Volume 99,
6 August 2004
Proceedings of the MEFISTO Project 2003,
Formal Methods for Security and Time
- Mario Bravetti, Roberto Gorrieri:
Preface: Proceedings of the MEFISTO Project 2003, Formal Methods for Security and Time.
1-2
- Radu Mardare, Corrado Priami:
A Logical Approach to Security in the Context of Ambient Calculus.
3-29
- Mario Bravetti, Roberto Gorrieri, Roberto Lucchi, Gianluigi Zavattaro:
Combining Partitions in SecSpaces.
31-47
- Massimo Bartoletti, Pierpaolo Degano, Gian Luigi Ferrari:
Program Transformations under Dynamic Security Policies.
49-86
- Roberto Zunino:
Control Flow Analysis for the Applied Pi-calculus.
87-110
- Stefania Gnesi, Gabriele Lenzini, Fabio Martinelli:
Applying Generalized Non Deducibility on Compositions (GNDC) Approach in Dependability.
111-126
- Annalisa Bossi, Riccardo Focardi, Damiano Macedonio, Carla Piazza, Sabina Rossi:
Unwinding in Information Flow Security.
127-154
- Alessandro Aldini, Alessandra Di Pierro:
A Quantitative Approach to Noninterference for Probabilistic Systems.
155-182
- Angelo Troina, Alessandro Aldini, Roberto Gorrieri:
Approximating Imperfect Cryptography in a Formal Model.
183-203
- Margherita Napoli, Mimmo Parente, Adriano Peron:
Specification and Verification of Protocols With Time Constraints.
205-227
- Salvatore La Torre, Aniello Murano, Mimmo Parente:
Model-checking the Secure Release of a Time-locked Secret over a Network.
229-243
- Ruggero Lanotte, Andrea Maggiolo-Schettini, Simone Tini, Angelo Troina, Enrico Tronci:
Automatic Analysis of the NRL Pump.
245-266
- Riccardo Focardi, Matteo Maffei:
The rho-spi Calculus at Work: Authentication Case Studies.
267-293
- Chiara Braghin, Carla Piazza:
Checking Integrity via CoPS and Banana: the E-Commerce Case Study .
295-317
- Chiara Braghin, Agostino Cortesi, Riccardo Focardi, Flaminia L. Luccio, Carla Piazza:
Behind BANANA: Design and Implementation of a Tool for Nesting Analysis of Mobile Ambients.
319-337
- Carlo Blundo, Stelvio Cimato, Roberto De Prisco, Anna Lisa Ferrara:
Modeling A Certified Email Protocol using I/O Automata.
339-359
Copyright © Mon Mar 15 04:00:56 2010
by Michael Ley (ley@uni-trier.de)