Sfoglia per Autore
Mobile Processes with a distributed Environment
1996-01-01 Bodei, Chiara; Degano, Pierpaolo; Priami, Corrado
True Concurrency via Abstract Interpretation
1997-01-01 Bodei, Chiara; Priami, Corrado
Constructing specific SOS semantics for concurrency via abstract interpretation
1998-01-01 Bodei, Chiara; Degano, Pierpaolo; Priami, Corrado
Control Flow Analysis for the pi-calculus
1998-01-01 Bodei, Chiara; Degano, Pierpaolo; Nielson, F; RIIS NIELSON, H.
Some Concurrency Models in a Categorical Framework
1998-01-01 Bodei, Chiara
Static Analysis of Processes for No Read-Up and No Write-Down
1999-01-01 Bodei, Chiara; Degano, Pierpaolo; Nielson, F; RIIS NIELSON, H.
Authentication via Localized Names
1999-01-01 Bodei, Chiara; Degano, Pierpaolo; Focardi, R.; Priami, Corrado
Security Analysis for Mobile Ambients
2000-01-01 Levi, Francesca; Bodei, Chiara
Control Flow Analysis for Mobile Safe Ambients
2000-01-01 Degano, Pierpaolo; Levi, Francesca; Bodei, Chiara
Safe ambients: control flow analysis and security
2000-01-01 Degano, Pierpaolo; Levi, Francesca; Bodei, Chiara
Names of the Pi-Calculus Agents Handled Locally
2001-01-01 Bodei, Chiara; Degano, Pierpaolo; Priami, Corrado
Security Analysis using Flow Logics
2001-01-01 Bodei, Chiara; Degano, Pierpaolo; Nielson, F.; RIIS NIELSON, H.
Static Analysis for the Pi-Calculus with Applications to Security
2001-01-01 Bodei, Chiara; Degano, Pierpaolo; Nielson, F.; RIIS NIELSON, H.
Techniques for Security Checking: Non Interference vs Control Flow Analysis
2001-01-01 Bodei, Chiara; Degano, Pierpaolo; Focardi, R; Gorrieri, R; Martinelli, F.
Static Analysis for Secrecy and Non-interference in Networks of Processes
2001-01-01 Bodei, Chiara; Degano, Pierpaolo; Nielson, F; Nielson, H.
Authentication Primitives for Refining Protocol Specifications
2002-01-01 Bodei, Chiara; Degano, Pierpaolo; Priami, Corrado; Focardi, R.
Flow Logic for Dolev-Yao Secrecy in Cryptographic Processes
2002-01-01 Bodei, Chiara; Degano, Pierpaolo; Nielson, F.; RIIS NIELSON, H.
Primitives for Authentication in Process Algebras
2002-01-01 Bodei, Chiara; Degano, Pierpaolo; Priami, Corrado; Focardi, R.
An Enhanced CFA for Security Policies
2003-01-01 Zannone, N.; Bodei, Chiara; Degano, Pierpaolo; Priami, Corrado
Automatic Validation of Protocol Narration
2003-01-01 Bodei, Chiara; M., Buchholtz; Degano, Pierpaolo; F., Nielson; H., RIIS NIELSON
Titolo | Data di pubblicazione | Autore(i) | File |
---|---|---|---|
Mobile Processes with a distributed Environment | 1-gen-1996 | Bodei, Chiara; Degano, Pierpaolo; Priami, Corrado | |
True Concurrency via Abstract Interpretation | 1-gen-1997 | Bodei, Chiara; Priami, Corrado | |
Constructing specific SOS semantics for concurrency via abstract interpretation | 1-gen-1998 | Bodei, Chiara; Degano, Pierpaolo; Priami, Corrado | |
Control Flow Analysis for the pi-calculus | 1-gen-1998 | Bodei, Chiara; Degano, Pierpaolo; Nielson, F; RIIS NIELSON, H. | |
Some Concurrency Models in a Categorical Framework | 1-gen-1998 | Bodei, Chiara | |
Static Analysis of Processes for No Read-Up and No Write-Down | 1-gen-1999 | Bodei, Chiara; Degano, Pierpaolo; Nielson, F; RIIS NIELSON, H. | |
Authentication via Localized Names | 1-gen-1999 | Bodei, Chiara; Degano, Pierpaolo; Focardi, R.; Priami, Corrado | |
Security Analysis for Mobile Ambients | 1-gen-2000 | Levi, Francesca; Bodei, Chiara | |
Control Flow Analysis for Mobile Safe Ambients | 1-gen-2000 | Degano, Pierpaolo; Levi, Francesca; Bodei, Chiara | |
Safe ambients: control flow analysis and security | 1-gen-2000 | Degano, Pierpaolo; Levi, Francesca; Bodei, Chiara | |
Names of the Pi-Calculus Agents Handled Locally | 1-gen-2001 | Bodei, Chiara; Degano, Pierpaolo; Priami, Corrado | |
Security Analysis using Flow Logics | 1-gen-2001 | Bodei, Chiara; Degano, Pierpaolo; Nielson, F.; RIIS NIELSON, H. | |
Static Analysis for the Pi-Calculus with Applications to Security | 1-gen-2001 | Bodei, Chiara; Degano, Pierpaolo; Nielson, F.; RIIS NIELSON, H. | |
Techniques for Security Checking: Non Interference vs Control Flow Analysis | 1-gen-2001 | Bodei, Chiara; Degano, Pierpaolo; Focardi, R; Gorrieri, R; Martinelli, F. | |
Static Analysis for Secrecy and Non-interference in Networks of Processes | 1-gen-2001 | Bodei, Chiara; Degano, Pierpaolo; Nielson, F; Nielson, H. | |
Authentication Primitives for Refining Protocol Specifications | 1-gen-2002 | Bodei, Chiara; Degano, Pierpaolo; Priami, Corrado; Focardi, R. | |
Flow Logic for Dolev-Yao Secrecy in Cryptographic Processes | 1-gen-2002 | Bodei, Chiara; Degano, Pierpaolo; Nielson, F.; RIIS NIELSON, H. | |
Primitives for Authentication in Process Algebras | 1-gen-2002 | Bodei, Chiara; Degano, Pierpaolo; Priami, Corrado; Focardi, R. | |
An Enhanced CFA for Security Policies | 1-gen-2003 | Zannone, N.; Bodei, Chiara; Degano, Pierpaolo; Priami, Corrado | |
Automatic Validation of Protocol Narration | 1-gen-2003 | Bodei, Chiara; M., Buchholtz; Degano, Pierpaolo; F., Nielson; H., RIIS NIELSON |
Legenda icone
- file ad accesso aperto
- file disponibili sulla rete interna
- file disponibili agli utenti autorizzati
- file disponibili solo agli amministratori
- file sotto embargo
- nessun file disponibile