Author:
Focardi Riccardo,Gorrieri Roberto
Publisher
Springer Berlin Heidelberg
Reference64 articles.
1. M. Abadi. “Secrecy by Typing in Security Protocols”. Journal of ACM, 46(5):749–786, 1999. 331
2. M. Abadi and A. D. Gordon. A calculus for cryptographic protocols: The spi calculus. Information and Computation, 148(1):1–70, 1999. 331, 392
3. A. Aldini. “Probabilistic Information Flow in a Process Algebra”. To appear in proceedings of CONCUR’01, 2001. 391
4. P. G. Allen. “A Comparison of Non-Interference and Non-Deducibility using CSP”. In Proceedings of the Fourth IEEE Computer Security Foundations Workshop, pages 43–54, Franconia, New Hampshire, June 1991. 368
5. D. E. Bell and L. J. La Padula. “Secure Computer Systems: Unified Exposition and Multics Interpretation”. ESD-TR-75-306, MITRE MTR-2997, March 1976.332.
Cited by
79 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献