Supervisory Control for Opacity
暂无分享,去创建一个
[1] S.L. Ricker. A question of access: decentralized control and communication strategies for security policies , 2006, 2006 8th International Workshop on Discrete Event Systems.
[2] M. Bouaziz,et al. An Introduction to Computer Security , 2012 .
[3] W. M. Wonham,et al. The control of discrete event systems , 1989 .
[4] P. Darondeau,et al. Opacity enforcing control synthesis , 2008, 2008 9th International Workshop on Discrete Event Systems.
[5] Gurvan Le Guernic. Information flow testing: the third path towards confidentiality guarantee , 2007 .
[6] Steve A. Schneider,et al. CSP and Anonymity , 1996, ESORICS.
[7] Gavin Lowe,et al. Towards a completeness result for model checking of security protocols , 1998, Proceedings. 11th IEEE Computer Security Foundations Workshop (Cat. No.98TB100238).
[8] Martín Abadi,et al. Automated verification of selected equivalences for security protocols , 2005, 20th Annual IEEE Symposium on Logic in Computer Science (LICS' 05).
[9] Christos G. Cassandras,et al. Introduction to Discrete Event Systems , 1999, The Kluwer International Series on Discrete Event Dynamic Systems.
[10] Benoît Caillaud,et al. Concurrent Secrets , 2007, 2006 8th International Workshop on Discrete Event Systems.
[11] Shigemasa Takai,et al. A Formula for the Supremal Controllable and Opaque Sublanguage Arising in Supervisory Control , 2008 .
[12] Pavol Cerný,et al. Preserving Secrecy Under Refinement , 2006, ICALP.
[13] Roland Groz,et al. Test Generation for Network Security Rules , 2006, TestCom.
[14] Maciej Koutny,et al. Opacity generalised to transition systems , 2005, International Journal of Information Security.
[15] Laurent Mazare,et al. Using Unification For Opacity Properties , 2004 .
[16] Roberto Gorrieri,et al. Classification of Security Properties (Part I: Information Flow) , 2000, FOSAD.
[17] Christoforos N. Hadjicostis,et al. Notions of security and opacity in discrete event systems , 2007, 2007 46th IEEE Conference on Decision and Control.
[18] Thierry Jéron,et al. Monitoring Information flow by Diagnosis Techniques , 2007 .
[19] Lujo Bauer,et al. Edit automata: enforcement mechanisms for run-time security policies , 2005, International Journal of Information Security.
[20] A. Saboori,et al. Verification of initial-state opacity in security applications of DES , 2008, 2008 9th International Workshop on Discrete Event Systems.
[21] P. Ramadge,et al. Supervisory control of a class of discrete event processes , 1987 .
[22] Fred B. Schneider,et al. Enforceable security policies , 2000, Foundations of Intrusion Tolerant Systems, 2003 [Organically Assured and Survivable Information Systems].
[23] Nejib Ben Hadj-Alouane,et al. On the verification of intransitive noninterference in mulitlevel security , 2005, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).
[24] Stéphane Lafortune,et al. Failure diagnosis using discrete event models , 1994, Proceedings of 1994 33rd IEEE Conference on Decision and Control.
[25] H. Marchand,et al. Supervision patterns in discrete event systems diagnosis , 2006, 2006 8th International Workshop on Discrete Event Systems.
[26] Olivier Roux,et al. Synthesis of non-interferent distributed systems , 2007 .