Author of the publication

Composing and decomposing systems under security properties.

, and . CSFW, page 9-15. IEEE Computer Society, (1995)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

CSP and determinism in security modelling.. S&P, page 114-127. IEEE Computer Society, (1995)Understanding Concurrent Systems.. Texts in Computer Science Springer, (2010)Short-Output Universal Hash Functions and Their Use in Fast and Secure Data Authentication., and . FSE, volume 7549 of Lecture Notes in Computer Science, page 326-345. Springer, (2012)Local Search in Model Checking., , and . ATVA, volume 5799 of Lecture Notes in Computer Science, page 22-38. Springer, (2009)Programs as Executable Predicates., and . FGCS, page 220-228. OHMSHA Ltd. Tokyo and North-Holland, (1984)Analysing TMFS: a Study of Nondeterminism in Real-Time Concurrency., and . Concurrency: Theory, Language, And Architecture, volume 491 of Lecture Notes in Computer Science, page 36-63. Springer, (1989)An Improved Failures Model for Communicating Processes., and . Seminar on Concurrency, volume 197 of Lecture Notes in Computer Science, page 281-305. Springer, (1984)The Laws of Occam Programming., and . Theor. Comput. Sci., (1988)Guardian: Symbolic Validation of Orderliness in SGX Enclaves., , and . CCSW, page 111-123. ACM, (2021)Committable: A Decentralised and Trustless Open-Source Protocol., , , and . ICBC, page 1-2. IEEE, (2022)