Non-Interference Control Synthesis for Security Timed Automata
暂无分享,去创建一个
[1] John Rushby,et al. Noninterference, Transitivity, and Channel-Control Security Policies 1 , 2005 .
[2] Roberto Gorrieri,et al. Classification of Security Properties (Part I: Information Flow) , 2000, FOSAD.
[3] Roberto Gorrieri,et al. A Classification of Security Properties , 1993 .
[4] Kim G. Larsen,et al. From Timed Automata to Logic - and Back , 1995, MFCS.
[5] P. Madhusudan,et al. Timed Control Synthesis for External Specifications , 2002, STACS.
[6] Rajeev Alur,et al. A Theory of Timed Automata , 1994, Theor. Comput. Sci..
[7] Walter Murray Wonham,et al. On observability of discrete-event systems , 1988, Inf. Sci..
[8] Nejib Ben Hadj-Alouane,et al. Characterizing Intransitive Non-Interference in Security Policies with Observability , 2004 .
[9] Alexander K. Petrenko,et al. Electronic Notes in Theoretical Computer Science , 2009 .
[10] Heiko Mantel,et al. Information Flow Control and Applications - Bridging a Gap , 2001, FME.
[11] Nejib Ben Hadj-Alouane,et al. Characterizing intransitive noninterference for 3-domain security policies with observability , 2005, IEEE Transactions on Automatic Control.
[12] Joseph Sifakis,et al. On the Synthesis of Discrete Controllers for Timed Systems (An Extended Abstract) , 1995, STACS.
[13] H. Wong-Toi,et al. The control of dense real-time discrete event systems , 1991, [1991] Proceedings of the 30th IEEE Conference on Decision and Control.
[14] Feng Lin,et al. An algorithmic approach to verification of intransitive non-interference in security policies , 2004, 2004 43rd IEEE Conference on Decision and Control (CDC) (IEEE Cat. No.04CH37601).
[15] Luca Aceto,et al. Characteristic formulae for timed automata , 2000, RAIRO Theor. Informatics Appl..
[16] John Mullins. Nondeterministic Admissible Interference , 2000, J. Univers. Comput. Sci..
[17] Birgit Pfitzmann,et al. Intransitive non-interference for cryptographic purposes , 2003, 2003 Symposium on Security and Privacy, 2003..
[18] Carla Piazza,et al. Modelling downgrading in information flow security , 2004, Proceedings. 17th IEEE Computer Security Foundations Workshop, 2004..
[19] Roberto Barbuti,et al. A Decidable Notion of Timed Non-Interference , 2003, Fundam. Informaticae.
[20] S. Tripakis,et al. Tools for Controller Synthesis of Timed Systems , 2002 .
[21] Raja Sengupta,et al. Diagnosability of discrete-event systems , 1995, IEEE Trans. Autom. Control..
[22] Roberto Gorrieri,et al. Real-time information flow analysis , 2003, IEEE J. Sel. Areas Commun..
[23] Edward W. Felten,et al. Timing attacks on Web privacy , 2000, CCS.