-
3
-
-
84974754345
-
A Logical View of Secure Dependencies
-
P. Bieber and F. Cuppens. “A Logical View of Secure Dependencies”. Journal of Computer Security, 1 (1):99-129, 1992.
-
(1992)
Journal of Computer Security
, vol.1
, Issue.1
, pp. 99-129
-
-
Bieber, P.1
Cuppens, F.2
-
4
-
-
85028853912
-
A Theory of Processes with Localities
-
Proceedings Concur
-
G. Boudol, I. Castellani, M. Hennessy, and A. Kiehn. “A Theory of Processes with Localities”. In Proceedings Concur 92, pages 108-122. Springer-Verlag LNCS 630, 1992.
-
(1992)
Springer-Verlag LNCS 630
, vol.92
, pp. 108-122
-
-
Boudol, G.1
Castellani, I.2
Hennessy, M.3
Kiehn, A.4
-
5
-
-
0027342054
-
The Concurrency Workbench: A Semantics Based Tool for the Verification of Concurrent Systems. ACM Transactions on Programming Languages and Systems
-
R. Cleaveland, J. Parrow, and B. Steffen. “The Concurrency Workbench: A Semantics Based Tool for the Verification of Concurrent Systems”. ACM Transactions on Programming Languages and Systems, Vol. 15 No, 1:36-72, January 1993.
-
(1993)
, vol.15
, pp. 36-72
-
-
Cleaveland, R.1
Parrow, J.2
Steffen, B.3
-
6
-
-
0040815347
-
Causal trees: Interleaving + causality
-
Lecture Notes in Computer Science, Springer, Berlin
-
P. Darondeau and P. Degano. “Causal trees: Interleaving + causality”. In Proceedings LITP Spring School on Semantic of Systems of Concurrent Processes, pages 239-255. Lecture Notes in Computer Science, Vol. 469, Springer, Berlin, 1990.
-
(1990)
Proceedings LITP Spring School on Semantic of Systems of Concurrent Processes
, vol.469
, pp. 239-255
-
-
Darondeau, P.1
Degano, P.2
-
14
-
-
0004189966
-
Algebraic Theory of Processes
-
M. Hennessy. Algebraic Theory of Processes. The MIT Press, 1988
-
(1988)
The MIT Press
-
-
Hennessy, M.1
-
15
-
-
55849123912
-
Communicating Sequential Processes
-
C. A. R. Hoare. Communicating Sequential Processes. Prentice-Hall, 1985.
-
(1985)
Prentice-Hall
-
-
Hoare, C.A.R.1
-
16
-
-
84974759639
-
HI. “Toward a Mathematical Foundation for Information Flow Security
-
J. W. Gray HI. “Toward a Mathematical Foundation for Information Flow Security”. Journal of Computer 5ec«rtfy, 1:255-294, 1992.
-
(1992)
Journal of Computer 5ec«rtfy
, vol.1
, pp. 255-294
-
-
Gray, J.W.1
-
18
-
-
0016972709
-
Formal Verification of Parallel Programs
-
R. Keller. “Formal Verification of Parallel Programs”. Communications of the ACM, 19 (7):561-572, 1976.
-
(1976)
Communications of the ACM
, vol.19
, Issue.7
, pp. 561-572
-
-
Keller, R.1
-
21
-
-
0023829319
-
Noninterference and the Composability of Security Properties
-
Proceedings, 1988, IEEE Computer Society Press, April
-
D. McCullough. “Noninterference and the Composability of Security Properties”. In Proceedings, 1988 IEEE Symposium on -Security and Privacy, pages 177-186. IEEE Computer Society Press, April 1988.
-
(1988)
IEEE Symposium on -Security and Privacy
, pp. 177-186
-
-
McCullough, D.1
-
24
-
-
0028058408
-
A General Theory of Composition for Trace Sets Closed Under Selective Interleaving Functions
-
Proceeding of the 1994, IEEE Computer Society Press
-
J. McLean. “A General Theory of Composition for Trace Sets Closed Under Selective Interleaving Functions”, In Proceeding of the 1994 IEEE Symposium on Research in Security and Privacy. IEEE Computer Society Press, 1994.
-
(1994)
IEEE Symposium on Research in Security and Privacy
-
-
McLean, J.1
-
25
-
-
0025686008
-
Hookup Security for Synchronous Machines
-
Proceedings of the Third Computer Security Foundation Workshop III
-
J. K. Millen. “Hookup Security for Synchronous Machines”. In Proceedings of the Third Computer Security Foundation Workshop III. IEEE Computer Society Press, 1990.
-
(1990)
IEEE Computer Society Press
-
-
Millen, J.K.1
-
26
-
-
18944381228
-
Communication and Concurrency
-
R. Milner. Communication and Concurrency. Prentice-Hall, 1989.
-
(1989)
Prentice-Hall
-
-
Milner, R.1
-
28
-
-
0005314068
-
Integrity in Automated Information Systems
-
National Computer Security Center, September
-
Department of Defense. “Integrity in Automated Information Systems”. Technical Report C 79-91, National Computer Security Center, September 1991.
-
(1991)
Technical Report C
, pp. 79-91
-
-
-
31
-
-
0038118932
-
A Model of Information
-
National Bureau of Standards and National Computer Security Center, September
-
D. Sutherland. “A Model of Information”. In Proceedings of the 9th National Computer Security Conference, pages 175-183. National Bureau of Standards and National Computer Security Center, September 1986.
-
(1986)
Proceedings of the 9Th National Computer Security Conference
, pp. 175-183
-
-
Sutherland, D.1
-
32
-
-
0025135716
-
Information Flow in Nondeterministic Systems
-
Proceedings of the 1990, IEEE Computer Society Press
-
J. T. Wittbold and D. M. Johnson. “Information Flow in Nondeterministic Systems”. In Proceedings of the 1990 IEEE Symposium on Research in Security and Privacy, pages 144-161. IEEE Computer Society Press, 1990.
-
(1990)
IEEE Symposium on Research in Security and Privacy
, pp. 144-161
-
-
Wittbold, J.T.1
Johnson, D.M.2
|