| Publication | Date of Publication | Type |
|---|
Lightweight information flow Models, Languages, and Tools for Concurrent and Distributed Programming | 2024-02-23 | Paper |
Multi-valued logic for static analysis and model checking Lecture Notes in Computer Science | 2023-08-02 | Paper |
Process-local static analysis of synchronous processes Static Analysis | 2023-05-26 | Paper |
Time dependent policy-based access control | 2023-02-03 | Paper |
Factorization of behavioral integrity | 2022-08-19 | Paper |
Static and dynamic processor allocation for higher-order concurrent languages TAPSOFT '95: Theory and Practice of Software Development | 2022-08-18 | Paper |
Constraints for polymorphic behaviours of concurrent ML Constraints in Computational Logics | 2022-08-16 | Paper |
Benign interaction of security domains | 2022-07-13 | Paper |
Static analysis for proactive security | 2022-02-16 | Paper |
Semantics-directed program analysis: a tool-maker's perspective Static Analysis | 2022-02-16 | Paper |
Formal methods. An appetizer | 2021-11-16 | Paper |
Disjunctive Information Flow for Communicating Processes Trustworthy Global Computing | 2021-04-07 | Paper |
scientific article; zbMATH DE number 7318978 (Why is no real title available?) | 2021-03-10 | Paper |
History-sensitive versus future-sensitive approaches to security in distributed systems | 2021-02-24 | Paper |
Model Checking Exact Cost for Attack Scenarios Lecture Notes in Computer Science | 2020-08-03 | Paper |
Secure guarded commands From Lambda Calculus to Cybersecurity Through Program Analysis | 2020-07-20 | Paper |
Information flow for timed automata Lecture Notes in Computer Science | 2020-02-24 | Paper |
Secure information release in timed automata | 2019-09-16 | Paper |
A parametric abstract domain for lattice-valued regular expressions | 2018-08-27 | Paper |
A monotone framework for CCS Computer Languages, Systems & Structures | 2018-05-16 | Paper |
Systematic realisation of control flow analyses for CML Proceedings of the second ACM SIGPLAN international conference on Functional programming | 2017-08-21 | Paper |
A coordination language for databases | 2017-05-08 | Paper |
Discovering, quantifying, and displaying attacks Logical Methods in Computer Science | 2017-04-11 | Paper |
Content dependent information flow control Journal of Logical and Algebraic Methods in Programming | 2017-02-22 | Paper |
Enforcing availability in failure-aware communicating systems Formal Techniques for Distributed Objects, Components, and Systems | 2016-10-19 | Paper |
Hoare logic for disjunctive information flow Programming Languages with Applications to Biology and Security | 2016-01-08 | Paper |
Modal abstractions of concurrent behavior ACM Transactions on Computational Logic | 2015-09-17 | Paper |
Discretionary Information Flow Control for Interaction-Oriented Specifications Lecture Notes in Computer Science | 2015-09-14 | Paper |
A calculus of quality for robustness against unreliable communication Journal of Logical and Algebraic Methods in Programming | 2015-08-21 | Paper |
Stochastic model checking of the stochastic quality calculus Software, Services, and Systems | 2015-06-22 | Paper |
Shape analysis for mobile ambients Proceedings of the 27th ACM SIGPLAN-SIGACT symposium on Principles of programming languages | 2015-03-17 | Paper |
Flow logic for process calculi ACM Computing Surveys | 2014-08-13 | Paper |
Active evaluation contexts for reaction semantics Electronic Notes in Theoretical Computer Science | 2013-12-13 | Paper |
Heuristics for safety and security constraints Electronic Notes in Theoretical Computer Science | 2013-12-06 | Paper |
Performance evaluation of security protocols specified in LySa | 2013-09-20 | Paper |
XACML 3.0 in answer set programming Logic-Based Program Synthesis and Transformation | 2013-09-13 | Paper |
Safety versus security in the quality calculus Theories of Programming and Formal Methods | 2013-08-16 | Paper |
Lazy mobile intruders Lecture Notes in Computer Science | 2013-08-06 | Paper |
Reachability for finite-state process algebras using Horn clauses International Journal of Foundations of Computer Science | 2013-07-30 | Paper |
Cryptographic analysis in cubic time Electronic Notes in Theoretical Computer Science | 2013-07-24 | Paper |
Bisimulations meet PCTL equivalences for probabilistic automata Logical Methods in Computer Science | 2013-06-24 | Paper |
Efficient CSL model checking using stratification Logical Methods in Computer Science | 2012-08-15 | Paper |
Static analysis of IMC The Journal of Logic and Algebraic Programming | 2012-08-14 | Paper |
\textsf{CaPiTo}: Protocol stacks for services Formal Aspects of Computing | 2011-10-18 | Paper |
Reachability for finite-state process algebras using static analysis Lecture Notes in Computer Science | 2011-10-07 | Paper |
Automata-based CSL model checking Automata, Languages and Programming | 2011-07-07 | Paper |
From flow logic to static type systems for coordination languages Science of Computer Programming | 2010-04-29 | Paper |
Model checking \textit{is} static analysis of modal logic Foundations of Software Science and Computational Structures | 2010-04-27 | Paper |
What is a free name in a process algebra? Information Processing Letters | 2010-03-24 | Paper |
Static analysis of topology-dependent broadcast networks Information and Computation | 2010-02-26 | Paper |
Foundations of Security Analysis and Design II Lecture Notes in Computer Science | 2009-05-14 | Paper |
A Scalable Inclusion Constraint Solver Using Unification Logic-Based Program Synthesis and Transformation | 2009-01-22 | Paper |
Pathway analysis for BioAmbients The Journal of Logic and Algebraic Programming | 2008-11-06 | Paper |
Topology-Dependent Abstractions of Broadcast Networks CONCUR 2007 – Concurrency Theory | 2008-09-18 | Paper |
Modal Abstractions of Concurrent Behaviour Static Analysis | 2008-08-28 | Paper |
Relational Analysis of Correlation Static Analysis | 2008-08-28 | Paper |
Iterative Specialisation of Horn Clauses Programming Languages and Systems | 2008-04-11 | Paper |
Tools and Algorithms for the Construction and Analysis of Systems Lecture Notes in Computer Science | 2007-09-28 | Paper |
Data Flow Analysis for CCS Program Analysis and Compilation, Theory and Practice | 2007-09-24 | Paper |
Types from Control Flow Analysis Program Analysis and Compilation, Theory and Practice | 2007-09-24 | Paper |
Semantics with applications: an appetizer. Undergraduate Topics in Computer Science | 2007-06-07 | Paper |
Static Analysis Lecture Notes in Computer Science | 2005-08-24 | Paper |
scientific article; zbMATH DE number 2161330 (Why is no real title available?) | 2005-04-26 | Paper |
scientific article; zbMATH DE number 2143089 (Why is no real title available?) | 2005-03-08 | Paper |
scientific article; zbMATH DE number 2087550 (Why is no real title available?) | 2004-08-11 | Paper |
scientific article; zbMATH DE number 2012389 (Why is no real title available?) | 2003-12-15 | Paper |
scientific article; zbMATH DE number 1988982 (Why is no real title available?) | 2003-10-20 | Paper |
Abstract interpretation of mobile ambients. Science of Computer Programming | 2003-08-07 | Paper |
scientific article; zbMATH DE number 1953280 (Why is no real title available?) | 2003-07-27 | Paper |
scientific article; zbMATH DE number 1948386 (Why is no real title available?) | 2003-07-13 | Paper |
scientific article; zbMATH DE number 1860683 (Why is no real title available?) | 2003-06-02 | Paper |
Static analysis for the \(\pi\)-calculus with applications to security Information and Computation | 2003-01-14 | Paper |
scientific article; zbMATH DE number 1834562 (Why is no real title available?) | 2002-11-24 | Paper |
Validating firewalls using flow logics Theoretical Computer Science | 2002-07-15 | Paper |
scientific article; zbMATH DE number 1692944 (Why is no real title available?) | 2002-01-21 | Paper |
scientific article; zbMATH DE number 1629945 (Why is no real title available?) | 2001-11-06 | Paper |
Shape analysis for mobile ambients Nordic Journal of Computing | 2001-10-14 | Paper |
scientific article; zbMATH DE number 1512075 (Why is no real title available?) | 2001-09-04 | Paper |
scientific article; zbMATH DE number 1487853 (Why is no real title available?) | 2000-08-10 | Paper |
Using transformations in the implementation of higher-order functions Journal of Functional Programming | 2000-02-09 | Paper |
Strictness and totality analysis Science of Computer Programming | 2000-01-04 | Paper |
scientific article; zbMATH DE number 1324833 (Why is no real title available?) | 1999-08-18 | Paper |
scientific article; zbMATH DE number 1231615 (Why is no real title available?) | 1999-01-06 | Paper |
Behavior analysis for validating communication patterns International Journal on Software Tools for Technology Transfer. STTT | 1998-01-01 | Paper |
Type and behaviour reconstruction for higher-order concurrent programs Journal of Functional Programming | 1997-09-29 | Paper |
From CML to its process algebra Theoretical Computer Science | 1997-02-27 | Paper |
scientific article; zbMATH DE number 935187 (Why is no real title available?) | 1996-10-14 | Paper |
The tensor product in Wadler's analysis of lists Science of Computer Programming | 1994-07-21 | Paper |
Bounded Fixed-Point Iteration Journal Of Logic And Computation | 1993-06-29 | Paper |
scientific article; zbMATH DE number 177790 (Why is no real title available?) | 1993-05-18 | Paper |
scientific article; zbMATH DE number 108368 (Why is no real title available?) | 1993-01-23 | Paper |
Two-Level Functional Languages | 1993-01-23 | Paper |
Functional completeness of the mixed \(\lambda\)-calculus and combinatory logic Theoretical Computer Science | 1990-01-01 | Paper |
Two-level semantics and abstract interpretation Theoretical Computer Science | 1989-01-01 | Paper |
Two-level semantics and code generation Theoretical Computer Science | 1988-01-01 | Paper |
Strictness analysis and denotational abstract interpretation Information and Computation | 1988-01-01 | Paper |
Automatic binding time analysis for a typed \(\lambda\)-calculus Science of Computer Programming | 1988-01-01 | Paper |
scientific article; zbMATH DE number 3942992 (Why is no real title available?) | 1986-01-01 | Paper |
scientific article; zbMATH DE number 3947602 (Why is no real title available?) | 1986-01-01 | Paper |
scientific article; zbMATH DE number 3938527 (Why is no real title available?) | 1986-01-01 | Paper |
scientific article; zbMATH DE number 3938555 (Why is no real title available?) | 1986-01-01 | Paper |
scientific article; zbMATH DE number 3942989 (Why is no real title available?) | 1986-01-01 | Paper |
scientific article; zbMATH DE number 3947598 (Why is no real title available?) | 1986-01-01 | Paper |
Program transformations in a denotational setting ACM Transactions on Programming Languages and Systems | 1985-01-01 | Paper |
scientific article; zbMATH DE number 3817015 (Why is no real title available?) | 1983-01-01 | Paper |
scientific article; zbMATH DE number 3846839 (Why is no real title available?) | 1983-01-01 | Paper |
A denotational framework for data flow analysis Acta Informatica | 1982-01-01 | Paper |