Filtros de búsqueda

Lista de obras de Flemming Nielson

A Calculus for Quality

A Secure Key Establishment Protocol for ZigBee Wireless Sensor Networks

A Stochastic Broadcast Pi-Calculus

A calculus for control flow analysis of security protocols

A calculus of quality for robustness against unreliable communication

A generic approach for security policies composition

article

A monotone framework for CCS

A secure key establishment protocol for zigbee wireless sensor networks

Abstract interpretation of mobile ambients

Atomistic Galois insertions for flow sensitive integrity

Automata-Based CSL Model Checking

Automated Generation of Attack Trees

artículo científico publicado en 2014

Belief Bisimulation for Hidden Markov Models

Bisimulations Meet PCTL Equivalences for Probabilistic Automata

artículo científico publicado en 2013

Broadcast, Denial-of-Service, and Secure Communication

artículo científico publicado en 2013

CaPiTo: protocol stacks for services

Combining Static Analysis and Runtime Checking in Security Aspects for Distributed Tuple Spaces

Content dependent information flow control

artículo científico publicado en 2017

Control Flow Analysis for BioAmbients

Controlling Modelling Artifacts

Cryptographic Analysis in Cubic Time

Denial-of-Service Security Attack in the Continuous-Time World

Discretionary Information Flow Control for Interaction-Oriented Specifications

Disjunctive Information Flow for Communicating Processes

Effect-driven QuickChecking of compilers

Efficient CSL Model Checking Using Stratification

Enforcing Availability in Failure-Aware Communicating Systems

Explicit Versus Symbolic Algorithms for Solving ALFP Constraints

Factorization of Behavioral Integrity

Flow Logic for Process Calculi

Formal Security Analysis of the MaCAN Protocol

From Explicit to Symbolic Types for Communication Protocols in CCS

From Flow Logic to Static Type Systems for Coordination Languages

From Flow Logic to static type systems for coordination languages

Future-dependent Flow Policies with Prophetic Variables

Heuristics for Safety and Security Constraints

Hoare Logic for Disjunctive Information Flow

How to Trust the Re-use of Data

article by Erisa Karafili et al published 2015 in Lecture Notes in Computer Science

ICT-powered Health Care Processes

article

Information Flow for Timed Automata

Isabelle-verified correctness of Datalog programs for program analysis

artículo científico publicado en 2024

Iterated process analysis over lattice-valued regular expressions

Key Update Assistant for resource-constrained networks

scholarly article published July 2012

Klaim-DB: A Modeling Language for Distributed Database Applications

LBTool: A stochastic toolkit for leave-based key updates

Layered fixed point logic

Lazy Mobile Intruders

artículo científico publicado en 2013

Modal abstractions of concurrent behavior

Model Checking Exact Cost for Attack Scenarios

artículo científico publicado en 2017

Model Checking Is Static Analysis of Modal Logic

Model Checking Multivariate State Rewards

article

Model Checking as Static Analysis: Revisited

Modelling and Analysis of Smart Grid: A Stochastic Model Checking Case Study

Modelling and Verifying Communication Failure of Hybrid Systems in HCSP

Optimizing key updates in sensor networks

Pareto Efficient Solutions of Attack-Defence Trees

Pathway analysis for BioAmbients

Performance Evaluation of Security Protocols Specified in LySa

Predictive access control for distributed computation

artículo científico publicado en 2013

Probabilistic Analysis of the Quality Calculus

artículo científico publicado en 2013

Probabilistic Aspects: Checking Security in an Imperfect World

Process-Local Static Analysis of Synchronous Processes

Quantitative Verification and Synthesis of Attack-Defence Scenarios

Quantitative modelling and analysis of a Chinese smart grid: a stochastic model checking case study

article

REACHABILITY FOR FINITE-STATE PROCESS ALGEBRAS USING HORN CLAUSES

artículo científico publicado en 2013

Reachability for Finite-State Process Algebras Using Static Analysis

scholarly article by Nataliya Skrypnyuk & Flemming Nielson published 2011 in Lecture Notes in Computer Science

Recursive Advice for Coordination

Relational Analysis for Delivery of Services

Safety versus Security in the Quality Calculus

artículo científico publicado en 2013

Sandboxing in myKlaim

Secure Information Release in Timed Automata

Set-Pi: Set Membership p-Calculus

Shape analysis for mobile ambients

Static Analysis for the π-Calculus with Applications to Security

Static Analysis of IMC

Static Validation of Licence Conformance Policies

Static analysis of topology-dependent broadcast networks

Stochastic Model Checking of the Stochastic Quality Calculus

Strictness and totality analysis

The Guided System Development Framework: Modeling and Verifying Communication Systems

article

The Logic of XACML

The Stochastic Quality Calculus

The logic of XACML

The tensor product in Wadler's analysis of lists

Towards Static Analysis of Policy-Based Self-adaptive Computing Systems

Uniform Protection for Multi-exposed Targets

What is a free name in a process algebra?

scholarly article by Flemming Nielson et al published August 2007 in Information Processing Letters

XACML 3.0 in Answer Set Programming

artículo científico publicado en 2013