Validating firewalls using flow logics
From MaRDI portal
Recommendations
Cites work
- scientific article; zbMATH DE number 1629945 (Why is no real title available?)
- scientific article; zbMATH DE number 1692944 (Why is no real title available?)
- scientific article; zbMATH DE number 1324833 (Why is no real title available?)
- scientific article; zbMATH DE number 1487853 (Why is no real title available?)
- A calculus of mobile processes. II
- Anytime, anywhere: modal logics for mobile ambients
- Linear-time algorithms for testing the satisfiability of propositional horn formulae
- On the security of public key protocols
- Shape analysis for mobile ambients
- Static analysis for the \(\pi\)-calculus with applications to security
Cited in
(14)- MODELLING AND ANALYSIS OF PKI-BASED SYSTEMS USING PROCESS CALCULI
- Hybrid logical analyses of the ambient calculus
- A typed encoding of boxed into safe ambients
- Abstract interpretation based verification of temporal properties for BioAmbients
- From flow logic to static type systems for coordination languages
- Flow-sensitive type systems and the ambient calculus
- A control flow analysis for Beta-binders with and without static compartments
- Dynamic management of capabilities in a network aware coordination language
- Firewall policy verification and troubleshooting
- A static analysis for beta-binders
- Verified iptables firewall analysis and verification
- A monotone framework for CCS
- A Formal Analysis of Complex Type Flaw Attacks on Security Protocols
- Approximating probabilistic behaviors of biological systems using abstract interpretation
This page was built for publication: Validating firewalls using flow logics
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q1603656)