A formal approach to the integrated analysis of security and QoS
暂无分享,去创建一个
[1] Andrew C. Simpson,et al. Safety through security , 1998, Proceedings Ninth International Workshop on Software Specification and Design.
[2] Bruno Dutertre,et al. From security to safety and back , 1998, Proceedings Computer Security, Dependability, and Assurance: From Needs to Solutions (Cat. No.98EX358).
[3] Mario Bravetti,et al. A Process Algebraic Approach for the Analysis of Probabilistic Non-interference , 2011 .
[4] Stephen S. Lavenberg,et al. Computer Performance Modeling Handbook , 1983, Int. CMG Conference.
[5] Roberto Gorrieri,et al. A Classification of Security Properties , 1993 .
[6] Chris Hankin,et al. Approximate non-interference , 2004 .
[7] Sushil Jajodia,et al. Computer Security, Fault Tolerance, And Software Assurance , 1999, IEEE Concurrency.
[8] Alessandro Aldini,et al. Assessing the impact of dynamic power management on the functionality and the performance of battery-powered appliances , 2004, International Conference on Dependable Systems and Networks, 2004.
[9] Roberto Gorrieri,et al. Security Analysis of a Probabilistic Non-repudiation Protocol , 2002, PAPM-PROBMIV.
[10] Jonathan K. Millen,et al. Non-interference, who needs it? , 2001, Proceedings. 14th IEEE Computer Security Foundations Workshop, 2001..
[11] Catherine A. Meadows,et al. What Makes a Cryptographic Protocol Secure? The Evolution of Requirements Specification in Formal Cryptographic Protocol Analysis , 2003, ESOP.
[12] J. Meseguer,et al. Security Policies and Security Models , 1982, 1982 IEEE Symposium on Security and Privacy.
[13] Paolo Ciancarini,et al. Stochastic Process Algebra: From an Algebraic Formalism to an Architectural Description Language , 2002, Performance.
[14] Gavin Lowe,et al. Quantifying information flow , 2002, Proceedings 15th IEEE Computer Security Foundations Workshop. CSFW-15.
[15] Robin Milner,et al. Communication and concurrency , 1989, PHI Series in computer science.
[16] Alessandro Aldini,et al. An Integrated View of Security Analysis and Performance Evaluation: Trading QoS with Covert Channel Bandwidth , 2004, SAFECOMP.
[17] Andrea Maggiolo-Schettini,et al. A Classification of Time and/or Probability Dependent Security Properties , 2006, Electron. Notes Theor. Comput. Sci..
[18] Alessandro Aldini,et al. TwoTowers 4.0: towards the integration of security analysis and performance evaluation , 2004 .
[19] Enrico Tronci,et al. Automatic Analysis of the NRL Pump , 2004, Electron. Notes Theor. Comput. Sci..
[20] Myong H. Kang,et al. Design and assurance strategy for the NRL pump , 1997, Proceedings 1997 High-Assurance Engineering Workshop.
[21] B. Di Vito. A model of cooperative noninterference for integrated modular avionics , 1999, Dependable Computing for Critical Applications 7.
[22] Roberto Gorrieri,et al. A Taxonomy of Security Properties for Process Algebras , 1995, J. Comput. Secur..
[23] William J. Stewart,et al. Introduction to the numerical solution of Markov Chains , 1994 .
[24] Alessandro Aldini,et al. TwoTowers 4.0: towards the integration of security analysis and performance evaluation , 2004, First International Conference on the Quantitative Evaluation of Systems, 2004. QEST 2004. Proceedings..
[25] I. S. Moskowitz,et al. Covert channels-here to stay? , 1994, Proceedings of COMPASS'94 - 1994 IEEE 9th Annual Conference on Computer Assurance.
[26] Ralf Steinmetz,et al. On Availability QoS for Replicated Multimedia Service and Content , 2002, IDMS/PROMS.
[27] LanotteRuggero,et al. Automatic Analysis of the NRL Pump , 2004 .
[28] Roberto Gorrieri,et al. Real-time information flow analysis , 2003, IEEE J. Sel. Areas Commun..
[29] Mario Bravetti,et al. Performance measure sensitive congruences for Markovian process algebras , 2003, Theor. Comput. Sci..