1. Covert channels—here to stay?;Moskowitz,1994
2. Non-interference: who needs it?;Ryan,2001
3. Security analysis of a probabilistic non-repudiation protocol;Aldini,2002
4. A process-algebraic approach for the analysis of probabilistic noninterference;Aldini;J Comput Secur,2004
5. Stravridou V, Dutertre B. From Security to Safety and Back, in: second workshop on computer security, fault tolerance, and software assurance: from needs to solutions, Williamsburg, VA, 1998.