-
1
-
-
0001772130
-
Secrecy by Typing in Security Protocols
-
331
-
M. Abadi. “Secrecy by Typing in Security Protocols”. Journal of ACM, 46(5):749– 786, 1999. 331
-
(1999)
Journal of ACM
, vol.46
, Issue.5
, pp. 749-786
-
-
Abadi, M.1
-
2
-
-
0003092378
-
A calculus for cryptographic protocols: The spi calculus
-
331, 392
-
M. Abadi and A. D. Gordon. A calculus for cryptographic protocols: The spi calculus. Information and Computation, 148(1):1–70, 1999. 331, 392
-
(1999)
Information and Computation
, vol.148
, Issue.1
, pp. 1-70
-
-
Abadi, M.1
Gordon, A.D.2
-
4
-
-
84872312669
-
A Comparison of Non-Interference and Non-Deducibility using CSP
-
Franconia, New Hampshire, 368
-
P. G. Allen. “A Comparison of Non-Interference and Non-Deducibility using CSP”. In Proceedings of the Fourth IEEE Computer Security Foundations Workshop, pages 43–54, Franconia, New Hampshire, June 1991. 368
-
(1991)
Proceedings of the Fourth IEEE Computer Security Foundations Workshop
, pp. 43-54
-
-
Allen, P.G.1
-
6
-
-
0021870594
-
Algebra of Communicating Processes with Ab-straction
-
356
-
J. A. Bergstra and J. W. Klop. “Algebra of Communicating Processes with Ab-straction”. Theoretical Computer Science, 37:77–121, 1985. 356
-
(1985)
Theoretical Computer Science
, vol.37
, pp. 77-121
-
-
Bergstra, J.A.1
Klop, J.W.2
-
7
-
-
84974754345
-
A Logical View of Secure Dependencies
-
333
-
P. Bieber and F. Cuppens. “A Logical View of Secure Dependencies”. Journal of Computer Security, 1(1):99–129, 1992. 333
-
(1992)
Journal of Computer Security
, vol.1
, Issue.1
, pp. 99-129
-
-
Bieber, P.1
Cuppens, F.2
-
8
-
-
0000691413
-
Static Analysis of Processes for No Read- Up and No Write- Down
-
Amsterdam, Springer. 331
-
C. Bodei, P. Degano, F. Nielson, and H. Riis Nielson. “Static Analysis of Processes for No Read- Up and No Write- Down”. In proc. of 2nd FoSSaCS’99, Amsterdam, March 1999. Springer. 331
-
(1999)
Proc. of 2Nd FoSSaCS’99
-
-
Bodei, C.1
Degano, P.2
Nielson, F.3
Riis Nielson, H.4
-
9
-
-
0021465083
-
A Theory of Communicating Sequential Processes
-
340, 348, 353
-
S. D. Brookes, C. A. R. Hoare, and A. W. Roscoe. “A Theory of Communicating Sequential Processes”. Journal of the Association for Computing Machinery, 31(3):560–599, July 1984. 340, 348, 353
-
(1984)
Journal of the Association for Computing Machinery
, vol.31
, Issue.3
, pp. 560-599
-
-
Brookes, S.D.1
Hoare, C.A.R.2
Roscoe, A.W.3
-
10
-
-
0342694716
-
An Improved Failures Model for Communicating Processes
-
Springer-Verlag, LNCS 197, 370, 375
-
S. D. Brookes and A. W. Roscoe. “An Improved Failures Model for Communicating Processes”. In Proceedings of the Pittsburgh seminar on concurrency, pages 281– 305. Springer-Verlag, LNCS 197, 1985. 370, 375
-
(1985)
Proceedings of the Pittsburgh Seminar on Concurrency
, pp. 281-305
-
-
Brookes, S.D.1
Roscoe, A.W.2
-
11
-
-
0032670195
-
Authentication via Localized Names
-
IEEE press, 331, 392
-
C. Bodei, P. Degano, R. Focardi, and C. Priami. “Authentication via Localized Names”. In Proceedings of CSFW’99, pages 98–110. IEEE press, 1999. 331, 392
-
(1999)
Proceedings of CSFW’99
, pp. 98-110
-
-
Bodei, C.1
Degano, P.2
Focardi, R.3
Priami, C.4
-
12
-
-
85045323047
-
Primitives for Authentication in Process Algebras
-
331, 392
-
C. Bodei, P. Degano, R. Focardi, and C. Priami. “Primitives for Authentication in Process Algebras”. Theoretical Computer Science, to appear, 2001. 331, 392
-
(2001)
Theoretical Computer Science, to Appear
-
-
Bodei, C.1
Degano, P.2
Focardi, R.3
Priami, C.4
-
13
-
-
84947919695
-
Mobile Ambients
-
Springer LNCS 1378, 392
-
L. Cardelli and A. Gordon. “Mobile Ambients”. In proceedings of FoSSaCS’98, pages 140–155. Springer LNCS 1378, 1998. 392
-
(1998)
Proceedings of FoSSaCS’98
, pp. 140-155
-
-
Cardelli, L.1
Gordon, A.2
-
14
-
-
0027342054
-
The Concurrency Workbench: A Semantics Based Tool for the Verification of Concurrent Systems
-
January, 334, 377, 379, 380
-
R. Cleaveland, J. Parrow, and B. Steffen. “The Concurrency Workbench: a Semantics Based Tool for the Verification of Concurrent Systems”. ACM Transactions on Programming Languages and Systems, Vol. 15 No. 1:36–72, January 1993. 334, 377, 379, 380
-
(1993)
ACM Transactions on Programming Languages and Systems
, vol.15
, Issue.1
, pp. 36-72
-
-
Cleaveland, R.1
Parrow, J.2
Steffen, B.3
-
15
-
-
0039926997
-
A Compiler for Analysing Cryptographic Protocols Using Non-Interference
-
A. Durante, R. Focardi, and R. Gorrieri. “A Compiler for Analysing Cryptographic Protocols Using Non-Interference”. ACM Transactions on Software Engineering and Methodology, 9(4):489–530, 2000. 392
-
(2000)
ACM Transactions on Software Engineering and Methodology
, vol.9
, Issue.4
, pp. 489-530
-
-
Durante, A.1
Focardi, R.2
Gorrieri, R.3
-
16
-
-
35048902864
-
CVS at Work: A Report on New Failures upon Some Cryptographic Protocols
-
St. Petersburg, Russia, LNCS 2052. 392
-
A. Durante, R. Focardi, and R. Gorrieri. “CVS at Work: A Report on New Failures upon Some Cryptographic Protocols”. In proceedings of Mathematical Methods, Models and Architectures for Computer Networks Security, pages 287–299, St. Petersburg, Russia, May 2001. LNCS 2052. 392
-
(2001)
Proceedings of Mathematical Methods, Models and Architectures for Computer Networks Security
, pp. 287-299
-
-
Durante, A.1
Focardi, R.2
Gorrieri, R.3
-
18
-
-
0029711948
-
Comparing Two Information Flow Security Properties
-
IEEE press, 348, 368
-
R. Focardi. “Comparing Two Information Flow Security Properties”. In Proceedings of Ninth IEEE Computer Security Foundation Workshop, (CSFW’96), (M. Merritt Ed.), pages 116–122. IEEE press, June 1996. 348, 368
-
(1996)
Proceedings of Ninth IEEE Computer Security Foundation Workshop, (CSFW’96)
, pp. 116-122
-
-
Focardi, R.1
-
19
-
-
85045341938
-
-
Technical Report CS98-5, University of Venice, 392
-
R. Focardi. “Located Entity Authentication”. Technical Report CS98-5, University of Venice, 1998. 392
-
(1998)
Located Entity Authentication”
-
-
Focardi, R.1
-
23
-
-
85046561112
-
A Taxonomy of Trace-based Security Properties for CCS
-
Li Gong, Franconia (NH), June, IEEE Press. 348
-
R. Focardi and R. Gorrieri. “A Taxonomy of Trace-based Security Properties for CCS”. In Proceedings Seventh IEEE Computer Security Foundation Workshop, (CSFW’94), (Li Gong Ed.), pages 126–136, Franconia (NH), June 1994. IEEE Press. 348
-
(1994)
Proceedings Seventh IEEE Computer Security Foundation Workshop, (CSFW’94)
, pp. 126-136
-
-
Focardi, R.1
Gorrieri, R.2
-
24
-
-
84974776068
-
A Classification of Security Properties for Process Algebras
-
333, 335, 348, 362, 363, 376, 377
-
R. Focardi and R. Gorrieri. “A Classification of Security Properties for Process Algebras”. Journal of Computer Security, 3(1):5–33, 1994/1995. 333, 335, 348, 362, 363, 376, 377
-
(1994)
Journal of Computer Security
, vol.3
, Issue.1
, pp. 5-33
-
-
Focardi, R.1
Gorrieri, R.2
-
25
-
-
84958771675
-
Automatic Compositional Verification of Some Security Properties
-
Passau (Germany), March, Springer-Verlag, LNCS 1055. 377
-
R. Focardi and R. Gorrieri. “Automatic Compositional Verification of Some Security Properties”. In Proceedings of Second International Workshop on Tools and Algorithms for the Construction and Analysis of Systems (TACAS’96), pages 167–186, Passau (Germany), March 1996. Springer-Verlag, LNCS 1055. 377
-
(1996)
Proceedings of Second International Workshop on Tools and Algorithms for the Construction and Analysis of Systems (TACAS’96)
, pp. 167-186
-
-
Focardi, R.1
Gorrieri, R.2
-
26
-
-
0001439194
-
The Compositional Security Checker: A Tool for the Verification of Information Flow Security Properties
-
335, 348, 377
-
R. Focardi and R. Gorrieri. “The Compositional Security Checker: A Tool for the Verification of Information Flow Security Properties”. IEEE Transactions on Software Engineering, 23(9):550–571, September 1997. 335, 348, 377
-
(1997)
IEEE Transactions on Software Engineering
, vol.23
, Issue.9
, pp. 550-571
-
-
Focardi, R.1
Gorrieri, R.2
-
28
-
-
0033725594
-
Information Flow Analysis in a Discrete Time Process Algebra
-
P.Syverson, IEEE CS Press, 391
-
R. Focardi, R. Gorrieri, and F. Martinelli. “Information Flow Analysis in a Discrete Time Process Algebra”. In Proceedings of 13th IEEE Computer Security Foundations Workshop (CSFW13), (P.Syverson ed.), pages 170–184. IEEE CS Press, July 2000. 391
-
(2000)
Proceedings of 13Th IEEE Computer Security Foundations Workshop (CSFW13)
, pp. 170-184
-
-
Focardi, R.1
Gorrieri, R.2
Martinelli, F.3
-
30
-
-
0003207615
-
Non Interference for the Analysis of Cryptographic Protocols
-
LNCS 1853, 331, 392
-
R. Focardi, R. Gorrieri, and F. Martinelli. “Non Interference for the Analysis of Cryptographic Protocols”. In Proceedings of ICALP’00, pages 744–755. LNCS 1853, July 2000. 331, 392
-
(2000)
Proceedings of ICALP’00
, pp. 744-755
-
-
Focardi, R.1
Gorrieri, R.2
Martinelli, F.3
-
32
-
-
0029485428
-
The Security Checker: A Semantics-based Tool for the Verification of Security Properties
-
Li Gong, Kenmare (Ireland), IEEE Press. 377
-
R. Focardi, R. Gorrieri, and V. Panini. “The Security Checker: a Semantics-based Tool for the Verification of Security Properties”. In Proceedings Eight IEEE Computer Security Foundation Workshop, (CSFW’95) (Li Gong Ed.), pages 60– 69, Kenmare (Ireland), June 1995. IEEE Press. 377
-
(1995)
Proceedings Eight IEEE Computer Security Foundation Workshop, (CSFW’95)
, pp. 60-69
-
-
Focardi, R.1
Gorrieri, R.2
Panini, V.3
-
36
-
-
0020299523
-
Security Policy and Security Models
-
IEEE Computer Society Press, April, 332, 333, 348
-
J. A. Goguen and J. Meseguer. “Security Policy and Security Models”. In Proceedings of the 1982 Symposium on Security and Privacy, pages 11–20. IEEE Computer Society Press, April 1982. 332, 333, 348
-
(1982)
Proceedings of the 1982 Symposium on Security and Privacy
, pp. 11-20
-
-
Goguen, J.A.1
Meseguer, J.2
-
37
-
-
84974577536
-
Information Flow vs. Resource Access in the Asynchronous Pi-Calculus
-
392
-
M. Hennessy and J. Riely. “Information Flow vs. Resource Access in the Asynchronous Pi-Calculus”. In proceedings of ICALP, pages 415–427, 2000. 392
-
(2000)
Proceedings of ICALP
, pp. 415-427
-
-
Hennessy, M.1
Riely, J.2
-
42
-
-
0025432462
-
CCS Expressions, Finite State Processes, and Three Problems of Equivalence
-
355, 380, 381
-
P. Kanellakis and S. A. Smolka. “CCS Expressions, Finite State Processes, and Three Problems of Equivalence”. Information & Computation 86, pages 43–68, May 1990. 355, 380, 381
-
(1990)
Information & Computation
, vol.86
, pp. 43-68
-
-
Kanellakis, P.1
Smolka, S.A.2
-
43
-
-
0016972709
-
Formal Verification of Parallel Programs
-
333
-
R. Keller. “Formal Verification of Parallel Programs”. Communications of the ACM, 19 (7):561–572, 1976. 333
-
(1976)
Communications of the ACM
, vol.19
, Issue.7
, pp. 561-572
-
-
Keller, R.1
-
44
-
-
0031633395
-
Casper: A Compiler for the Analysis of Security Protocols”
-
331
-
G. Lowe. “Casper: A Compiler for the Analysis of Security Protocols”. Journal of Computer Security, 6:53–84, 1998. 331
-
(1998)
Journal of Computer Security
, vol.6
, pp. 53-84
-
-
Lowe, G.1
-
45
-
-
35848959071
-
Using CSP to detect Errors in the TMN Protocol
-
331
-
G. Lowe and B. Roscoe. “Using CSP to detect Errors in the TMN Protocol”. IEEE Transactions on Software Engineering, 23(10):659–669, 1997. 331
-
(1997)
IEEE Transactions on Software Engineering
, vol.23
, Issue.10
, pp. 659-669
-
-
Lowe, G.1
Roscoe, B.2
-
48
-
-
0023829319
-
Noninterference and the Composability of Security Properties
-
IEEE Computer Society Press, 333, 376
-
D. McCullough. “Noninterference and the Composability of Security Properties”. In Proceedings, 1988 IEEE Symposium on Security and Privacy, pages 177–186. IEEE Computer Society Press, April 1988. 333, 376
-
(1988)
Proceedings, 1988 IEEE Symposium on Security and Privacy
, pp. 177-186
-
-
McCullough, D.1
-
50
-
-
0003954103
-
-
Prentice-Hall, 333, 335, 337, 339, 340, 343, 344, 361, 363, 364
-
R. Milner. Communication and Concurrency. Prentice-Hall, 1989. 333, 335, 337, 339, 340, 343, 344, 361, 363, 364
-
(1989)
Communication and Concurrency
-
-
Milner, R.1
-
52
-
-
0020845493
-
Testing equivalences for processes
-
341, 348, 353
-
R. De Nicola and M. Hennessy. “Testing equivalences for processes”. Theoretical Computer Science, 34:83–133, 1984. 341, 348, 353
-
(1984)
Theoretical Computer Science
, vol.34
, pp. 83-133
-
-
de Nicola, R.1
Hennessy, M.2
-
53
-
-
0030705795
-
Proving Properties of Security Protocols by Induction
-
IEEE Computer Society Press, 331
-
L. C. Paulson. “Proving Properties of Security Protocols by Induction”. In 10th Computer Security Foundations Workshop, pages 70–83. IEEE Computer Society Press, 1997. 331
-
(1997)
10Th Computer Security Foundations Workshop
, pp. 70-83
-
-
Paulson, L.C.1
-
55
-
-
0001789630
-
Model Checking CSP
-
A. W. Roscoe, Prentice Hall, 368, 375
-
A. W. Roscoe. “Model Checking CSP”. In A. W. Roscoe (ed) A Classical Mind. Prentice Hall, 1994. 368, 375
-
(1994)
A Classical Mind
-
-
Roscoe, A.W.1
-
56
-
-
0001868056
-
Non- interference through Deter-minism
-
Springer-Verlag LNCS 875, 368, 369, 370, 375
-
A. W. Roscoe, J. C. P. Woodcock, and L. Wulf. “Non- interference through Deter-minism”. In Proceeding of European Symposium on Research in Computer Security 1994 (ESORICS’94), pages 33–53. Springer-Verlag LNCS 875, 1994. 368, 369, 370, 375
-
(1994)
Proceeding of European Symposium on Research in Computer Security 1994 (ESORICS’94)
, pp. 33-53
-
-
Roscoe, A.W.1
Woodcock, J.C.P.2
Wulf, L.3
-
60
-
-
0031648455
-
Secure Information Flow in a Multi-Threaded Imperative Language
-
331
-
G. Smith and D. M. Volpano. “Secure Information Flow in a Multi-Threaded Imperative Language”. In Proc. of POPL, pages 355–364, 1998. 331
-
(1998)
Proc. of POPL
, pp. 355-364
-
-
Smith, G.1
Volpano, D.M.2
-
62
-
-
0038118932
-
A Model of Information
-
National Bureau of Standards and National Computer Security Center, 333, 376
-
D. Sutherland. “A Model of Information”. In Proceedings of the 9th National Computer Security Conference, pages 175–183. National Bureau of Standards and National Computer Security Center, September 1986. 333, 376
-
(1986)
Proceedings of the 9Th National Computer Security Conference
, pp. 175-183
-
-
Sutherland, D.1
|