Up: Using Non Interference for
Previous: Related work
- FG
-
R. Focardi and R. Gorrieri.
``The Compositional Security Checker: A Tool for the Verification of
Information Flow Security Properties''.
To appear in IEEE Transactions on Software Engineering. A
preliminary version can be found in
http://www.cs.unibo.it/ focardi/www/ps/Tool.ps.gz.
- FG95
-
R. Focardi and R. Gorrieri.
``A Classification of Security Properties for Process Algebras''.
Journal of Computer Security, 3(1):5-33, 1994/1995.
- FG96
-
R. Focardi and R. Gorrieri.
``Automatic Compositional Verification of Some Security
Properties''.
In Proceedings of Second International Workshop on Tools and
Algorithms for the Construction and Analysis of Systems (TACAS'96), pages
167-186, Passau (Germany), March 1996. Springer-Verlag, LNCS 1055.
- Ghe97
-
A. Ghelli.
``Analisi di un Protocollo di Autenticazione con il Security
Checker''.
Master's thesis, Università degli Studi di Bologna, March 1997.
- GM82
-
J. A. Goguen and J. Meseguer.
``Security Policy and Security Models''.
In Proceedings of the 1982 Symposium on Security and Privacy,
pages 11-20. IEEE Computer Society Press, April 1982.
- Hoa85
-
C. A. R. Hoare.
Communicating Sequential Processes.
Prentice-Hall, 1985.
- Low96
-
G. Lowe.
``Breaking and Fixing the Needham-Schroeder Public-key Protocol
using FDR''.
In Proceedings of Second International Workshop on Tools and
Algorithms for the Construction and Analysis of Systems (TACAS'96), pages
146-166, Passau (Germany), March 1996. Springer-Verlag, LNCS 1055.
- Mil89
-
R. Milner.
Communication and Concurrency.
Prentice-Hall, 1989.
- NS78
-
R. Needham and M. Schroeder.
``Using encryption for authentication in large networks of
computers''.
Communications of the ACM, 21(12):993-999, 1978.