Author:
Braghin Chiara,Cortesi Agostino,Focardi Riccardo
Subject
Computational Theory and Mathematics,Computer Science Applications,Information Systems,Theoretical Computer Science
Reference33 articles.
1. A bisimulation method for cryptographic protocols;Abadi;Nordic Journal of Computing,1998
2. D.E. Bell, L.J. La Padula, Secure Computer Systems: Unified Exposition and Multics Interpretation, ESD-TR-75-306, MITRE MTR-2997, MITRE Corporation, 1976.
3. C. Braghin, Static Analysis of Security Properties in Mobile Ambients, PhD thesis, Università Ca’ Foscari di Venezia, 2005.
4. C. Braghin, A. Cortesi, S. Filippone, R. Focardi, F.L. Luccio, C. Piazza. Banana: a tool for boundary ambients nesting analysis, in: H. Garavel, J. Hatcliff (Eds.), Proc. 9th Int. Conf. Tools and Algorithms for the Construction and Analysis of Systems (TACAS’03), vol. 2619, Lecture Notes in Computer Science, Springer-Verlag, Berlin, 2003, pp. 437–441.
5. Security boundaries in mobile ambients;Braghin;Computer Languages,2002
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Topology aware adaptive security;Proceedings of the 9th International Symposium on Software Engineering for Adaptive and Self-Managing Systems - SEAMS 2014;2014
2. Information Leakage Analysis by Abstract Interpretation;SOFSEM 2011: Theory and Practice of Computer Science;2011
3. Non-repudiation Analysis with LySa;Emerging Challenges for Security, Privacy and Trust;2009