Preserving ( Security ) Properties under Action Refinement ?
暂无分享,去创建一个
[1] Jonathan K. Millen,et al. Unwinding forward correctability , 1994, Proceedings The Computer Security Foundations Workshop VII.
[2] Gérard Boudol. Atomic actions , 1989, Bull. EATCS.
[3] Arend Rensink,et al. Action Refinement , 1999, Handbook of Process Algebra.
[4] Riccardo Focardi,et al. Refinement operators and information flow security , 2003, First International Conference onSoftware Engineering and Formal Methods, 2003.Proceedings..
[5] J. Meseguer,et al. Security Policies and Security Models , 1982, 1982 IEEE Symposium on Security and Privacy.
[6] Niklaus Wirth,et al. Program development by stepwise refinement , 1971, CACM.
[7] Luca Aceto,et al. Adding Action Refinement to a Finite Process Algebra , 1991, Inf. Comput..
[8] Grzegorz Rozenberg,et al. Stepwise Refinement of Distributed Systems Models, Formalisms, Correctness , 1989, Lecture Notes in Computer Science.
[9] Riccardo Focardi,et al. Verifying persistent security properties , 2004, Comput. Lang. Syst. Struct..
[10] Kim S. Larsen,et al. Fully abstract models for a process language with refinement , 1988, REX Workshop.
[11] Carla Piazza,et al. Information Flow Security and Recursive Systems , 2003, ICTCS.
[12] Roberto Gorrieri,et al. A Causal Operational Semantics of Action Refinement , 1995, Inf. Comput..
[13] Heiko Mantel,et al. Possibilistic definitions of security-an assembly kit , 2000, Proceedings 13th IEEE Computer Security Foundations Workshop. CSFW-13.
[14] Arend Rensink,et al. Comparing Syntactic and Semantic Sction Refinement , 1996, Inf. Comput..
[15] Ursula Goltz,et al. Refinement of actions and equivalence notions for concurrent systems , 2001, Acta Informatica.
[16] Robin Milner,et al. Communication and concurrency , 1989, PHI Series in computer science.
[17] Roberto Gorrieri,et al. Classification of Security Properties (Part I: Information Flow) , 2000, FOSAD.
[18] Erik P. de Vink,et al. Bisimulation Semantics for Concurrency with Atomicity and Action Refinement , 1994, Fundam. Informaticae.
[19] Simon N. Foley,et al. A Universal Theory of Information Flow , 1987, 1987 IEEE Symposium on Security and Privacy.
[20] John McLean,et al. Security models and information flow , 1990, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy.
[21] Riccardo Focardi,et al. Information flow security in dynamic contexts , 2006, J. Comput. Secur..