Team Automata for Security: - A Survey -
暂无分享,去创建一个
[1] Gavin Lowe,et al. Breaking and Fixing the Needham-Schroeder Public-Key Protocol Using FDR , 1996, Softw. Concepts Tools.
[2] R.,et al. A CLASSIFICATION OF SECURITY PROPERTIES FOR PROCESS ALGEBRAS 1 , 1994 .
[3] David A. Wagner,et al. Setuid Demystified , 2002, USENIX Security Symposium.
[4] Hartmut Ehrig. Petri Net Technology for communication-based systems : advances in Petri Nets , 2003 .
[5] Nancy A. Lynch,et al. I/O automaton models and proofs for shared-key communication systems , 1999, Proceedings of the 12th IEEE Computer Security Foundations Workshop.
[6] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[7] Rajeev Alur,et al. A Theory of Timed Automata , 1994, Theor. Comput. Sci..
[8] Gregor Engels,et al. Towards Team-Automata-Driven Object-Oriented Collaborative Work , 2002, Formal and Natural Computing.
[9] Steve Benford,et al. An access control framework for multi-user collaborative environments , 1999, GROUP.
[10] Maurice H. ter Beek,et al. Team Automata: A Formal Approach to the Modeling of Collaboration Between System Components , 2003 .
[11] Nancy A. Lynch. Input/Output Automata: Basic, Timed, Hybrid, Probabilistic, Dynamic, , 2003, CONCUR.
[12] Gerard J. Holzmann,et al. The SPIN Model Checker - primer and reference manual , 2003 .
[13] Fabio Martinelli,et al. A Uniform Approach for the Definition of Security Properties , 1999, World Congress on Formal Methods.
[14] Danny Dolev,et al. On the security of public key protocols , 1981, 22nd Annual Symposium on Foundations of Computer Science (sfcs 1981).
[15] Alan Bundy,et al. Constructing Induction Rules for Deductive Synthesis Proofs , 2006, CLASE.
[16] Roberto Segala,et al. A Compositional Trace-Based Semantics for Probabilistic Automata , 1995, CONCUR.
[17] Clarence A. Ellis. Team automata for groupware systems , 1997, GROUP '97.
[18] Nancy A. Lynch,et al. An introduction to input/output automata , 1989 .
[19] M. Beek. A Connict-free Strategy for Team-based Model Development , 2000 .
[20] David A. Wagner,et al. MOPS: an infrastructure for examining security properties of software , 2002, CCS '02.
[21] Grzegorz Rozenberg,et al. Synchronizations in Team Automata for Groupware Systems , 2003, Computer Supported Cooperative Work (CSCW).
[22] Gabriele Lenzini,et al. Team Automata for Security Analysis of Multicast/Broadcast Communication , 2003 .
[23] Nancy A. Lynch,et al. Hierarchical correctness proofs for distributed algorithms , 1987, PODC '87.
[24] Roberto Gorrieri,et al. The Compositional Security Checker: A Tool for the Verification of Information Flow Security Properties , 1997, IEEE Trans. Software Eng..
[25] Lawrence Charles Paulson,et al. Isabelle/HOL: A Proof Assistant for Higher-Order Logic , 2002 .
[26] Andrea Maggiolo-Schettini,et al. Weak bisimulation for probabilistic timed automata and applications to security , 2003, First International Conference onSoftware Engineering and Formal Methods, 2003.Proceedings..
[27] Volkmar Lotz,et al. Formal Security Analysis with Interacting State Machines , 2002, ESORICS.
[28] Fred B. Schneider,et al. Enforceable security policies , 2000, TSEC.
[29] Roberto Gorrieri,et al. Classification of Security Properties (Part I: Information Flow) , 2000, FOSAD.
[30] Carsten Rudolph,et al. Role based specification and security analysis of cryptographic protocols using asynchronous product automata , 2002, Proceedings. 13th International Workshop on Database and Expert Systems Applications.
[31] Prasun Dewan,et al. Flexible meta access-control for collaborative applications , 1998, CSCW '98.
[32] D. Elliott Bell,et al. Secure Computer System: Unified Exposition and Multics Interpretation , 1976 .
[33] Gabriele Lenzini,et al. Team Automata for Security Analysis , 2004 .
[34] Steve Benford,et al. Access control in virtual environments , 1997, VRST '97.
[35] J. Meseguer,et al. Security Policies and Security Models , 1982, 1982 IEEE Symposium on Security and Privacy.
[36] David von Oheimb. Interacting State Machines: A Stateful Approach to Proving Security , 2002, FASec.
[37] Fabio Martinelli,et al. Compositional Verification of Secure Streamed Data: A Case Study with EMSS , 2003, ICTCS.
[38] Ran Canetti,et al. Efficient authentication and signing of multicast streams over lossy channels , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.
[39] Hemang Lavana. A Universally Configurable Architecture for Taskflow-Oriented Design of a Distributed Collaborative , 2000 .
[40] Jetty Kleijn,et al. Team Automata for CSCW - A Survey , 2003, Petri Net Technology for Communication-Based Systems.
[41] Grzegorz Rozenberg,et al. Team automata for spatial access control , 2001, ECSCW.
[42] Roberto Gorrieri,et al. Classification of Security Properties - Part II: Network Security , 2002, FOSAD.
[43] Roberto Gorrieri,et al. Non Interference for the Analysis of Cryptographic Protocols , 2000, ICALP.
[44] Kwang-Hoon Kim,et al. A Framework and Taxonomy for Workflow Architecture , 2000, COOP.
[45] Roberto Gorrieri,et al. Secrecy in Security Protocols as Non Interference , 1999, Workshop on Secure Architectures and Information Flow.
[46] G. Lowe,et al. Breaking and Fixing the Needham-Schroeder Public-Key Protocol using CSP and FDR , 1996 .
[47] Oliver Costich,et al. A classical automata approach to noninterference type problems , 1992, [1992] Proceedings The Computer Security Foundations Workshop V.
[48] Marinella Petrocchi,et al. Modelling a Secure Agent with Team Automata , 2006, Electron. Notes Theor. Comput. Sci..