|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 25 occurrences of 18 keywords
|
|
|
Results
Found 14 publication records. Showing 14 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
61 | Jeremy W. Bryans, Maciej Koutny, Laurent Mazaré, Peter Y. A. Ryan |
Opacity Generalised to Transition Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Formal Aspects in Security and Trust ![In: Formal Aspects in Security and Trust, Third International Workshop, FAST 2005, Newcastle upon Tyne, UK, July 18-19, 2005, Revised Selected Papers, pp. 81-95, 2005, Springer, 3-540-32628-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
non-deducibility, non-inference, observable behaviour, Petri nets, anonymity, labelled transition systems, opacity |
42 | Riccardo Focardi |
Comparing Two Information Flow Security Properties. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSFW ![In: Ninth IEEE Computer Security Foundations Workshop, March 10 - 12, 1996, Dromquinna Manor, Kenmare, County Kerry, Ireland, pp. 116-122, 1996, IEEE Computer Society, 0-8186-7522-5. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
nondeducibility, security checker, software tool, automatic verification, noninterference, multilevel security |
38 | Jeremy W. Bryans, Maciej Koutny, Laurent Mazaré, Peter Y. A. Ryan |
Opacity generalised to transition systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Inf. Sec. ![In: Int. J. Inf. Sec. 7(6), pp. 421-435, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Non-deducibility, Observable behaviour, Petri nets, Anonymity, Abstract interpretation, Labelled transition systems, Opacity |
38 | Jeremy W. Bryans, Maciej Koutny, Peter Y. A. Ryan |
Modelling Dynamic Opacity Using Petri Nets with Silent Actions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Formal Aspects in Security and Trust ![In: Formal Aspects in Security and Trust: Second IFIP TC1 WG1.7 Workshop on Formal Aspects in Security and Trust (FAST), an event of the 18th IFIP World Computer Congress, August 22-27, 2004, Toulouse, France, pp. 159-172, 2004, Springer, 0-387-24050-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
non-deducibility, observable behaviour, silent actions, Petri nets, anonymity, opacity |
34 | P. G. Allen |
A Comparison of non-Interference and Non-Deducibility using CSP. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSFW ![In: 4th IEEE Computer Security Foundations Workshop - CSFW'91, Franconia, New Hampshire, USA, June 18-20, 1991, Proceedings, pp. 43-54, 1991, IEEE Computer Society, 0-8186-2215-6. The full citation details ...](Pics/full.jpeg) |
1991 |
DBLP DOI BibTeX RDF |
|
31 | Francesco Ciraulo |
A constructive semantics for non-deducibility. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Math. Log. Q. ![In: Math. Log. Q. 54(1), pp. 35-48, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
31 | Stefania Gnesi, Gabriele Lenzini, Fabio Martinelli |
Applying Generalized Non Deducibility on Compositions (GNDC) Approach in Dependability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MEFISTO ![In: Formal Methods for Security and Time: Proceedings of the MEFISTO Project 2003, MEFISTO 2003, Pisa, Italy, November 3-5, 2003, pp. 111-126, 2003, Elsevier. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
31 | Andrzej Mostowski |
Proofs of Non-Deducibility in Intuitionistic Functional Calculus. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Symb. Log. ![In: J. Symb. Log. 13(4), pp. 204-207, 1948. The full citation details ...](Pics/full.jpeg) |
1948 |
DBLP DOI BibTeX RDF |
|
22 | Han Tang, Bruce M. McMillin |
Security of Information Flow in the Electric Power Grid. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Critical Infrastructure Protection ![In: Critical Infrastructure Protection, Post-Proceedings of the First Annual IFIP Working Group 11.10 International Conference on Critical Infrastructure Protection, Dartmouth College, Hanover, New Hampshire, USA, March 19-21, 2007, pp. 43-56, 2007, Springer, 978-0-387-75461-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
information flow, confidentiality, power grid, Cyber-physical systems |
22 | Carla Piazza, Enrico Pivato, Sabina Rossi |
CoPS - Checker of Persistent Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TACAS ![In: Tools and Algorithms for the Construction and Analysis of Systems, 10th International Conference, TACAS 2004, Held as Part of the Joint European Conferences on Theory and Practice of Software, ETAPS 2004, Barcelona, Spain, March 29 - April 2, 2004, Proceedings, pp. 144-152, 2004, Springer, 3-540-21299-X. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
22 | Frédéric Cuppens, Gilles Trouessin |
Information Flow Controls vs Interference Controls: An Integrated Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 94, Third European Symposium on Research in Computer Security, Brighton, UK, November 7-9, 1994, Proceedings, pp. 447-468, 1994, Springer, 3-540-58618-0. The full citation details ...](Pics/full.jpeg) |
1994 |
DBLP DOI BibTeX RDF |
Modal logic, Security model, Database security, Information flow control, Inference control |
20 | Ravi Akella, Bruce M. McMillin |
Model-Checking BNDC Properties in Cyber-Physical Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COMPSAC (1) ![In: Proceedings of the 33rd Annual IEEE International Computer Software and Applications Conference, COMPSAC 2009, Seattle, Washington, USA, July 20-24, 2009. Volume 1, pp. 660-663, 2009, IEEE Computer Society, 978-0-7695-3726-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
20 | Riccardo Focardi, Roberto Gorrieri, Fabio Martinelli |
Classification of Security Properties - Part II: Network Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FOSAD ![In: Foundations of Security Analysis and Design II, FOSAD 2001/2002 Tutorial Lectures, pp. 139-185, 2002, Springer, 3-540-20955-7. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
20 | Riccardo Focardi, Roberto Gorrieri, Fabio Martinelli |
Non Interference for the Analysis of Cryptographic Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICALP ![In: Automata, Languages and Programming, 27th International Colloquium, ICALP 2000, Geneva, Switzerland, July 9-15, 2000, Proceedings, pp. 354-372, 2000, Springer, 3-540-67715-1. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #14 of 14 (100 per page; Change: )
|
|