Alur, R., Černý, P., Zdancewic, S.: Preserving secrecy under refinement. In: Bugliesi, M., Preneel, B., Sassone, V., Wegener, I. (eds.) ICALP 2006. LNCS, vol. 4052, pp. 107–118. Springer, Heidelberg (2006)
CrossRef
Google Scholar
Badouel, E., Bednarczyk, M., Borzyszkowski, A., Caillaud, B., Darondeau, P.: Concurrent secrets. Discrete Event Dynamic Systems 17, 425–446 (2007)
MathSciNet
CrossRef
MATH
Google Scholar
Bishop, M.: Introduction to computer security. Addison-Wesley Professional, Reading (2004)
Google Scholar
Blanchet, B., Abadi, M., Fournet, C.: Automated Verification of Selected Equivalences for Security Protocols. In: 20th IEEE Symposium on Logic in Computer Science (LICS 2005), Chicago, IL, June 2005, pp. 331–340 (2005)
Google Scholar
Bryans, J.W., Koutny, M., Mazaré, L., Ryan, P.: Opacity generalised to transition systems. International Journal of Information Security 7(6), 421–435 (2008)
CrossRef
Google Scholar
Cassandras, C., Lafortune, S.: Introduction to Discrete Event Systems. Kluwer Academic Publishers, Dordrecht (1999)
CrossRef
MATH
Google Scholar
Constant, C., Jéron, T., Marchand, H., Rusu, V.: Integrating formal verification and conformance testing for reactive systems. IEEE Transactions on Software Engineering 33(8), 558–574 (2007)
CrossRef
Google Scholar
Darmaillacq, V., Fernandez, J.-C., Groz, R., Mounier, L., Richier, J.-L.: Test generation for network security rules. In: Uyar, M.Ü., Duale, A.Y., Fecko, M.A. (eds.) TestCom 2006. LNCS, vol. 3964, pp. 341–356. Springer, Heidelberg (2006)
CrossRef
Google Scholar
Dubreil, J., Darondeau, Ph., Marchand, H.: Opacity enforcing control synthesis. In: Workshop on Discrete Event Systems, WODES 2008, Gothenburg, Sweden (2008)
Google Scholar
Dubreil, J., Darondeau, Ph., Marchand, H.: Supervisory control for opacity. Technical Report 1921, IRISA (February 2009)
Google Scholar
Dubreil, J., Jéron, T., Marchand, H.: Monitoring information flow by diagnosis techniques. In: European Control Conference, ECC (August 2009)
Google Scholar
Giacobazzi, R., Mastroeni, I.: Abstract non-interference: parameterizing non-interference by abstract interpretation. In: POPL 2004: Proceedings of the 31st ACM SIGPLAN-SIGACT symposium on Principles of programming languages, pp. 186–197. ACM, New York (2004)
Google Scholar
Lowe, G.: Towards a completeness result for model checking of security protocols. Journal of Computer Security 7(2-3), 89–146 (1999)
CrossRef
Google Scholar
Schneider, F.B.: Enforceable security policies. ACM Trans. Inf. Syst. Secur. 3(1), 30–50 (2000)
CrossRef
Google Scholar
Tretmans, J.: Testing concurrent systems: A formal approach. In: Baeten, J.C.M., Mauw, S. (eds.) CONCUR 1999. LNCS, vol. 1664, pp. 46–65. Springer, Heidelberg (1999)
CrossRef
Google Scholar