-
1
-
-
84937555465
-
Secrecy types for asymmetric communication
-
Proc. 4th International Conference on Foundations of Software Science and Computation Structures (FOSSACS), Springer
-
M. Abadi and B. Blanchet. Secrecy types for asymmetric communication. In Proc. 4th International Conference on Foundations of Software Science and Computation Structures (FOSSACS), volume 2030 of Lecture Notes in Computer Science, pages 25-41. Springer, 2001.
-
(2001)
Lecture Notes in Computer Science
, vol.2030
, pp. 25-41
-
-
Abadi, M.1
Blanchet, B.2
-
2
-
-
84957037045
-
Computational probabilistic non-interference
-
Proc. 7th European Symposium on Research in Computer Security (ESORICS), Springer
-
M. Backes and B. Pfitzmann. Computational probabilistic non-interference. In Proc. 7th European Symposium on Research in Computer Security (ESORICS), volume 2502 of Lecture Notes in Computer Science, pages 1-23. Springer, 2002.
-
(2002)
Lecture Notes in Computer Science
, vol.2502
, pp. 1-23
-
-
Backes, M.1
Pfitzmann, B.2
-
4
-
-
84958046259
-
A uniform approach to the definition of security properties
-
Proc. 8th Symposium on Formal Methods Europe (FME 1999), Springer
-
R. Focardi and F. Martinelli. A uniform approach to the definition of security properties. In Proc. 8th Symposium on Formal Methods Europe (FME 1999), volume 1708 of Lecture Notes in Computer Science, pages 794-813. Springer, 1999.
-
(1999)
Lecture Notes in Computer Science
, vol.1708
, pp. 794-813
-
-
Focardi, R.1
Martinelli, F.2
-
7
-
-
84974759639
-
Toward a mathematical foundation for information flow security
-
J. W. Gray III. Toward a mathematical foundation for information flow security. Journal of Computer Security, 1(3):255-295, 1992.
-
(1992)
Journal of Computer Security
, vol.1
, Issue.3
, pp. 255-295
-
-
Gray, J.W.1
-
8
-
-
0003843704
-
Communicating Sequential Processes
-
Prentice Hall, Hemel Hempstead
-
C. A. R. Hoare. Communicating Sequential Processes. International Series in Computer Science, Prentice Hall, Hemel Hempstead, 1985.
-
(1985)
International Series in Computer Science
-
-
Hoare, C.A.R.1
-
11
-
-
84945249768
-
Semantics and program analysis of computationally secure information flow
-
P. Laud. Semantics and program analysis of computationally secure information flow. In Proc. 10th European Symposium on Programming (ESOP), pages 77-91, 2001.
-
(2001)
Proc. 10th European Symposium on Programming (ESOP)
, pp. 77-91
-
-
Laud, P.1
-
12
-
-
0004215089
-
-
Morgan Kaufmann Publishers, San Francisco
-
N. Lynch. Distributed Algorithms. Morgan Kaufmann Publishers, San Francisco, 1996.
-
(1996)
Distributed Algorithms
-
-
Lynch, N.1
-
13
-
-
84944059120
-
Unwinding possibilistic security properties
-
Proc. 6th European Symposium on Research in Computer Security (ESORICS), Springer
-
H. Mantel. Unwinding possibilistic security properties. In Proc. 6th European Symposium on Research in Computer Security (ESORICS), volume 1895 of Lecture Notes in Computer Science, pages 238-254. Springer, 2000.
-
(2000)
Lecture Notes in Computer Science
, vol.1895
, pp. 238-254
-
-
Mantel, H.1
-
14
-
-
84881123660
-
Information flow control and applications - Bridging a gap
-
Proc. 10th Symposium on Formal Methods Europe (FME 2001), Springer
-
H. Mantel. Information flow control and applications - bridging a gap. In Proc. 10th Symposium on Formal Methods Europe (FME 2001), volume 2021 of Lecture Notes in Computer Science, pages 153-172. Springer, 2001.
-
(2001)
Lecture Notes in Computer Science
, vol.2021
, pp. 153-172
-
-
Mantel, H.1
-
15
-
-
0023231848
-
Specifications for multi-level security and a hook-up property
-
D. McCullough. Specifications for multi-level security and a hook-up property. In Proc. 8th IEEE Symposium on Security & Privacy, pages 161-166, 1987.
-
(1987)
Proc. 8th IEEE Symposium on Security & Privacy
, pp. 161-166
-
-
McCullough, D.1
-
21
-
-
0034823388
-
A model for asynchronous reactive systems and its application to secure message transmission
-
B. Pfitzmann and M. Waidner. A model for asynchronous reactive systems and its application to secure message transmission. In Proc. 22nd IEEE Symposium on Security & Privacy, pages 184-200, 2001.
-
(2001)
Proc. 22nd IEEE Symposium on Security & Privacy
, pp. 184-200
-
-
Pfitzmann, B.1
Waidner, M.2
-
24
-
-
0003502331
-
-
Technical report, Computer Science Laboratory, SRI International
-
J. Rushby. Noninterference, transitivity, and channel-control security. Technical report, Computer Science Laboratory, SRI International, 1992.
-
(1992)
Noninterference, Transitivity, and Channel-control Security
-
-
Rushby, J.1
-
25
-
-
84944051800
-
Verification of a formal security model for multiapplicative smart cards
-
Proc. 6th European Symposium on Research in Computer Security (ESORICS), Springer
-
G. Schellhorn, W. Reif, A. Schairer, P. Karger, V. Austel, and D. Toll. Verification of a formal security model for multiapplicative smart cards. In Proc. 6th European Symposium on Research in Computer Security (ESORICS), volume 1895 of Lecture Notes in Computer Science, pages 17-36. Springer, 2000.
-
(2000)
Lecture Notes in Computer Science
, vol.1895
, pp. 17-36
-
-
Schellhorn, G.1
Reif, W.2
Schairer, A.3
Karger, P.4
Austel, V.5
Toll, D.6
-
26
-
-
0018545449
-
How to share a secret
-
Nov
-
A. Shamir. How to share a secret. Communications of the ACM, 22(11):612-613, Nov. 1979.
-
(1979)
Communications of the ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
|