Two Formal Approaches for Approximating Noninterference Properties
暂无分享,去创建一个
Mario Bravetti | Chris Hankin | Roberto Gorrieri | Herbert Wiklicky | Alessandro Aldini | Alessandra Di Pierro | C. Hankin | M. Bravetti | R. Gorrieri | A. Aldini | A. Pierro | H. Wiklicky
[1] Herbert Wiklicky,et al. Probabilistic Concurrent Constraint Programming: Towards a Fully Abstract Model , 1998, MFCS.
[2] J. Meseguer,et al. Security Policies and Security Models , 1982, 1982 IEEE Symposium on Security and Privacy.
[3] Salvatore Tucci,et al. Performance Evaluation of Complex Systems: Techniques and Tools , 2002, Lecture Notes in Computer Science.
[4] Jan A. Bergstra,et al. Axiomatizing Probabilistic Processes: ACP with Generative Probabilities , 1995, Inf. Comput..
[5] James W. Gray,et al. Toward a mathematical foundation for information flow security , 1991, Proceedings. 1991 IEEE Computer Society Symposium on Research in Security and Privacy.
[6] Geoffrey Smith,et al. A new type system for secure information flow , 2001, Proceedings. 14th IEEE Computer Security Foundations Workshop, 2001..
[7] Robin Milner,et al. Communication and concurrency , 1989, PHI Series in computer science.
[8] Paul F. Syverson,et al. The epistemic representation of information flow security in probabilistic systems , 1995, Proceedings The Eighth IEEE Computer Security Foundations Workshop.
[9] Roberto Gorrieri,et al. A Classification of Security Properties , 1993 .
[10] David Sands,et al. Probabilistic noninterference for multi-threaded programs , 2000, Proceedings 13th IEEE Computer Security Foundations Workshop. CSFW-13.
[11] John C. Mitchell,et al. A probabilistic poly-time framework for protocol analysis , 1998, CCS '98.
[12] Peter G. Harrison,et al. Stochastic Process Algebra for Discrete Event Simulation , 1995 .
[13] John McLean,et al. Security models and information flow , 1990, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy.
[14] Rob van Glabbeek,et al. Handbook of Process Algebra , 2001 .
[15] A. Tarski,et al. Cylindric Algebras. Part II , 1988 .
[16] Mario Bravetti,et al. Compositional Asymmetric Cooperations for Process Algebras with Probabilities, Priorities, and Time , 2000, MTCS.
[17] Andrew C. Myers,et al. Language-based information-flow security , 2003, IEEE J. Sel. Areas Commun..
[18] Herbert Wiklicky,et al. An operational semantics for probabilistic concurrent constraint programming , 1998, Proceedings of the 1998 International Conference on Computer Languages (Cat. No.98CB36225).
[19] John N. Tsitsiklis,et al. Introduction to Probability , 2002 .
[20] Jane Hillston,et al. A compositional approach to performance modelling , 1996 .
[21] James W. Gray,et al. Probabilistic interference , 1990, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy.
[22] Bernhard Steffen,et al. Reactive, generative, and stratified models of probabilistic processes , 1990, [1990] Proceedings. Fifth Annual IEEE Symposium on Logic in Computer Science.
[23] Chris Hankin,et al. Analysing Approximate Confinement under Uniform Attacks , 2002, SAS.
[24] Herbert Wiklicky,et al. Quantitative Observables and Averages in Probabilistic Constraint Programming , 1999, New Trends in Constraints.
[25] Chris Hankin,et al. Approximate non-interference , 2002, Proceedings 15th IEEE Computer Security Foundations Workshop. CSFW-15.
[26] Radha Jagadeesan,et al. Metrics for Labeled Markov Systems , 1999, CONCUR.
[27] Vijay A. Saraswat,et al. Concurrent constraint programming , 1989, POPL '90.
[28] Mario Bravetti,et al. A Process Algebraic Approach for the Analysis of Probabilistic Non-interference , 2011 .
[29] Roberto Gorrieri,et al. A Taxonomy of Security Properties for Process Algebras , 1995, J. Comput. Secur..
[30] Radha Jagadeesan,et al. The metric analogue of weak bisimulation for probabilistic processes , 2002, Proceedings 17th Annual IEEE Symposium on Logic in Computer Science.
[31] Mario Bravetti,et al. Discrete time generative-reactive probabilistic processes with different advancing speeds , 2003, Theor. Comput. Sci..
[32] Chris Hankin,et al. Probabilistic confinement in a declarative framework , 2001, APPIA-GULP-PRODE.
[33] C. A. R. Hoare,et al. Communicating sequential processes , 1978, CACM.
[34] Paul F. Syverson,et al. A logical approach to multilevel security of probabilistic systems , 1998, Distributed Computing.
[35] Alessandro Aldini,et al. On the Extension of Non-interference with Probabilities , 2002 .
[36] Holger Hermanns,et al. Process Algebra and Markov Chains , 2002, European Educational Forum: School on Formal Methods and Performance Analysis.
[37] Sheldon M. Ross. Introduction to Probability Models. , 1995 .
[38] Mario Bravetti. An Integrated Approach for the Specification and Analysis of Stochastic Real-Time Systems , 2002, PAPM-PROBMIV.
[39] Patrick Billingsley,et al. Probability and Measure. , 1986 .
[40] Joost-Pieter Katoen,et al. Lectures on Formal Methods and PerformanceAnalysis , 2001, Lecture Notes in Computer Science.
[41] David Clark,et al. Quantitative Analysis of the Leakage of Confidential Data , 2002, QAPL.
[42] Christel Baier,et al. Weak Bisimulation for Fully Probabilistic Processes , 1997, FBT.
[43] Roberto Gorrieri,et al. Security Analysis of a Probabilistic Non-repudiation Protocol , 2002, PAPM-PROBMIV.
[44] Jonathan K. Millen,et al. Non-interference, who needs it? , 2001, Proceedings. 14th IEEE Computer Security Foundations Workshop, 2001..
[45] James Worrell,et al. Towards Quantitative Verification of Probabilistic Transition Systems , 2001, ICALP.
[46] Charles M. Grinstead,et al. Introduction to probability , 1999, Statistics for the Behavioural Sciences.
[47] Holger Hermanns,et al. Stochastic process algebras: integrating qualitative and quantitative modelling , 1994, FORTE.
[48] J. Baeten. Applications of process algebra , 1990 .
[49] Roberto Gorrieri,et al. Foundations of Security Analysis and Design - Tutorial Lectures , 2000 .
[50] Roberto Gorrieri,et al. A Formal Approach to the Integration of Performance Aspects in the Modeling and Analysis of Concurrent Systems , 1998, Inf. Comput..
[51] Geoffrey Smith,et al. Probabilistic noninterference through weak probabilistic bisimulation , 2003, 16th IEEE Computer Security Foundations Workshop, 2003. Proceedings..
[52] Frank S. de Boer,et al. Nondeterminism and Infinite Computations in Constraint Programming , 1995, Theor. Comput. Sci..
[53] Chris Hankin,et al. Quantitative Relations and Approximate Process Equivalences , 2003, CONCUR.
[54] Alessandro Aldini,et al. Probabilistic Information Flow in a Process Algebra , 2001, CONCUR.
[55] David Sands,et al. A Per Model of Secure Information Flow in Sequential Programs , 1999, High. Order Symb. Comput..
[56] Olivier Markowitch,et al. Probabilistic Non-Repudiation without Trusted Third Party , 1999 .