ConSpec ??? A Formal Language for Policy Specification, Electronic Notes in Theoretical Computer Science, vol.197, issue.1, pp.45-58, 2008. ,
DOI : 10.1016/j.entcs.2007.10.013
Verification of Temporal Properties of Concurrent Systems, DAIMI Report Series, vol.22, issue.445, 1993. ,
DOI : 10.7146/dpb.v22i445.6762
Partial model checking (extended abstract), Proceedings of 10th Annual IEEE Symposium on Logic in Computer Science, pp.398-407, 1995. ,
Games for synthesis of controllers with partial observation, Theoretical Computer Science, vol.303, issue.1, pp.7-34, 2003. ,
DOI : 10.1016/S0304-3975(02)00442-5
Balanced timed regular expressions1 1Partially supported by the European community project IST-2001-35304 AMETIST, Electronic Notes in Theoretical Computer Science, vol.68, issue.5, pp.16-33, 2002. ,
DOI : 10.1016/S1571-0661(04)80518-8
Distributing Finite Automata Through Petri Net Synthesis, Formal Aspects of Computing, vol.13, issue.6, pp.447-470, 2002. ,
DOI : 10.1007/s001650200022
Enforcing Secure Service Composition, 18th IEEE Computer Security Foundations Workshop (CSFW'05), pp.211-223, 2005. ,
DOI : 10.1109/CSFW.2005.17
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.115.3257
Checking Risky Events Is Enough for Local Policies, Lecture Notes in Computer Science, vol.3701, pp.97-112, 2005. ,
DOI : 10.1007/11560586_9
Compositional Analysis for Verification of Parameterized Systems, Ninth International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS), pp.315-330, 2003. ,
DOI : 10.1007/3-540-36577-X_23
More enforceable security policies, Foundations of Computer Security: proceedings of the FLoC'02 workshop on Foundations of Computer Security, pp.95-104, 2002. ,
Edit automata: Enforcement mechanisms for run-time security policies, International Journal of Information Security, vol.4, issue.12, pp.2-16, 2005. ,
Modal logics and mu-calculi: an introduction. Handbook of Process Algebra, 2001. ,
Model checking and fault tolerance, AMAST '97: Proceedings of the 6th International Conference on Algebraic Methodology and Software Technology, pp.45-59, 1997. ,
DOI : 10.1007/BFb0000462
On the relationships among four timed process algebras, Fundam. Inform, vol.38, issue.4, pp.377-395, 1999. ,
Abstract interpretation: a unified lattice model for staticanalysis of programs by construction or approximation offixpoints, Conference Record of the Fourth Annual ACM SIGPLAN- SIGACT Symposium on Principles of Programming Languages, pp.238-252, 1977. ,
Safety Interfaces for Component-Based Systems, Lecture Notes in Computer Science, vol.3688, pp.246-260, 2005. ,
DOI : 10.1007/11563228_19
A Classification of Security Properties for Process Algebras1, Journal of Computer Security, vol.3, issue.1, pp.5-33, 1994. ,
DOI : 10.3233/JCS-1994/1995-3103
Information flow security in dynamic contexts, Journal of Computer Security, vol.14, issue.1, pp.65-110, 2006. ,
DOI : 10.3233/JCS-2006-14103
Real-time information flow analysis, IEEE Journal on Selected Areas in Communications, vol.21, issue.1, pp.20-35, 2003. ,
DOI : 10.1109/JSAC.2002.806122
Automated analysis of timed security: a case study on web privacy, International Journal of Information Security, vol.29, issue.3-4, pp.3-4, 2004. ,
DOI : 10.1145/300307.300311
Synthesizing Monitors for Safety Properties, TACAS '02: Proceedings of the 8th International Conference on Tools and Algorithms for the Construction and Analysis of Systems, pp.342-356, 2002. ,
DOI : 10.1007/3-540-46002-0_24
Algebraic Theory of Processes, 1988. ,
A temporal process algebra, FORTE '90: Proceedings of the IFIP TC6/WG6.1 Third International Conference on Formal Description Techniques for Distributed Systems and Communication Protocols, pp.33-48, 1991. ,
Communicating Sequential Processes, 1985. ,
CCS expressions, finite state processes, and three problems of equivalence, Information and Computation, vol.86, issue.1, pp.43-68, 1990. ,
DOI : 10.1016/0890-5401(90)90025-D
Results on the Propositional ??-Calculus, DAIMI Report Series, vol.11, issue.146, pp.333-354, 1983. ,
DOI : 10.7146/dpb.v11i146.7420
Open Systems in Reactive Environments: Control and Synthesis, Lecture Notes in Computer Science, vol.1877, pp.92-107, 2000. ,
DOI : 10.1007/3-540-44618-4_9
??-Calculus Synthesis, Proc. 25th International Symposium on Mathematical Foundations of Computer Science, pp.497-507, 2000. ,
DOI : 10.1007/3-540-44612-5_45
The Objective Caml system release 3.09, 2004. ,
On the synthesis of discrete controllers for timed systems (extended abstract) Lecture notes in, Computer Science, vol.900, pp.229-242, 1995. ,
Formal Methods for the Analysis of Open Systems with Applications to Security Properties, 1998. ,
Partial model checking and theorem proving for ensuring security properties, Proceedings. 11th IEEE Computer Security Foundations Workshop (Cat. No.98TB100238), 1998. ,
DOI : 10.1109/CSFW.1998.683154
Towards automatic synthesis of systems without information leaks, Proceedings of Workshop in Issues in Theory of Security (WITS), 2000. ,
Module checking through partial model checking, 2002. ,
Analysis of security protocols as open systems, Theoretical Computer Science, vol.290, issue.1, pp.1057-1106, 2003. ,
DOI : 10.1016/S0304-3975(02)00596-0
Through Modeling to Synthesis of Security Automata, Electronic Notes in Theoretical Computer Science, vol.179, pp.31-46, 2007. ,
DOI : 10.1016/j.entcs.2006.08.029
A Tool for the Synthesis of Controller Programs, Formal Aspects in Security and Trust, pp.112-126, 2006. ,
DOI : 10.1007/978-3-540-75227-1_8
Automated Synthesis of Enforcing Mechanisms for Security Properties in a Timed Setting, Electronic Notes in Theoretical Computer Science, vol.186, pp.101-120, 2007. ,
DOI : 10.1016/j.entcs.2007.03.025
Synthesis of Secure Systems, 2008. ,
On the Construction of Submodule Specifications and Communication Protocols, ACM Transactions on Programming Languages and Systems, vol.5, issue.1, pp.1-25, 1983. ,
DOI : 10.1145/357195.357196
Operational and algebraic semantics of concurrent processes Handbook of Theoretical Computer Science, volume B: Formal Models and Semantics, chapter 19, pp.1201-1242 ,
Concurrency and automata on infinite sequences, Proceedings 5th GI Conference, pp.167-183, 1981. ,
DOI : 10.1007/BFb0017309
The control of non-deterministic systems: a logical approach, Proc. 16th IFAC Word Congress, 2005. ,
Maximally permissive controllers in all contexts, Workshop on Discrete Event Systems, 2004. ,
You can always compute maximally permissive controllers under partial observation when they exist, Proc. 2005 American Control Conference, 2005. ,
URL : https://hal.archives-ouvertes.fr/inria-00556003
Towards automatic synthesis of security protocols, Logic-Based Program Synthesis Workshop, AAAI Spring Symposium, 2002. ,
Enforceable security policies, ACM Transactions on Information and System Security, vol.3, issue.1, pp.30-50, 2000. ,
DOI : 10.1145/353323.353382
An automata theoretic procedure for the propositional µ-calculus. Information and Computation, pp.249-264, 1989. ,
Extending process languages with time, AMAST '97: Proceedings of the 6th International Conference on Algebraic Methodology and Software Technology, 1997. ,
DOI : 10.1007/BFb0000494
A Complete Deductive System for the mu-Calculus, BRICS Report Series, vol.2, issue.6, 1993. ,
DOI : 10.7146/brics.v2i6.19508
Synthesizing processes and schedulers from temporal specifications, Lecture Notes in Computer Science, vol.531, pp.272-281, 1990. ,
DOI : 10.1007/BFb0023741