A General Theory of Composition for a Class of "Possibilistic" Properties
IEEE Transactions on Software Engineering
Provably secure programming languages for remote evaluation
ACM Computing Surveys (CSUR) - Special issue: position statements on strategic directions in computing research
NSPW '97 Proceedings of the 1997 workshop on New security paradigms
Under-specification, composition and emergent properties
NSPW '97 Proceedings of the 1997 workshop on New security paradigms
An Application of Formal Analysis to Software in a Fault-Tolerant Environment
IEEE Transactions on Computers
ACM Transactions on Information and System Security (TISSEC)
Protecting privacy using the decentralized label model
ACM Transactions on Software Engineering and Methodology (TOSEM)
Policy algebras for access control: the propositional case
CCS '01 Proceedings of the 8th ACM conference on Computer and Communications Security
Policy algebras for access control the predicate case
Proceedings of the 9th ACM conference on Computer and communications security
A notion of non-interference for timed automata
Fundamenta Informaticae
Transforming Processes to Check and Ensure Information Flow Security
AMAST '02 Proceedings of the 9th International Conference on Algebraic Methodology and Software Technology
Mathematical Models of Computer Security
FOSAD '00 Revised versions of lectures given during the IFIP WG 1.7 International School on Foundations of Security Analysis and Design on Foundations of Security Analysis and Design: Tutorial Lectures
Bisimulation and Unwinding for Verifying Possibilistic Security Properties
VMCAI 2003 Proceedings of the 4th International Conference on Verification, Model Checking, and Abstract Interpretation
CONCUR '01 Proceedings of the 12th International Conference on Concurrency Theory
Securing Communication in a Concurrent Language
SAS '02 Proceedings of the 9th International Symposium on Static Analysis
SAS '99 Proceedings of the 6th International Symposium on Static Analysis
A Language-Based Approach to Security
Informatics - 10 Years Back. 10 Years Ahead.
A propositional policy algebra for access control
ACM Transactions on Information and System Security (TISSEC)
How and why feedback composition fails [secure systems]
CSFW '96 Proceedings of the 9th IEEE workshop on Computer Security Foundations
A Logic of Composition for Information Flow Predicates
CSFW '96 Proceedings of the 9th IEEE workshop on Computer Security Foundations
A Genealogy of Non-Interference
CSFW '96 Proceedings of the 9th IEEE workshop on Computer Security Foundations
Process Algebra and Non-interference
CSFW '99 Proceedings of the 12th IEEE workshop on Computer Security Foundations
CSFW '02 Proceedings of the 15th IEEE workshop on Computer Security Foundations
A Simple View of Type-Secure Information Flow in the "-Calculus
CSFW '02 Proceedings of the 15th IEEE workshop on Computer Security Foundations
A Generic Approach to the Security of Multi-Threaded Programs
CSFW '01 Proceedings of the 14th IEEE workshop on Computer Security Foundations
Noninterference Equations for Nondeterministic Systems
CSFW '01 Proceedings of the 14th IEEE workshop on Computer Security Foundations
A unifying approach to the security of distributed and multi-threaded programs
Journal of Computer Security - Special issue on CSFW14
SubDomain: Parsimonious Server Security
LISA '00 Proceedings of the 14th USENIX conference on System administration
Stack-based access control and secure information flow
Journal of Functional Programming
The framework of selective interleaving functions and the modular assembly kit
Proceedings of the 2005 ACM workshop on Formal methods in security engineering
Visual security protocol modeling
NSPW '05 Proceedings of the 2005 workshop on New security paradigms
Distributed intrusion detection in clusters based on non-interference
ACSW Frontiers '06 Proceedings of the 2006 Australasian workshops on Grid computing and e-research - Volume 54
Algorithmic Verification of Noninterference Properties
Electronic Notes in Theoretical Computer Science (ENTCS)
Information flow security in dynamic contexts
Journal of Computer Security
A simulation-based proof technique for dynamic information flow
Proceedings of the 2007 workshop on Programming languages and analysis for security
Preservation of probabilistic information flow under refinement
Information and Computation
A formalism for visual security protocol modeling
Journal of Visual Languages and Computing
ACM Transactions on Information and System Security (TISSEC)
On the Limits of Information Flow Techniques for Malware Analysis and Containment
DIMVA '08 Proceedings of the 5th international conference on Detection of Intrusions and Malware, and Vulnerability Assessment
A formal security policy for xenon
Proceedings of the 6th ACM workshop on Formal methods in security engineering
On the Decidability of Model-Checking Information Flow Properties
ICISS '08 Proceedings of the 4th International Conference on Information Systems Security
Symbolic algorithmic verification of generalized noninterference
WSEAS Transactions on Computers
High level specification of non-interference security policies in partitioned MLS systems
CNIS '07 Proceedings of the Fourth IASTED International Conference on Communication, Network and Information Security
Achieving information flow security through monadic control of effects
Journal of Computer Security - 18th IEEE Computer Security Foundations Symposium (CSF 18)
FM '09 Proceedings of the 2nd World Congress on Formal Methods
An Automata Based Approach for Verifying Information Flow Properties
Electronic Notes in Theoretical Computer Science (ENTCS)
Believing the Integrity of a System
Electronic Notes in Theoretical Computer Science (ENTCS)
Introducing reference flow control for detecting intrusion symptoms at the OS level
RAID'02 Proceedings of the 5th international conference on Recent advances in intrusion detection
Combining different proof techniques for verifying information flow security
LOPSTR'06 Proceedings of the 16th international conference on Logic-based program synthesis and transformation
A proof system for information flow security
LOPSTR'02 Proceedings of the 12th international conference on Logic based program synthesis and transformation
A comparison of semantic models for noninterference
FAST'06 Proceedings of the 4th international conference on Formal aspects in security and trust
Automata-based confidentiality monitoring
ASIAN'06 Proceedings of the 11th Asian computing science conference on Advances in computer science: secure software and related issues
A comparison of semantic models for noninterference
Theoretical Computer Science
On bounding problems of quantitative information flow
ESORICS'10 Proceedings of the 15th European conference on Research in computer security
Semantics of UML models for dynamic behavior: a survey of different approaches
MBEERTS'07 Proceedings of the 2007 International Dagstuhl conference on Model-based engineering of embedded real-time systems
On modelling user observations in the UTP
UTP'10 Proceedings of the Third international conference on Unifying theories of programming
Unifying theories of confidentiality
UTP'10 Proceedings of the Third international conference on Unifying theories of programming
Unifying facets of information integrity
ICISS'10 Proceedings of the 6th international conference on Information systems security
Defining noninterference in the temporal logic of actions
SP'96 Proceedings of the 1996 IEEE conference on Security and privacy
Run-time security evaluation (RTSE) for distributed applications
SP'96 Proceedings of the 1996 IEEE conference on Security and privacy
Model-checking trace-based information flow properties
Journal of Computer Security
Possibilistic information flow control in MAKS and action refinement
ETRICS'06 Proceedings of the 2006 international conference on Emerging Trends in Information and Communication Security
Preserving secrecy under refinement
ICALP'06 Proceedings of the 33rd international conference on Automata, Languages and Programming - Volume Part II
Secure information flow by self-composition
Mathematical Structures in Computer Science - Programming Language Interference and Dependence
A probabilistic property-specific approach to information flow
MMM-ACNS'05 Proceedings of the Third international conference on Mathematical Methods, Models, and Architectures for Computer Network Security
Secure information flow as a safety problem
SAS'05 Proceedings of the 12th international conference on Static Analysis
Timing-sensitive information flow analysis for synchronous systems
ESORICS'06 Proceedings of the 11th European conference on Research in Computer Security
Information flow control to secure dynamic web service composition
SPC'06 Proceedings of the Third international conference on Security in Pervasive Computing
On the composition of compositional reasoning
Proceedings of the 2004 international conference on Architecting Systems with Trustworthy Components
Verifying persistent security properties
Computer Languages, Systems and Structures
A Notion of Non-Interference for Timed Automata
Fundamenta Informaticae - Concurrency Specification and Programming Workshop (CS&P'2001)
Intransitive noninterference in nondeterministic systems
Proceedings of the 2012 ACM conference on Computer and communications security
Information flow in systems with schedulers, Part I: Definitions
Theoretical Computer Science
Proving concurrent noninterference
CPP'12 Proceedings of the Second international conference on Certified Programs and Proofs
Information flow in systems with schedulers, Part II: Refinement
Theoretical Computer Science
Analyzing program dependencies for malware detection
Proceedings of ACM SIGPLAN on Program Protection and Reverse Engineering Workshop 2014
On bounding problems of quantitative information flow
Journal of Computer Security - ESORICS 2010
Hi-index | 0.02 |
We give a formal model of protocol security. Our model allows us to reason about the security of protocols, and considers issues of beliefs of agents, time, and secrecy. We prove a composition theorem which allows us to state sufficient conditions on ...