-
3
-
-
84945976575
-
Control flow analysis for the π-calculus
-
Springer-Verlag
-
C. Bodei, P. Degano, F. Nielson, and H. R. Nielson. Control flow analysis for the π-calculus. In Proc. CONCUR’98, number 1466 in Lecture Notes in Computer Science, pages 84-98. Springer-Verlag, 1998.
-
(1998)
Proc. CONCUR’98, Number 1466 in Lecture Notes in Computer Science
, pp. 84-98
-
-
Bodei, C.1
Degano, P.2
Nielson, F.3
Nielson, H.R.4
-
4
-
-
84937705299
-
Static analysis of processes for no read-up and no write-down
-
Springer-Verlag
-
C. Bodei, P. Degano, F. Nielson, and H. R. Nielson. Static analysis of processes for no read-up and no write-down. In Proc. FOSSACS’99, number 1578 in Lecture Notes in Computer Science, pages 120-134. Springer-Verlag, 1999.
-
(1999)
Proc. FOSSACS’99, Number 1578 in Lecture Notes in Computer Science
, pp. 120-134
-
-
Bodei, C.1
Degano, P.2
Nielson, F.3
Nielson, H.R.4
-
5
-
-
0003403203
-
-
Technical Report 1702, INRIA-Sophia Antipolis
-
G. Boudol. Asynchrony and the π-calculus. Technical Report 1702, INRIA-Sophia Antipolis, 1992.
-
(1992)
Asynchrony and the π-calculus
-
-
Boudol, G.1
-
6
-
-
84974632437
-
Testing theories for asynchronous languages
-
V Arvind and R Ramanujam, editors, (Chennai, India, December 17-19, 1998), LNCS 1530. Springer-Verlag, December
-
Ilaria Castellani and Matthew Hennessy. Testing theories for asynchronous languages. In V Arvind and R Ramanujam, editors, 18th Conference on Foundations of Software Technology and Theoretical Computer Science (Chennai, India, December 17-19, 1998), LNCS 1530. Springer-Verlag, December 1998.
-
(1998)
18Th Conference on Foundations of Software Technology and Theoretical Computer Science
-
-
Castellani, I.1
Hennessy, M.2
-
7
-
-
0017517624
-
Certification of programs for secure information ow
-
D. Denning. Certification of programs for secure information ow. Communications of the ACM, 20:504-513, 1977.
-
(1977)
Communications of the ACM
, vol.20
, pp. 504-513
-
-
Denning, D.1
-
9
-
-
84974776068
-
A classification of security properties for process algebras
-
Riccardo Focardi and Roberto Gorrieri. A classification of security properties for process algebras. Journal of Computer Security, 3(1), 1995.
-
(1995)
Journal of Computer Security
, vol.3
, Issue.1
-
-
Focardi, R.1
Gorrieri, R.2
-
10
-
-
0001439194
-
The compositional security checker: A tool for the verification of information flow security properties
-
Riccardo Focardi and Roberto Gorrieri. The compositional security checker: A tool for the verification of information flow security properties. IEEE Transactions on Software Engineering, 23, 1997.
-
(1997)
IEEE Transactions on Software Engineering
, pp. 23
-
-
Focardi, R.1
Gorrieri, R.2
-
12
-
-
84955565479
-
A calculus of mobile agents
-
U. Montanari and V. Sassone, editors, Pisa, August, Springer-Verlag
-
C. Fournet, G. Gonthier, J.J. Levy, L. Marganget, and D. Remy. A calculus of mobile agents. In U. Montanari and V. Sassone, editors, CONCUR: Proceedings of the International Conference on Concurrency Theory, volume 1119 of Lecture Notes in Computer Science, pages 406-421, Pisa, August 1996. Springer-Verlag.
-
(1996)
CONCUR: Proceedings of the International Conference on Concurrency Theory, Volume 1119 of Lecture Notes in Computer Science
, pp. 406-421
-
-
Fournet, C.1
Gonthier, G.2
Levy, J.J.3
Marganget, L.4
Remy, D.5
-
17
-
-
0001897726
-
On asynchronous communication semantics
-
P. Wegner M. Tokoro, O. Nierstrasz, editor, Springer- Verlag
-
Kohei Honda and Mario Tokoro. On asynchronous communication semantics. In P. Wegner M. Tokoro, O. Nierstrasz, editor, Proceedings of the ECOOP ‘91 Work- shop on Object-Based Concurrent Computing, volume 612 of LNCS 612. Springer- Verlag, 1992.
-
(1992)
Proceedings of the ECOOP ‘91 Work- Shop on Object-Based Concurrent Computing, Volume 612 of LNCS 612
-
-
Honda, K.1
Tokoro, M.2
-
22
-
-
0001518312
-
Typing and subtyping for mobile processes
-
Extended abstract in LICS ‘93
-
Benjamin Pierce and Davide Sangiorgi. Typing and subtyping for mobile processes. Mathematical Structures in Computer Science, 6(5):409-454, 1996. Extended abstract in LICS ‘93.
-
(1996)
Mathematical Structures in Computer Science
, vol.6
, Issue.5
, pp. 409-454
-
-
Pierce, B.1
Sangiorgi, D.2
-
23
-
-
0003976893
-
-
Technical Report CSCI 476, Computer Science Department, Indiana University, To appear in Proof, Language and Interaction: Essays in Honour of Robin Milner, Gordon Plotkin, Colin Stirling, and Mads Tofte, editors, MIT Press
-
Benjamin C. Pierce and David N. Turner. Pict: A programming language based on the pi-calculus. Technical Report CSCI 476, Computer Science Department, Indiana University, 1997. To appear in Proof, Language and Interaction: Essays in Honour of Robin Milner, Gordon Plotkin, Colin Stirling, and Mads Tofte, editors, MIT Press.
-
(1997)
Pict: A Programming Language Based on the Pi-Calculus
-
-
Pierce, B.C.1
Turner, D.N.2
-
24
-
-
19144365749
-
Resource access control in systems of mobile agents (Extended abstract)
-
Nice, France, September 1998. Full version available as Computer Science Technical Report 2/98, University of Sussex
-
James Riely and Matthew Hennessy. Resource access control in systems of mobile agents (extended abstract). In Proceedings of 3rd International Workshop on High- Level Concurrent Languages, Nice, France, September 1998. Full version available as Computer Science Technical Report 2/98, University of Sussex, 1997. Available from http://www.cogs.susx.ac.uk/.
-
(1997)
Proceedings of 3Rd International Workshop on High- Level Concurrent Languages
-
-
Riely, J.1
Hennessy, M.2
|