedings of the 11th International Conference on Concurrency Theory (CONCUR 2000), Lecture Notes in Computer Science. Springer-Verlag, August (2000) 55
-
(2000)
Proceedings of the 11Th International Conference on Concurrency Theory (CONCUR 2000), Lecture Notes in Computer Science
, pp. 55
-
-
Lazic, R.1
Nowak, D.2
-
47
-
-
85045347654
-
Probabilistic polynomial-time equivalence and security analysis
-
Lincoln, P. et al: Probabilistic polynomial-time equivalence and security analysis, Proceedings of FM’99 (1999) 54
-
(1999)
Proceedings of FM’99
, pp. 54
-
-
Lincoln, P.1
-
51
-
-
85045301019
-
Unwinding Possibilistic Security Properties
-
Mantel, H.: Unwinding Possibilistic Security Properties. In Proceedings of ES-ORICS (2000) 53
-
(2000)
Proceedings of ES-ORICS
, pp. 53
-
-
Mantel, H.1
-
54
-
-
8644270771
-
-
An ongoing series published by the Center for High Assurance Computing Systems, Naval research Laboratory, 4555 Overlook Ave, SW, Washington, DC 20375November 1994 – Revised December 1995. Available at
-
McHugh, J.: Covert Channel Analysis. A chapter in the Handbook for the Computer Security Certification of Trusted Systems, (An ongoing series published by the Center for High Assurance Computing Systems, Naval research Laboratory, 4555 Overlook Ave, SW, Washington, DC 20375,) November 1994 – Revised December 1995. Available at http://chacs.nrl.navy.mil/publications/handbook/index.html11
-
Covert Channel Analysis. a Chapter in the Handbook for the Computer Security Certification of Trusted Systems
-
-
McHugh, J.1
-
56
-
-
0000921963
-
Refinement-oriented probability for CSP
-
McIver, A. et al: Refinement-oriented probability for CSP, Formal Aspects of Computing 8(9) (1996)
-
(1996)
Formal Aspects of Computing
, vol.8
, Issue.9
-
-
McIver, A.1
-
58
-
-
0022012611
-
A Comment on the ’Basic Security Theorem’ of Bell and LaPadula
-
McLean, J.: A Comment on the ’Basic Security Theorem’ of Bell and LaPadula, Information Processing Letters, vol. 20, no. 2, Feb. (1985) 11
-
(1985)
Information Processing Letters
, vol.20
, Issue.2
, pp. 11
-
-
McLean, J.1
-
59
-
-
0028058408
-
A General Theory of Composition for Trace Sets Closed Under Selective Interleaving Functions
-
IEEE Press
-
McLean, J.: A General Theory of Composition for Trace Sets Closed Under Selective Interleaving Functions, Proceedings of 1994 IEEE Symposium on Research in Security and Privacy, IEEE Press, (1994) 16, 29
-
(1994)
Proceedings of 1994 IEEE Symposium on Research in Security and Privacy
, vol.16
, pp. 29
-
-
McLean, J.1
-
70
-
-
0003960349
-
A Timed Model for Communicating Sequential Processes
-
Reed, M. and Roscoe, A. W.: A Timed Model for Communicating Sequential Processes. In proceedings of the 13th ICALP, LNCS 226, (1986) 17
-
(1986)
Proceedings of the 13Th ICALP, LNCS
, vol.226
, pp. 17
-
-
Reed, M.1
Roscoe, A.W.2
-
71
-
-
0001868056
-
Non-interference through determinism
-
Roscoe, A. W. et al: Non-interference through determinism, Proceedings of ES-ORICS (1994) 40
-
(1994)
Proceedings of ES-ORICS
, pp. 40
-
-
Roscoe, A.W.1
-
77
-
-
0035067847
-
Process Algebra and Non-interference
-
Ryan, P. Y. A. and Schneider, S. A.: Process Algebra and Non-interference, JCS Vol 9, nos 1,2, (2001) 75-103 45
-
(2001)
JCS
, vol.9
, Issue.1-2
, pp. 75-103
-
-
Ryan, P.Y.A.1
Schneider, S.A.2
-
79
-
-
0033700286
-
Probabilistic Non-interference for Multi-threaded Programs
-
Cambridge, July 3-5 2000, IEEE Computer Society
-
Sabelfeld, A. and Sands, D.: Probabilistic Non-interference for Multi-threaded Programs. In Proceedings of the IEEE Computer Security Foundations Workshop, Cambridge, July 3-5 2000, IEEE Computer Society, (2000) 200-215 53
-
(2000)
Proceedings of the IEEE Computer Security Foundations Workshop
, pp. 200-215
-
-
Sabelfeld, A.1
Sands, D.2
-
81
-
-
0027699087
-
-
Sandhu, R. S.: Lattice Based Access control Models, IEEE Computer, volume 26, number 11, November (1993) 9-19 9
-
(1993)
Lattice Based Access Control Models, IEEE Computer
, vol.26
, Issue.11
, pp. 9-19
-
-
Sandhu, R.S.1
-
83
-
-
85045342620
-
-
Royal Holloway, University of London Tech Report tr-99-02
-
Schneider, S. A.: Testing and abstraction, Royal Holloway, University of London Tech Report tr-99-02 (1999) 46
-
(1999)
Testing and Abstraction
, pp. 46
-
-
Schneider, S.A.1
-
84
-
-
85045297419
-
-
Royal Holloway Tech report CSD-TR-00-02, January
-
Schneider, S. A.: May Testing, Non-interference and Compositionality, Royal Holloway Tech report CSD-TR-00-02, January 2001. 40, 43, 44
-
(2001)
May Testing, Non-Interference and Compositionality
, vol.40
, Issue.43
, pp. 44
-
-
Schneider, S.A.1
-
86
-
-
6444224063
-
Implementing the Clark Wilson Integrity Policy Using Current Technology
-
Shockley, W. R.: Implementing the Clark Wilson Integrity Policy Using Current Technology, in Proceedings of the National Security Conference, (1988) 29-36 10
-
(1988)
Proceedings of the National Security Conference
, pp. 29-36
-
-
Shockley, W.R.1
-
89
-
-
85045346828
-
Specifications for Fault Tolerance
-
Weber, D.: Specifications for Fault Tolerance. ORA report (1988) 19-3 50
-
(1988)
ORA Report
, pp. 50
-
-
Weber, D.1
-
91
-
-
0033330060
-
Probablilistic non-interference in a concurrent language
-
Volpano, D and Smith G.: Probablilistic non-interference in a concurrent language. Journal of Computer Security, 7(2, 3): November (1999) 231-253 56
-
(1999)
Journal of Computer Security
, vol.7
, Issue.2-3
, pp. 231-253
-
-
Volpano, D.1
Smith, G.2
|