Automated Verification of Selected Equivalences for Security Protocols, 20th Annual IEEE Symposium on Logic in Computer Science (LICS' 05), pp.331-340, 2005. ,
DOI : 10.1109/LICS.2005.8
Towards a completeness result for model checking of security protocols, Journal of Computer Security, vol.7, issue.2-3, 1999. ,
Test Generation for Network Security Rules, TestCom 2006, ser. LNCS, 2006. ,
DOI : 10.1007/11754008_22
Opacity generalised to transition systems, International Journal of Information Security, 2008. ,
Preserving Secrecy Under Refinement, Proceedings of the 33rd International Colloquium on Automata, Languages and Programming, pp.107-118, 2006. ,
DOI : 10.1007/11787006_10
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.107.322
Opacity generalised to transition systems, Revised Selected Papers of the 3rd International Workshop on Formal Aspects in Security and Trust (FAST'05), ser. LNCS, pp.81-95, 2006. ,
Supervision Patterns in Discrete Event Systems Diagnosis, 2006 8th International Workshop on Discrete Event Systems, 2006. ,
DOI : 10.1109/WODES.2006.1678440
Concurrent secrets, 8th Workshop on Discrete Event Systems, WODES'06, 2006. ,
DOI : 10.1109/wodes.2006.1678407
URL : https://hal.archives-ouvertes.fr/inria-00070249
Monitoring information flow by diagnosis techniques, IRISA, Tech. Rep, 1901. ,
URL : https://hal.archives-ouvertes.fr/inria-00312747
Diagnosability of discrete-event systems, IEEE Transactions on Automatic Control, vol.40, issue.9, 1995. ,
DOI : 10.1109/9.412626
Predictability of Sequence Patterns in Discrete Event Systems, IFAC World Congress, 2008. ,
DOI : 10.3182/20080706-5-KR-1001.00091
Enforceable security policies, ACM Transactions on Information and System Security, vol.3, issue.1, pp.30-50, 2000. ,
DOI : 10.1145/353323.353382
Edit automata: enforcement mechanisms for run-time security policies, International Journal of Information Security, vol.3, issue.1-2, pp.2-16, 2005. ,
DOI : 10.1007/s10207-004-0046-8