IEEE Transactions on Software Engineering
Information flow vs. resource access in the asynchronous pi-calculus
ACM Transactions on Programming Languages and Systems (TOPLAS)
Towards Development of Secure Systems Using UMLsec
FASE '01 Proceedings of the 4th International Conference on Fundamental Approaches to Software Engineering
Mathematical Models of Computer Security
FOSAD '00 Revised versions of lectures given during the IFIP WG 1.7 International School on Foundations of Security Analysis and Design on Foundations of Security Analysis and Design: Tutorial Lectures
Classification of Security Properties (Part I: Information Flow)
FOSAD '00 Revised versions of lectures given during the IFIP WG 1.7 International School on Foundations of Security Analysis and Design on Foundations of Security Analysis and Design: Tutorial Lectures
Information Flow vs. Resource Access in the Asynchronous Pi-Calculus
ICALP '00 Proceedings of the 27th International Colloquium on Automata, Languages and Programming
Bisimulation and Unwinding for Verifying Possibilistic Security Properties
VMCAI 2003 Proceedings of the 4th International Conference on Verification, Model Checking, and Abstract Interpretation
Secure Information Flow for Concurrent Processes
CONCUR '00 Proceedings of the 11th International Conference on Concurrency Theory
Probabilistic Information Flow in a Process Algebra
CONCUR '01 Proceedings of the 12th International Conference on Concurrency Theory
CONCUR '01 Proceedings of the 12th International Conference on Concurrency Theory
ZB '00 Proceedings of the First International Conference of B and Z Users on Formal Specification and Development in Z and B
ZB '02 Proceedings of the 2nd International Conference of B and Z Users on Formal Specification and Development in Z and B
Critical Systems Validation and Verification with CSP and FDR
FM-Trends 98 Proceedings of the International Workshop on Current Trends in Applied Formal Method: Applied Formal Methods
FM '99 Proceedings of the Wold Congress on Formal Methods in the Development of Computing Systems-Volume I - Volume I
FM '99 Proceedings of the Wold Congress on Formal Methods in the Development of Computing Systems-Volume II
FME '01 Proceedings of the International Symposium of Formal Methods Europe on Formal Methods for Increasing Software Productivity
Comparing Two Information Flow Security Properties
CSFW '96 Proceedings of the 9th IEEE workshop on Computer Security Foundations
Action Systems for Security Specification
CSFW '96 Proceedings of the 9th IEEE workshop on Computer Security Foundations
Intensional specifications of security protocols
CSFW '96 Proceedings of the 9th IEEE workshop on Computer Security Foundations
Process Algebra and Non-interference
CSFW '99 Proceedings of the 12th IEEE workshop on Computer Security Foundations
What is Intransitive Noninterference?
CSFW '99 Proceedings of the 12th IEEE workshop on Computer Security Foundations
Confidentiality-Preserving Refinement
CSFW '01 Proceedings of the 14th IEEE workshop on Computer Security Foundations
A Generic Approach to the Security of Multi-Threaded Programs
CSFW '01 Proceedings of the 14th IEEE workshop on Computer Security Foundations
A unifying approach to the security of distributed and multi-threaded programs
Journal of Computer Security - Special issue on CSFW14
A process-algebraic approach for the analysis of probabilistic noninterference
Journal of Computer Security
The framework of selective interleaving functions and the modular assembly kit
Proceedings of the 2005 ACM workshop on Formal methods in security engineering
Extending noninterference properties to the timed world
Proceedings of the 2006 ACM symposium on Applied computing
Preservation of probabilistic information flow under refinement
Information and Computation
A formal security policy for xenon
Proceedings of the 6th ACM workshop on Formal methods in security engineering
Rule formats for non interference
ESOP'03 Proceedings of the 12th European conference on Programming
Using formal methods for security in the Xenon project
Proceedings of the Sixth Annual Workshop on Cyber Security and Information Intelligence Research
Flexible scheduler-independent security
ESORICS'10 Proceedings of the 15th European conference on Research in computer security
On modelling user observations in the UTP
UTP'10 Proceedings of the Third international conference on Unifying theories of programming
On Using B in the Design of Secure Micro-controllers: An Experience Report
Electronic Notes in Theoretical Computer Science (ENTCS)
Unifying theories in proofpower-z
UTP'06 Proceedings of the First international conference on Unifying Theories of Programming
A formal framework for confidentiality-preserving refinement
ESORICS'06 Proceedings of the 11th European conference on Research in Computer Security
SBMF'11 Proceedings of the 14th Brazilian conference on Formal Methods: foundations and Applications
Shedding light on haunted corners of information security
CSP'04 Proceedings of the 2004 international conference on Communicating Sequential Processes: the First 25 Years
A concurrent language for refinement
IW-FM'01 Proceedings of the 5th Irish conference on Formal Methods
Scheduler-Independent declassification
MPC'12 Proceedings of the 11th international conference on Mathematics of Program Construction
Separation virtual machine monitors
Proceedings of the 28th Annual Computer Security Applications Conference
Hi-index | 0.00 |