Model checking usage policies
暂无分享,去创建一个
[1] Ivan Lanese,et al. Tools and Verification , 2011, Results of the SENSORIA Project.
[2] Gian Luigi Ferrari,et al. Model Checking Usage Policies , 2008, TGC.
[3] Andrew W. Appel,et al. SAFKASI: a security mechanism for language-based systems , 2000, TSEM.
[4] Nissim Francez,et al. Finite-Memory Automata , 1994, Theor. Comput. Sci..
[5] Jan A. Bergstra,et al. Algebra of Communicating Processes with Abstraction , 1985, Theor. Comput. Sci..
[6] Orna Grumberg,et al. Variable Automata over Infinite Alphabets , 2010, LATA.
[7] Gian Luigi Ferrari,et al. Nominal Automata for Resource Usage Control , 2012, CIAA.
[8] Gian Luigi Ferrari,et al. On Quantitative Security Policies , 2011, PaCT.
[9] P. Samarati,et al. Access control: principle and practice , 1994, IEEE Communications Magazine.
[10] Marta Z. Kwiatkowska,et al. PRISM: probabilistic model checking for performance and reliability analysis , 2009, PERV.
[11] Gian Luigi Ferrari,et al. Local policies for resource usage analysis , 2009, TOPL.
[12] Cédric Fournet,et al. Stack inspection: Theory and variants , 2003, TOPL.
[13] Luc Segoufin. Automata and Logics for Words and Trees over an Infinite Alphabet , 2006, CSL.
[14] Massimo Bartoletti,et al. Usage Automata , 2009, ARSPA-WITS.
[15] Scott F. Smith,et al. History Effects and Verification , 2004, APLAS.
[16] Gian Luigi Ferrari,et al. Planning and verifying service composition , 2009, J. Comput. Secur..
[17] Massimo Bartoletti,et al. Securing Java with Local Policies , 2009, J. Object Technol..
[18] Bowen Alpern,et al. Recognizing safety and liveness , 2005, Distributed Computing.
[19] Robin Milner,et al. A Calculus of Mobile Processes, II , 1992, Inf. Comput..
[20] Gian Luigi Ferrari,et al. History-Based Access Control with Local Policies , 2005, FoSSaCS.
[21] Raju Pandey,et al. Providing Fine-grained Access Control for Java Programs , 1999, ECOOP.
[22] Gian Luigi Ferrari,et al. Semantics-Based Design for Secure Web Services , 2008, IEEE Transactions on Software Engineering.
[23] Javier Esparza,et al. On the Decidability of Model Checking for Several µ-calculi and Petri Nets , 1994, CAAP.
[24] Úlfar Erlingsson,et al. SASI enforcement of security policies: a retrospective , 1999, Proceedings DARPA Information Survivability Conference and Exposition. DISCEX'00.
[25] Fabio Martinelli,et al. Enhancing Java Security with History Based Access Control , 2007, FOSAD.
[26] Michael J. Nash,et al. The Chinese Wall security policy , 1989, Proceedings. 1989 IEEE Symposium on Security and Privacy.
[27] Sabrina De Capitani di Vimercati,et al. Access Control: Policies, Models, and Mechanisms , 2000, FOSAD.
[28] Fred B. Schneider,et al. Enforceable security policies , 2000, TSEC.
[29] Anindya Banerjee,et al. History-Based Access Control and Secure Information Flow , 2004, CASSIS.
[30] Gian Luigi Ferrari,et al. Types and effects for secure service orchestration , 2006, 19th IEEE Computer Security Foundations Workshop (CSFW'06).
[31] Nissim Francez,et al. Finite-State Unification Automata and Relational Languages , 1994, Inf. Comput..
[32] Martín Abadi,et al. Access Control Based on Execution History , 2003, NDSS.
[33] Marco Pistore,et al. History-Dependent Automata: An Introduction , 2005, SFM.
[34] A.J.N. Houghton,et al. Field trials for fiber access in the EC , 1994, IEEE Communications Magazine.