Model checking usage policies

[1]  Ivan Lanese,et al.  Tools and Verification , 2011, Results of the SENSORIA Project.

[2]  Gian Luigi Ferrari,et al.  Model Checking Usage Policies , 2008, TGC.

[3]  Andrew W. Appel,et al.  SAFKASI: a security mechanism for language-based systems , 2000, TSEM.

[4]  Nissim Francez,et al.  Finite-Memory Automata , 1994, Theor. Comput. Sci..

[5]  Jan A. Bergstra,et al.  Algebra of Communicating Processes with Abstraction , 1985, Theor. Comput. Sci..

[6]  Orna Grumberg,et al.  Variable Automata over Infinite Alphabets , 2010, LATA.

[7]  Gian Luigi Ferrari,et al.  Nominal Automata for Resource Usage Control , 2012, CIAA.

[8]  Gian Luigi Ferrari,et al.  On Quantitative Security Policies , 2011, PaCT.

[9]  P. Samarati,et al.  Access control: principle and practice , 1994, IEEE Communications Magazine.

[10]  Marta Z. Kwiatkowska,et al.  PRISM: probabilistic model checking for performance and reliability analysis , 2009, PERV.

[11]  Gian Luigi Ferrari,et al.  Local policies for resource usage analysis , 2009, TOPL.

[12]  Cédric Fournet,et al.  Stack inspection: Theory and variants , 2003, TOPL.

[13]  Luc Segoufin Automata and Logics for Words and Trees over an Infinite Alphabet , 2006, CSL.

[14]  Massimo Bartoletti,et al.  Usage Automata , 2009, ARSPA-WITS.

[15]  Scott F. Smith,et al.  History Effects and Verification , 2004, APLAS.

[16]  Gian Luigi Ferrari,et al.  Planning and verifying service composition , 2009, J. Comput. Secur..

[17]  Massimo Bartoletti,et al.  Securing Java with Local Policies , 2009, J. Object Technol..

[18]  Bowen Alpern,et al.  Recognizing safety and liveness , 2005, Distributed Computing.

[19]  Robin Milner,et al.  A Calculus of Mobile Processes, II , 1992, Inf. Comput..

[20]  Gian Luigi Ferrari,et al.  History-Based Access Control with Local Policies , 2005, FoSSaCS.

[21]  Raju Pandey,et al.  Providing Fine-grained Access Control for Java Programs , 1999, ECOOP.

[22]  Gian Luigi Ferrari,et al.  Semantics-Based Design for Secure Web Services , 2008, IEEE Transactions on Software Engineering.

[23]  Javier Esparza,et al.  On the Decidability of Model Checking for Several µ-calculi and Petri Nets , 1994, CAAP.

[24]  Úlfar Erlingsson,et al.  SASI enforcement of security policies: a retrospective , 1999, Proceedings DARPA Information Survivability Conference and Exposition. DISCEX'00.

[25]  Fabio Martinelli,et al.  Enhancing Java Security with History Based Access Control , 2007, FOSAD.

[26]  Michael J. Nash,et al.  The Chinese Wall security policy , 1989, Proceedings. 1989 IEEE Symposium on Security and Privacy.

[27]  Sabrina De Capitani di Vimercati,et al.  Access Control: Policies, Models, and Mechanisms , 2000, FOSAD.

[28]  Fred B. Schneider,et al.  Enforceable security policies , 2000, TSEC.

[29]  Anindya Banerjee,et al.  History-Based Access Control and Secure Information Flow , 2004, CASSIS.

[30]  Gian Luigi Ferrari,et al.  Types and effects for secure service orchestration , 2006, 19th IEEE Computer Security Foundations Workshop (CSFW'06).

[31]  Nissim Francez,et al.  Finite-State Unification Automata and Relational Languages , 1994, Inf. Comput..

[32]  Martín Abadi,et al.  Access Control Based on Execution History , 2003, NDSS.

[33]  Marco Pistore,et al.  History-Dependent Automata: An Introduction , 2005, SFM.

[34]  A.J.N. Houghton,et al.  Field trials for fiber access in the EC , 1994, IEEE Communications Magazine.