Author:
Bossi Annalisa,Focardi Riccardo,Piazza Carla,Rossi Sabina
Publisher
Springer Berlin Heidelberg
Reference28 articles.
1. M. Abadi. Secrecy by Typing in Security Protocols. Journal of the ACM, 46(5):749–786, 1999.
2. C. Bodei, P. Degano, F. Nielson, and H. Nielson. Static analysis for the pi-calculus with applications to security. Information and Computation, 168(1):68–92, 2001.
3. Lect Notes Comput Sci;A. Bossi,2002
4. Lect Notes Comput Sci;A. Bouali,1992
5. Lect Notes Comput Sci;G. Boudol,2001
Cited by
10 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. D_PSNI: Delimited persistent stochastic non-interference;Theoretical Computer Science;2021-09
2. Persistent Stochastic Non-Interference;Fundamenta Informaticae;2021-06-30
3. Information Flow-Based Security Construction for Compositional Interface Automata;Communications in Computer and Information Science;2020
4. Delimited Persistent Stochastic Non-Interference;Proceedings of the 12th EAI International Conference on Performance Evaluation Methodologies and Tools;2019-03-12
5. A Process Algebra for (Delimited) Persistent Stochastic Non-Interference;Quantitative Evaluation of Systems;2019