|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 202 occurrences of 123 keywords
|
|
|
Results
Found 281 publication records. Showing 281 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
71 | Sebastian Hunt, Isabella Mastroeni |
The PER Model of Abstract Non-interference. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAS ![In: Static Analysis, 12th International Symposium, SAS 2005, London, UK, September 7-9, 2005, Proceedings, pp. 171-185, 2005, Springer, 3-540-28584-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
abstract interpretation, Information flow, language-based security, non-interference |
60 | Xiaowei Huang 0001, Li Jiao, Weiming Lu |
What Semantic Equivalences Are Suitable for Non-interference Properties in Computer Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security, 9th International Conference, ICICS 2007, Zhengzhou, China, December 12-15, 2007, Proceedings, pp. 334-349, 2007, Springer, 978-3-540-77047-3. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
rule format, computer security, non-interference, semantic equivalences |
60 | Isabella Mastroeni |
On the Rôle of Abstract Non-interference in Language-Based Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
APLAS ![In: Programming Languages and Systems, Third Asian Symposium, APLAS 2005, Tsukuba, Japan, November 2-5, 2005, Proceedings, pp. 418-433, 2005, Springer, 3-540-29735-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Language-based Security, Non-Interference, Declassification |
49 | Roberto Giacobazzi, Isabella Mastroeni |
Timed Abstract Non-interference. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FORMATS ![In: Formal Modeling and Analysis of Timed Systems, Third International Conference, FORMATS 2005, Uppsala, Sweden, September 26-28, 2005, Proceedings, pp. 289-303, 2005, Springer, 3-540-30946-2. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
security, Abstract interpretation, non-interference, timing channels |
48 | Roberto Giacobazzi, Isabella Mastroeni |
Abstract non-interference: parameterizing non-interference by abstract interpretation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POPL ![In: Proceedings of the 31st ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, POPL 2004, Venice, Italy, January 14-16, 2004, pp. 186-197, 2004, ACM, 1-58113-729-X. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
abstract interpretation, language-based security, non-interference, abstract domains |
44 | Roberto Giacobazzi, Isabella Mastroeni |
Proving Abstract Non-interference. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSL ![In: Computer Science Logic, 18th International Workshop, CSL 2004, 13th Annual Conference of the EACSL, Karpacz, Poland, September 20-24, 2004, Proceedings, pp. 280-294, 2004, Springer, 3-540-23024-6. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
abstract non-interference, verification, Abstract interpretation, language-based security |
42 | Roberto Giacobazzi, Isabella Mastroeni |
Generalized Abstract Non-interference: Abstract Secure Information-Flow Analysis for Automata. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MMM-ACNS ![In: Computer Network Security, Third International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2005, St. Petersburg, Russia, September 25-27, 2005, Proceedings, pp. 221-234, 2005, Springer, 3-540-29113-X. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
36 | Gilles Benattar, Franck Cassez, Didier Lime, Olivier H. Roux |
Synthesis of Non-Interferent Timed Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FORMATS ![In: Formal Modeling and Analysis of Timed Systems, 7th International Conference, FORMATS 2009, Budapest, Hungary, September 14-16, 2009. Proceedings, pp. 28-42, 2009, Springer, 978-3-642-04367-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Synthesis, Non-Interference, Timed Automaton |
35 | Alaaeddine Fellah, John Mullins |
Admissible Interference by Typing for Cryptographic Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security, 7th International Conference, ICICS 2005, Beijing, China, December 10-13, 2005, Proceedings, pp. 123-135, 2005, Springer, 3-540-30934-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Admissible interference, Type systems, Process Algebra, Cryptographic Protocols, Security Properties |
34 | Roberto Giacobazzi, Isabella Mastroeni |
Adjoining Declassification and Attack Models by Abstract Interpretation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESOP ![In: Programming Languages and Systems, 14th European Symposium on Programming, ESOP 2005, Held as Part of the Joint European Conferences on Theory and Practice of Software, ETAPS 2005, Edinburgh, UK, April 4-8, 2005, Proceedings, pp. 295-310, 2005, Springer, 3-540-25435-8. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
abstract non-interference, Abstract interpretation, completeness, language-based security, declassification, adjunction, attack models |
32 | Peter Y. A. Ryan, Steve A. Schneider |
Process Algebra and Non-Interference. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSFW ![In: Proceedings of the 12th IEEE Computer Security Foundations Workshop, CSFW 1999, Mordano, Italy, June 28-30, 1999, pp. 214-227, 1999, IEEE Computer Society, 0-7695-0201-6. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
31 | Mauricio Alba-Castro, María Alpuente, Santiago Escobar 0001 |
Automated Certification of Non-Interference in Rewriting Logic. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FMICS ![In: Formal Methods for Industrial Critical Systems, 13th International Workshop, FMICS 2008, L'Aquila, Italy, September 15-16, 2008, Revised Selected Papers, pp. 182-198, 2008, Springer, 978-3-642-03239-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
31 | V. N. Venkatakrishnan, Wei Xu, Daniel C. DuVarney, R. Sekar 0001 |
Provably Correct Runtime Enforcement of Non-interference Properties. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security, 8th International Conference, ICICS 2006, Raleigh, NC, USA, December 4-7, 2006, Proceedings, pp. 332-351, 2006, Springer, 3-540-49496-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
31 | Nadia Busi, Roberto Gorrieri |
Positive Non-interference in Elementary and Trace Nets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICATPN ![In: Applications and Theory of Petri Nets 2004, 25th International Conference, ICATPN 2004, Bologna, Italy, June 21-25, 2004, Proceedings, pp. 1-16, 2004, Springer, 3-540-22236-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
31 | Nadia Busi, Roberto Gorrieri |
A Survey on Non-interference with Petri Nets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Lectures on Concurrency and Petri Nets ![In: Lectures on Concurrency and Petri Nets, Advances in Petri Nets [This tutorial volume originates from the 4th Advanced Course on Petri Nets, ACPN 2003, held in Eichstätt, Germany in September 2003. In addition to lectures given at ACPN 2003, additional chapters have been commissioned], pp. 328-344, 2003, Springer, 3-540-22261-8. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
31 | Michael Backes 0001, Birgit Pfitzmann |
Computational Probabilistic Non-interference. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2002, 7th European Symposium on Research in Computer Security, Zurich, Switzerland, October 14-16, 2002, Proceedings, pp. 1-23, 2002, Springer, 3-540-44345-2. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
29 | Cédric Fournet, Tamara Rezk |
Cryptographically sound implementations for typed information-flow security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POPL ![In: Proceedings of the 35th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, POPL 2008, San Francisco, California, USA, January 7-12, 2008, pp. 323-335, 2008, ACM, 978-1-59593-689-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
probabilistic programs, cryptography, compilers, integrity, type systems, computational model, confidentiality, non-interference, secure information flow |
28 | Hiroshi Unno 0001, Naoki Kobayashi 0001, Akinori Yonezawa |
Combining type-based analysis and model checking for finding counterexamples against non-interference. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PLAS ![In: Proceedings of the 2006 Workshop on Programming Languages and Analysis for Security, PLAS 2006, Ottawa, Ontario, Canada, June 10, 2006, pp. 17-26, 2006, ACM, 1-59593-374-3. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
model checking, type system, non-interference |
28 | A. W. Roscoe 0001, Jim Woodcock 0001, Lars Wulf |
Non-Interference Through Determinism. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 94, Third European Symposium on Research in Computer Security, Brighton, UK, November 7-9, 1994, Proceedings, pp. 33-53, 1994, Springer, 3-540-58618-0. The full citation details ...](Pics/full.jpeg) |
1994 |
DBLP DOI BibTeX RDF |
Security, Formal methods, Process algebra, Determinism, Automatic verification, Non-interference |
26 | Gilles Barthe, David Pichardie, Tamara Rezk |
A Certified Lightweight Non-interference Java Bytecode Verifier. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESOP ![In: Programming Languages and Systems, 16th European Symposium on Programming, ESOP 2007, Held as Part of the Joint European Conferences on Theory and Practics of Software, ETAPS 2007, Braga, Portugal, March 24 - April 1, 2007, Proceedings, pp. 125-140, 2007, Springer, 978-3-540-71314-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
26 | Damiano Zanardini |
Abstract non-interference in a fragment of Java bytecode. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAC ![In: Proceedings of the 2006 ACM Symposium on Applied Computing (SAC), Dijon, France, April 23-27, 2006, pp. 1822-1826, 2006, ACM, 1-59593-108-2. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
26 | Michael Backes 0001, Birgit Pfitzmann |
Intransitive Non-Interference for Cryptographic Purpose. ![Search on Bibsonomy](Pics/bibsonomy.png) |
S&P ![In: 2003 IEEE Symposium on Security and Privacy (S&P 2003), 11-14 May 2003, Berkeley, CA, USA, pp. 140-, 2003, IEEE Computer Society, 0-7695-1940-7. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
26 | Alessandra Di Pierro, Chris Hankin, Herbert Wiklicky |
Approximate Non-Interference. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSFW ![In: 15th IEEE Computer Security Foundations Workshop (CSFW-15 2002), 24-26 June 2002, Cape Breton, Nova Scotia, Canada, pp. 3-17, 2002, IEEE Computer Society, 0-7695-1689-0. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
26 | Aris Zakinthinos, E. Stewart Lee |
The composability of non-interference [system security]. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSFW ![In: The Eighth IEEE Computer Security Foundations Workshop (CSFW '95), March 13-15, 1995, Kenmare, County Kerry, Ireland, pp. 2-8, 1995, IEEE Computer Society, 0-8186-7033-9. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
McCullough's conjecture, noninterference composability, feedback, security of data, system security |
25 | Heiko Mantel |
Possibilistic Definitions of Security - An Assembly Kit. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSFW ![In: Proceedings of the 13th IEEE Computer Security Foundations Workshop, CSFW '00, Cambridge, England, UK, July 3-5, 2000, pp. 185-199, 2000, IEEE Computer Society, 0-7695-0671-2. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
information flow, security models, non-interference |
24 | Caitlin Sadowski, Stephen N. Freund, Cormac Flanagan |
SingleTrack: A Dynamic Determinism Checker for Multithreaded Programs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESOP ![In: Programming Languages and Systems, 18th European Symposium on Programming, ESOP 2009, Held as Part of the Joint European Conferences on Theory and Practice of Software, ETAPS 2009, York, UK, March 22-29, 2009. Proceedings, pp. 394-409, 2009, Springer, 978-3-642-00589-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
24 | Musard Balliu, Isabella Mastroeni |
A weakest precondition approach to active attacks analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PLAS ![In: Proceedings of the 2009 Workshop on Programming Languages and Analysis for Security, PLAS 2009, Dublin, Ireland, 15-21 June, 2009, pp. 59-71, 2009, ACM, 978-1-60558-645-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
robustness, non-interference, declassification, program semantics, active attackers |
24 | Riccardo Focardi, Roberto Gorrieri, Fabio Martinelli |
Information Flow Analysis in a Discrete-Time Process Algebra. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSFW ![In: Proceedings of the 13th IEEE Computer Security Foundations Workshop, CSFW '00, Cambridge, England, UK, July 3-5, 2000, pp. 170-184, 2000, IEEE Computer Society, 0-7695-0671-2. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
Security, Real-time, Process Algebra, Non interference |
24 | Antonio Durante, Riccardo Focardi, Roberto Gorrieri |
CVS: A Compiler for the Analysis of Cryptographic Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSFW ![In: Proceedings of the 12th IEEE Computer Security Foundations Workshop, CSFW 1999, Mordano, Italy, June 28-30, 1999, pp. 203-212, 1999, IEEE Computer Society, 0-7695-0201-6. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
Authentication, Process Algebras, Automatic Verification, Non-Interference |
23 | Gilles Barthe, Pedro R. D'Argenio, Tamara Rezk |
Secure Information Flow by Self-Composition. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSFW ![In: 17th IEEE Computer Security Foundations Workshop, (CSFW-17 2004), 28-30 June 2004, Pacific Grove, CA, USA, pp. 100-114, 2004, IEEE Computer Society, 0-7695-2169-X. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
22 | Peter Y. A. Ryan |
Mathematical Models of Computer Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FOSAD ![In: Foundations of Security Analysis and Design, Tutorial Lectures [revised versions of lectures given during the IFIP WG 1.7 International School on Foundations of Security Analysis and Design, FOSAD 2000, Bertinoro, Italy, September 2000], pp. 1-62, 2000, Springer, 3-540-42896-8. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
22 | Tobe Toben |
Non-interference Properties for Data-Type Reduction of Communicating Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IFM ![In: Integrated Formal Methods, 6th International Conference, IFM 2007, Oxford, UK, July 2-5, 2007, Proceedings, pp. 619-638, 2007, Springer, 978-3-540-73209-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
20 | Damiano Zanardini |
Higher-Order Abstract Non-interference. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TLCA ![In: Typed Lambda Calculi and Applications, 7th International Conference, TLCA 2005, Nara, Japan, April 21-23, 2005, Proceedings, pp. 417-432, 2005, Springer, 3-540-25593-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
20 | Ricardo H. Medel, Adriana B. Compagnoni, Eduardo Bonelli |
A Typed Assembly Language for Non-interference. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICTCS ![In: Theoretical Computer Science, 9th Italian Conference, ICTCS 2005, Siena, Italy, October 12-14, 2005, Proceedings, pp. 360-374, 2005, Springer, 3-540-29106-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
20 | Gilles Barthe, Tamara Rezk |
Non-interference for a JVM-like language. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TLDI ![In: Proceedings of TLDI'05: 2005 ACM SIGPLAN International Workshop on Types in Languages Design and Implementation, Long Beach, CA, USA, January 10, 2005, pp. 103-112, 2005, ACM, 1-58113-999-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
type systems, confidentiality, low level languages |
20 | Vladimir Klebanov |
A JMM-Faithful Non-interference Calculus for Java. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FIDJI ![In: Scientific Engineering of Distributed Java Applications, 4th InternationalWorkshop, FIDJI 2004, Luxembourg-Kirchberg, Luxembourg, November 24-25, 2004, Revised Selected Papers, pp. 101-111, 2004, Springer, 3-540-25053-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
20 | Chiara Bodei, Pierpaolo Degano, Flemming Nielson, Hanne Riis Nielson |
Static Analysis for Secrecy and Non-interference in Networks of Processes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PaCT ![In: Parallel Computing Technologies, 6th International Conference, PaCT 2001, Novosibirsk, Russia, September 3-7, 2001, Proceedings, pp. 27-41, 2001, Springer, 3-540-42522-5. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
20 | Riccardo Focardi, Roberto Gorrieri, Fabio Martinelli |
Message Authentication through Non Interference. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AMAST ![In: Algebraic Methodology and Software Technology. 8th International Conference, AMAST 2000, Iowa City, Iowa, USA, May 20-27, 2000, Proceedings, pp. 258-272, 2000, Springer, 3-540-67530-2. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
19 | Pi-Shan Hsu, Te-Jeng Chang, Chien-Pen Chuang, Ming-Hsiung Wu |
A Dynamic, Real Time and Non-interference Quantitative Measurement Technique on Diagnosing Instructional Condition for Adaptive E-learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
APSCC ![In: Proceedings of the 3rd IEEE Asia-Pacific Services Computing Conference, APSCC 2008, Yilan, Taiwan, 9-12 December 2008, pp. 1471-1476, 2008, IEEE Computer Society, 978-0-7695-3473-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
19 | Peter Y. A. Ryan |
Shedding Light on Haunted Corners of Information Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
25 Years Communicating Sequential Processes ![In: Communicating Sequential Processes: The First 25 Years, Symposium on the Occasion of 25 Years of CSP, London, UK, July 7-8, 2004, Revised Invited Papers, pp. 264-264, 2004, Springer, 3-540-25813-2. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
18 | Jason Howarth, Irfan Altas, Barney Dalgarno |
Information Flow Control Using the Java Virtual Machine Tool Interface (JVMTI). ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: ARES 2010, Fifth International Conference on Availability, Reliability and Security, 15-18 February 2010, Krakow, Poland, pp. 689-695, 2010, IEEE Computer Society, 978-0-7695-3965-2. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
dynamic flow control, indirect information flow, Java Virtual Machine Tool Interface (JVMTI), Java, Information flow control, non-interference |
18 | Alejandro Russo, Andrei Sabelfeld |
Securing Timeout Instructions in Web Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: Proceedings of the 22nd IEEE Computer Security Foundations Symposium, CSF 2009, Port Jefferson, New York, USA, July 8-10, 2009, pp. 92-106, 2009, IEEE Computer Society, 978-0-7695-3712-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
internal timing covert channel, information-flow, web security, non-interference, timeouts |
18 | Salvador Cavadini |
Secure slices of insecure programs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2008, Tokyo, Japan, March 18-20, 2008, pp. 112-122, 2008, ACM, 978-1-59593-979-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
information flow, program slicing, non-interference, program dependences |
18 | Isabella Mastroeni, Damiano Zanardini |
Data dependencies and program slicing: from syntax to abstract semantics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PEPM ![In: Proceedings of the 2008 ACM SIGPLAN Symposium on Partial Evaluation and Semantics-based Program Manipulation, PEPM 2008, San Francisco, California, USA, January 7-8, 2008, pp. 125-134, 2008, ACM, 978-1-59593-977-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
abstract non-interference, abstract interpretation, program slicing, dependency analysis |
18 | Sebastian Hunt, David Sands 0001 |
On flow-sensitive security types. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POPL ![In: Proceedings of the 33rd ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, POPL 2006, Charleston, South Carolina, USA, January 11-13, 2006, pp. 79-90, 2006, ACM, 1-59593-027-2. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
static analysis, type systems, information flow, non-interference, flow-sensitivity |
18 | Rachid Echahed, Frédéric Prost |
Security policy in a declarative style. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PPDP ![In: Proceedings of the 7th International ACM SIGPLAN Conference on Principles and Practice of Declarative Programming, July 11-13 2005, Lisbon, Portugal, pp. 153-163, 2005, ACM, 1-59593-090-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
confidentiality, non-interference |
18 | Michael Backes 0001, Birgit Pfitzmann |
Computational probabilistic noninterference. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Inf. Sec. ![In: Int. J. Inf. Sec. 3(1), pp. 42-60, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Security, Cryptography, Information flow, Non-interference, Simulatability |
18 | François Pottier, Vincent Simonet |
Information flow inference for ML. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Program. Lang. Syst. ![In: ACM Trans. Program. Lang. Syst. 25(1), pp. 117-158, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
non-interference, Constraint-based analysis |
18 | Andreas Polze, Lui Sha |
Composite Objects: Real-Time Programming with CORBA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROMICRO ![In: 24th EUROMICRO '98 Conference, Engineering Systems and Software for the Next Decade, 25-27 August 1998, Vesteras, Sweden, pp. 20997-, 1998, IEEE Computer Society, 0-8186-8646-4. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
Object-based Real-Time Computing, Interoperability, CORBA, Non-interference, Composite Objects |
18 | Alessandro Aldini, Roberto Gorrieri |
Security Analysis of a Probabilistic Non-repudiation Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PAPM-PROBMIV ![In: Process Algebra and Probabilistic Methods, Performance Modeling and Verification, Second Joint International Workshop PAPM-PROBMIV 2002, Copenhagen, Denmark, July 25-26, 2002, Proceedings, pp. 17-36, 2002, Springer, 3-540-43913-7. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
16 | Yûta Kaneko, Naoki Kobayashi 0001 |
Linear Declassification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESOP ![In: Programming Languages and Systems, 17th European Symposium on Programming, ESOP 2008, Held as Part of the Joint European Conferences on Theory and Practice of Software, ETAPS 2008, Budapest, Hungary, March 29-April 6, 2008. Proceedings, pp. 224-238, 2008, Springer, 978-3-540-78738-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
16 | Serdar Tasiran, Tayfun Elmas |
Rollback Atomicity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RV ![In: Runtime Verification, 7th International Workshop, RV 2007, Vancouver, Canada, March 13, 2007, Revised Selected Papers, pp. 188-201, 2007, Springer, 978-3-540-77394-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
16 | Michael Backes 0001 |
Quantifying Probabilistic Information Flow in Computational Reactive Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2005, 10th European Symposium on Research in Computer Security, Milan, Italy, September 12-14, 2005, Proceedings, pp. 336-354, 2005, Springer, 3-540-28963-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
15 | Florian Kammüller |
Formalizing non-interference for a simple bytecode language in Coq. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Formal Aspects Comput. ![In: Formal Aspects Comput. 20(3), pp. 259-275, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Formal methods for security, Programming language analysis, Interactive theorem proving, Modular specification |
15 | Simone Frau, Roberto Gorrieri, Carlo Ferigato |
Petri Net Security Checker: Structural Non-interference at Work. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Formal Aspects in Security and Trust ![In: Formal Aspects in Security and Trust, 5th International Workshop, FAST 2008, Malaga, Spain, October 9-10, 2008, Revised Selected Papers, pp. 210-225, 2008, Springer. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
15 | Deepak Garg 0001, Frank Pfenning |
Non-Interference in Constructive Authorization Logic. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSFW ![In: 19th IEEE Computer Security Foundations Workshop, (CSFW-19 2006), 5-7 July 2006, Venice, Italy, pp. 283-296, 2006, IEEE Computer Society, 0-7695-2615-2. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
15 | Simone Tini |
Rule Formats for Non Interference. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESOP ![In: Programming Languages and Systems, 12th European Symposium on Programming, ESOP 2003, Held as Part of the Joint European Conferences on Theory and Practice of Software, ETAPS 2003, Warsaw, Poland, April 7-11, 2003, Proceedings, pp. 129-143, 2003, Springer, 3-540-00886-1. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
15 | Michele Bugliesi, Ambra Ceccato, Sabina Rossi |
Context-Sensitive Equivalences for Non-interference Based Protocol Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FCT ![In: Fundamentals of Computation Theory, 14th International Symposium, FCT 2003, Malmö, Sweden, August 12-15, 2003, Proceedings, pp. 364-375, 2003, Springer, 3-540-40543-7. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
13 | P. G. Allen |
A Comparison of non-Interference and Non-Deducibility using CSP. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSFW ![In: 4th IEEE Computer Security Foundations Workshop - CSFW'91, Franconia, New Hampshire, USA, June 18-20, 1991, Proceedings, pp. 43-54, 1991, IEEE Computer Society, 0-8186-2215-6. The full citation details ...](Pics/full.jpeg) |
1991 |
DBLP DOI BibTeX RDF |
|
12 | Radha Jagadeesan |
From Authorization Logics to Types for Authorization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
APLAS ![In: Programming Languages and Systems, 6th Asian Symposium, APLAS 2008, Bangalore, India, December 9-11, 2008. Proceedings, pp. 255, 2008, Springer, 978-3-540-89329-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
12 | François Pottier, Vincent Simonet |
Information flow inference for ML. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POPL ![In: Conference Record of POPL 2002: The 29th SIGPLAN-SIGACT Symposium on Principles of Programming Languages, Portland, OR, USA, January 16-18, 2002, pp. 319-330, 2002, ACM, 1-58113-450-9. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
12 | Heiko Mantel |
Unwinding Possibilistic Security Properties. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2000, 6th European Symposium on Research in Computer Security, Toulouse, France, October 4-6, 2000, Proceedings, pp. 238-254, 2000, Springer, 3-540-41031-7. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
unwinding, refinement, information flow, security models |
11 | Gilles Barthe, Salvador Cavadini, Tamara Rezk |
Tractable Enforcement of Declassification Policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: Proceedings of the 21st IEEE Computer Security Foundations Symposium, CSF 2008, Pittsburgh, Pennsylvania, USA, 23-25 June 2008, pp. 83-97, 2008, IEEE Computer Society, 978-0-7695-3182-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
type systems, declassification, information flow security |
11 | Lennart Beringer, Martin Hofmann 0001 |
Secure information flow and program logics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: 20th IEEE Computer Security Foundations Symposium, CSF 2007, 6-8 July 2007, Venice, Italy, pp. 233-248, 2007, IEEE Computer Society, 0-7695-2819-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
11 | Reiner Hähnle, Jing Pan, Philipp Rümmer, Dennis Walter |
Integration of a Security Type System into a Program Logic. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TGC ![In: Trustworthy Global Computing, Second Symposium, TGC 2006, Lucca, Italy, November 7-9, 2006, Revised Selected Papers, pp. 116-131, 2006, Springer, 978-3-540-75333-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
11 | Marieke Huisman, Pratik Worah, Kim Sunesen |
A Temporal Logic Characterisation of Observational Determinism. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSFW ![In: 19th IEEE Computer Security Foundations Workshop, (CSFW-19 2006), 5-7 July 2006, Venice, Italy, pp. 3, 2006, IEEE Computer Society, 0-7695-2615-2. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
11 | Gurvan Le Guernic, Anindya Banerjee 0001, Thomas P. Jensen, David A. Schmidt |
Automata-Based Confidentiality Monitoring. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIAN ![In: Advances in Computer Science - ASIAN 2006. Secure Software and Related Issues, 11th Asian Computing Science Conference, Tokyo, Japan, December 6-8, 2006, Revised Selected Papers, pp. 75-89, 2006, Springer, 978-3-540-77504-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
11 | Edwin Rodríguez, Matthew B. Dwyer, Cormac Flanagan, John Hatcliff, Gary T. Leavens, Robby |
Extending JML for Modular Specification and Verification of Multi-threaded Programs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ECOOP ![In: ECOOP 2005 - Object-Oriented Programming, 19th European Conference, Glasgow, UK, July 25-29, 2005, Proceedings, pp. 551-576, 2005, Springer, 3-540-27992-X. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
11 | Gilles Barthe, Amitabh Basu, Tamara Rezk |
Security Types Preserving Compilation: (Extended Abstract). ![Search on Bibsonomy](Pics/bibsonomy.png) |
VMCAI ![In: Verification, Model Checking, and Abstract Interpretation, 5th International Conference, VMCAI 2004, Venice, Italy, January 11-13, 2004, Proceedings, pp. 2-15, 2004, Springer, 3-540-20803-8. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
11 | Annalisa Bossi, Carla Piazza, Sabina Rossi |
Unwinding Conditions for Security in Imperative Languages. ![Search on Bibsonomy](Pics/bibsonomy.png) |
LOPSTR ![In: Logic Based Program Synthesis and Transformation, 14th International Symposium, LOPSTR 2004, Verona, Italy, August 26-28, 2004, Revised Selected Papers, pp. 85-100, 2004, Springer, 3-540-26655-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
11 | Cormac Flanagan, Shaz Qadeer |
A type and effect system for atomicity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PLDI ![In: Proceedings of the ACM SIGPLAN 2003 Conference on Programming Language Design and Implementation 2003, San Diego, California, USA, June 9-11, 2003, pp. 338-349, 2003, ACM, 1-58113-662-5. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
multithreading, atomicity, race conditions, static checking |
11 | Libin Wang, Kefei Chen |
A Typed Theory for Access Control and Information Flow Control in Mobile Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, 8th Australasian Conference, ACISP 2003, Wollongong, Australia, July 9-11, 2003, Proceedings, pp. 154-165, 2003, Springer, 3-540-40515-1. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
11 | Riccardo Focardi, Sabina Rossi |
Information Flow Security in Dynamic Contexts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSFW ![In: 15th IEEE Computer Security Foundations Workshop (CSFW-15 2002), 24-26 June 2002, Cape Breton, Nova Scotia, Canada, pp. 307-319, 2002, IEEE Computer Society, 0-7695-1689-0. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
11 | Glen E. Newton |
Proving Properties of Interacting Processes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Acta Informatica ![In: Acta Informatica 4, pp. 117-126, 1974. The full citation details ...](Pics/full.jpeg) |
1974 |
DBLP DOI BibTeX RDF |
|
10 | Bruno C. d. S. Oliveira, Tom Schrijvers, William R. Cook |
EffectiveAdvice: disciplined advice with explicit effects. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AOSD ![In: Proceedings of the 9th International Conference on Aspect-Oriented Software Development, AOSD 2010, Rennes and Saint-Malo, France, March 15-19, 2010, pp. 109-120, 2010, ACM, 978-1-60558-958-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
AOP, interference, monads, parametricity, mixins |
10 | Hrishikesh Venkataraman, Abdurazak Mudesir, Sinan Sinanovic, Harald Haas |
Time Slot Partitioning and Random Data Hopping for TDD Based Multihop Wireless Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VTC Spring ![In: Proceedings of the 65th IEEE Vehicular Technology Conference, VTC Spring 2007, 22-25 April 2007, Dublin, Ireland, pp. 80-84, 2007, IEEE. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
9 | Wenjing Zhong, Jinjing Zhao, Hesuan Hu |
Non-interference assessment in colored net systems via integer linear programming. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Sci. ![In: Inf. Sci. 658, pp. 120027, February 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
9 | Roberto Gorrieri |
Distributed Non-Interference. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2301.08570, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
9 | Massimo Bartoletti, Riccardo Marchesin, Roberto Zunino |
DeFi composability as MEV non-interference. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2309.10781, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
9 | Anthony Spriet, Didier Lime, Olivier H. Roux |
Timed Non-interference Under Partial Observability and Bounded Memory. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FORMATS ![In: Formal Modeling and Analysis of Timed Systems - 21st International Conference, FORMATS 2023, Antwerp, Belgium, September 19-21, 2023, Proceedings, pp. 122-137, 2023, Springer, 978-3-031-42625-4. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
9 | Francesco Basile, Gianmaria De Tommasi |
Assessment of Multilevel Intransitive Non-Interference for Discrete Event Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Control. Syst. Lett. ![In: IEEE Control. Syst. Lett. 6, pp. 349-354, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
9 | Hanzhang Zhi, Haoran Qi, Kai Chen, Xuran Wang, Weizhe Ni, Dong F. Wang, Man Yu |
A Passive Non-Interference Scheme for Synchronously Measuring Multiple Parameters With Single Sensing Unit. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Instrum. Meas. ![In: IEEE Trans. Instrum. Meas. 71, pp. 1-10, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
9 | Guanglong Du, Huijin Wang, Kang Su, Xueqian Wang 0001, Shaohua Teng, Peter X. Liu |
Non-Interference Driving Fatigue Detection System Based on Intelligent Steering Wheel. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Instrum. Meas. ![In: IEEE Trans. Instrum. Meas. 71, pp. 1-11, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
9 | Francesco Basile, Gianmaria De Tommasi |
Assessment of Bisimulation Non-Interference in Discrete Event Systems Modelled With Bounded Petri Nets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Control. Syst. Lett. ![In: IEEE Control. Syst. Lett. 5(4), pp. 1151-1156, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
9 | Jane Hillston, Andrea Marin, Carla Piazza, Sabina Rossi |
Persistent Stochastic Non-Interference. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Fundam. Informaticae ![In: Fundam. Informaticae 181(1), pp. 1-35, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
9 | Andrea Marin, Carla Piazza, Sabina Rossi |
D_PSNI: Delimited persistent stochastic non-interference. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Theor. Comput. Sci. ![In: Theor. Comput. Sci. 884, pp. 116-135, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
9 | Miquel Bofill, Joan Espasa, Mateu Villaret |
Relaxing non-interference requirements in parallel plans. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Log. J. IGPL ![In: Log. J. IGPL 29(1), pp. 45-71, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
9 | Wenjing Zhong, Jinjing Zhao, Hesuan Hu |
A Multilevel Non-interference Vulnerability Analysis Method for Information Leakage Problem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DSC ![In: Sixth IEEE International Conference on Data Science in Cyberspace, DSC 2021, Shenzhen, China, October 9-11, 2021, pp. 367-374, 2021, IEEE, 978-1-6654-1815-7. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
9 | Rafael Silva, João F. L. Alcântara |
ASPIC ? and the Postulates of Non-interference and Crash-Resistance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
BRACIS (1) ![In: Intelligent Systems - 10th Brazilian Conference, BRACIS 2021, Virtual Event, November 29 - December 3, 2021, Proceedings, Part I, pp. 328-343, 2021, Springer, 978-3-030-91701-2. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
9 | Emmanuel Pescosta, Georg Weissenbacher, Florian Zuleger |
Bounded Model Checking of Speculative Non-Interference. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCAD ![In: IEEE/ACM International Conference On Computer Aided Design, ICCAD 2021, Munich, Germany, November 1-4, 2021, pp. 1-9, 2021, IEEE, 978-1-6654-4507-8. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
9 | Dan Frumin, Robbert Krebbers, Lars Birkedal |
Compositional Non-Interference for Fine-Grained Concurrent Programs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SP ![In: 42nd IEEE Symposium on Security and Privacy, SP 2021, San Francisco, CA, USA, 24-27 May 2021, pp. 1416-1433, 2021, IEEE, 978-1-7281-8935-2. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
9 | Gilles Barthe, Sonia Belaïd, François Dupressoir, Pierre-Alain Fouque, Benjamin Grégoire, François-Xavier Standaert, Pierre-Yves Strub |
Improved parallel mask refreshing algorithms: generic solutions with parametrized non-interference and automated optimizations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Cryptogr. Eng. ![In: J. Cryptogr. Eng. 10(1), pp. 17-26, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
9 | Étienne André, Aleksander Kryukov |
Parametric non-interference in timed automata. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2010.09527, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP BibTeX RDF |
|
9 | Gaëtan Cassiers, François-Xavier Standaert |
Trivially and Efficiently Composing Masked Gadgets With Probe Isolating Non-Interference. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Inf. Forensics Secur. ![In: IEEE Trans. Inf. Forensics Secur. 15, pp. 2542-2555, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
9 | Gilles Barthe, Gustavo Betarte, Juan Diego Campo, Carlos Luna 0001, David Pichardie |
System-Level Non-interference of Constant-Time Cryptography. Part II: Verified Static Analysis and Stealth Memory. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Autom. Reason. ![In: J. Autom. Reason. 64(8), pp. 1685-1729, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
9 | Sandip Ghosal, R. K. Shyamasundar |
A Generalized Notion of Non-interference for Flow Security of Sequential and Concurrent Programs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
APSEC ![In: 27th Asia-Pacific Software Engineering Conference, APSEC 2020, Singapore, December 1-4, 2020, pp. 51-60, 2020, IEEE, 978-1-7281-9553-7. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
9 | Étienne André, Aleksander Kryukov |
Parametric non-interference in timed automata. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICECCS ![In: 25th International Conference on Engineering of Complex Computer Systems, ICECCS 2020, Singapore, October 28-31, 2020, pp. 37-42, 2020, IEEE, 978-1-7281-8558-3. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
9 | Dan Frumin, Robbert Krebbers, Lars Birkedal |
Compositional Non-Interference for Fine-Grained Concurrent Programs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1910.00905, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP BibTeX RDF |
|
9 | Gilles Barthe, Gustavo Betarte, Juan Diego Campo, Carlos Luna 0001 |
System-Level Non-interference of Constant-Time Cryptography. Part I: Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Autom. Reason. ![In: J. Autom. Reason. 63(1), pp. 1-51, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
9 | Isabella Mastroeni, Michele Pasqua |
Statically analyzing information flows: an abstract interpretation-based hyperanalysis for non-interference. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAC ![In: Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, SAC 2019, Limassol, Cyprus, April 8-12, 2019, pp. 2215-2223, 2019, ACM, 978-1-4503-5933-7. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #100 of 281 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ >>] |
|