Security invariants in discrete transition systems
DOI10.1007/S00165-012-0256-1zbMATH Open1259.68127OpenAlexW1989004114MaRDI QIDQ1941889FDOQ1941889
Authors: Thai Son Hoang
Publication date: 22 March 2013
Published in: Formal Aspects of Computing (Search for Journal in Brave)
Full work available at URL: http://doc.rero.ch/record/317549/files/165_2012_Article_256.pdf
Recommendations
Mathematical aspects of software engineering (specification, verification, metrics, requirements, etc.) (68N30) Specification and verification (program logics, model checking, etc.) (68Q60) Logic in computer science (03B70) Semantics in the theory of computing (68Q55)
Cites Work
- Title not available (Why is that?)
- Automatic verification of multi-agent systems by model checking via ordered binary decision diagrams
- Title not available (Why is that?)
- Modeling in Event B. System and software engineering.
- The B-Book
- The dining cryptographers problem: Unconditional sender and recipient untraceability
- The Shadow Knows: Refinement of Ignorance in Sequential Programs
- The shadow knows: refinement and security in sequential programs
- Abstractions of non-interference security: probabilistic versus possibilistic
- Two Applications of Epistemic Logic in Computer Security
- Title not available (Why is that?)
Cited In (3)
Uses Software
This page was built for publication: Security invariants in discrete transition systems
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q1941889)