A comparison of non-interference and non-deducibility using CSP, Proceedings Computer Security Foundations Workshop IV, pp.43-54, 1991. ,
DOI : 10.1109/CSFW.1991.151568
Intransitive non-interference for cryptographic purposes, Proceedings 19th International Conference on Data Engineering (Cat. No.03CH37405), pp.140-152, 2003. ,
DOI : 10.1109/SECPRI.2003.1199333
Intransitive noninterference in nondeterministic systems, Proceedings of the 2012 ACM conference on Computer and communications security, CCS '12, pp.869-880, 2012. ,
DOI : 10.1145/2382196.2382288
Security policies and security models, Proceedings of S&P, pp.11-20, 1982. ,
Unwinding and inference control, IEEE Symposium on Security and Privacy, pp.75-75, 1984. ,
Probabilistic interference, Proceedings of S&P, pp.170-179, 1990. ,
Stackelberg vs. Nash in security games: An extended investigation of interchangeability, equivalence , and uniqueness, Journal of Artif. Intell. Research, vol.41, pp.297-327, 2011. ,
A note on the confinement problem, Communications of the ACM, vol.16, issue.10, pp.613-615, 1973. ,
DOI : 10.1145/362375.362389
Downgrading policies and relaxed noninterference, ACM SIGPLAN Notices, vol.40, issue.1, pp.158-170, 2005. ,
DOI : 10.1145/1047659.1040319
Noninterference and the composability of security properties, Proceedings. 1988 IEEE Symposium on Security and Privacy, pp.177-186, 1988. ,
DOI : 10.1109/SECPRI.1988.8110
A probabilistic approach to information hiding, Programming Methodology, pp.441-460, 2003. ,
DOI : 10.1007/978-0-387-21798-7_20
A calculus of information flow, Proceedings of ESORICS, pp.147-159, 1990. ,
Approximate non-interference, Journal of Computer Security, vol.12, issue.1, pp.37-81, 2004. ,
DOI : 10.3233/JCS-2004-12103
CSP and determinism in security modelling, Proceedings 1995 IEEE Symposium on Security and Privacy, pp.114-127, 1995. ,
DOI : 10.1109/SECPRI.1995.398927
What is intransitive noninterference?, Proceedings of the 12th IEEE Computer Security Foundations Workshop, pp.228-228, 1999. ,
DOI : 10.1109/CSFW.1999.779776
Non-interference through determinism, Proceedings of ESORICS, pp.31-53, 1994. ,
Noninterference, transitivity, and channel-control security policies. SRI International, 1992. ,
Process algebra and non-interference, Journal of Computer Security, vol.9, issue.1, pp.75-103, 2001. ,
The complexity of temporal model checking, Advances in Modal Logics, Proceedings of AiML 2002, 2003. ,
Information flow security, abstraction and composition, IET Information Security, vol.3, issue.1, pp.9-33, 2009. ,
DOI : 10.1049/iet-ifs:20080069
On the Foundations of Quantitative Information Flow, Foundations of Software Science and Computational Structures, pp.288-302, 2009. ,
DOI : 10.1137/060651380
A model of information, Proc. 9th National Computer Security Conference, pp.175-183, 1986. ,
Preventing coercion in e-voting: Be open and commit, Proceedings of the 1st Workshop on Hot issues in Security Principles and Trust (HotSpot), 2013. ,
A comparison of semantic models for noninterference, Theoretical Computer Science, vol.411, issue.47, pp.4123-4147, 2010. ,
DOI : 10.1016/j.tcs.2010.08.013
What, indeed, is intransitive noninterference?, Proceedings of ESORICS, pp.235-250, 2007. ,
Information flow in nondeterministic systems, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy, pp.144-144, 1990. ,
DOI : 10.1109/RISP.1990.63846
The Composability of Non-Interference, Journal of Computer Security, vol.3, issue.4, pp.269-281, 1995. ,
DOI : 10.3233/JCS-1994/1995-3404
Challenges for information-flow security, Proceedings of the 1st International Workshop on the Programming Language Interference and Dependence (PLID04), 2004. ,