New paradigms for high assurance software
NSPW '92-93 Proceedings on the 1992-1993 workshop on New security paradigms
Untrusted hosts and confidentiality: secure program partitioning
SOSP '01 Proceedings of the eighteenth ACM symposium on Operating systems principles
ACM Transactions on Computer Systems (TOCS)
Probabilistic Information Flow in a Process Algebra
CONCUR '01 Proceedings of the 12th International Conference on Concurrency Theory
Language Issues in Mobile Program Security
Mobile Agents and Security
A process-algebraic approach for the analysis of probabilistic noninterference
Journal of Computer Security
A logical approach to multilevel security of probabilistic systems
Distributed Computing
Hi-index | 0.00 |
A denial-of-service protection base is characterized as aresource monitor closely related to a TCB, supporting awaiting-time policy for benign processes. Resourcemonitor algorithms and policies can be stated in thecontext of a state-transition model of a resourceallocation system.