A Process Algebraic Approach to Security Policies
暂无分享,去创建一个
[1] Steve A. Schneider. Security properties and CSP , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.
[2] Peter Y. A. Ryan,et al. Process algebra and non-interference , 2001 .
[3] Michael Goldsmith,et al. Modelling and analysis of security protocols , 2001 .
[4] Sabina Petride,et al. Review of "Concurrent and real-time systems: the CSP approach" by Steve Schneider. Wiley 1999. , 2004, SIGA.
[5] Steve A. Schneider,et al. Concurrent and Real-time Systems: The CSP Approach , 1999 .
[6] Fred B. Schneider,et al. Enforceable security policies , 2000, TSEC.
[7] Peter Y. A. Ryan,et al. Mathematical Models of Computer Security , 2000, FOSAD.
[8] C. A. R. Hoare,et al. Communicating Sequential Processes (Reprint) , 1983, Commun. ACM.
[9] Andrew William Roscoe,et al. The Theory and Practice of Concurrency , 1997 .