next up previous
Up: Using Non Interference for Previous: Related work

References

FG
R. Focardi and R. Gorrieri.
``The Compositional Security Checker: A Tool for the Verification of Information Flow Security Properties''.
To appear in IEEE Transactions on Software Engineering. A preliminary version can be found in http://www.cs.unibo.it/ focardi/www/ps/Tool.ps.gz.

FG95
R. Focardi and R. Gorrieri.
``A Classification of Security Properties for Process Algebras''.
Journal of Computer Security, 3(1):5-33, 1994/1995.

FG96
R. Focardi and R. Gorrieri.
``Automatic Compositional Verification of Some Security Properties''.
In Proceedings of Second International Workshop on Tools and Algorithms for the Construction and Analysis of Systems (TACAS'96), pages 167-186, Passau (Germany), March 1996. Springer-Verlag, LNCS 1055.

Ghe97
A. Ghelli.
``Analisi di un Protocollo di Autenticazione con il Security Checker''.
Master's thesis, Università degli Studi di Bologna, March 1997.

GM82
J. A. Goguen and J. Meseguer.
``Security Policy and Security Models''.
In Proceedings of the 1982 Symposium on Security and Privacy, pages 11-20. IEEE Computer Society Press, April 1982.

Hoa85
C. A. R. Hoare.
Communicating Sequential Processes.
Prentice-Hall, 1985.

Low96
G. Lowe.
``Breaking and Fixing the Needham-Schroeder Public-key Protocol using FDR''.
In Proceedings of Second International Workshop on Tools and Algorithms for the Construction and Analysis of Systems (TACAS'96), pages 146-166, Passau (Germany), March 1996. Springer-Verlag, LNCS 1055.

Mil89
R. Milner.
Communication and Concurrency.
Prentice-Hall, 1989.

NS78
R. Needham and M. Schroeder.
``Using encryption for authentication in large networks of computers''.
Communications of the ACM, 21(12):993-999, 1978.