Author of the publication

A Case Study in Information Flow Refinement for Low Level Systems.

, , , , and . The Logic of Software. A Tasting Menu of Formal Methods, volume 13360 of Lecture Notes in Computer Science, page 54-79. Springer, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Formal Verification of Secure User Mode Device Execution with DMA., and . Haifa Verification Conference, volume 8855 of Lecture Notes in Computer Science, page 236-251. Springer, (2014)CTL* and ECTL* as Fragments of the Modal µ-Calculus.. CAAP, volume 581 of Lecture Notes in Computer Science, page 145-164. Springer, (1992)On the Decidability of Process Equivalences for the pi-calculus.. AMAST, volume 936 of Lecture Notes in Computer Science, page 169-183. Springer, (1995)Gossiping for threshold detection., , and . Integrated Network Management, page 259-266. IEEE, (2009)Hoare-Style Logic for Unstructured Programs., , , and . SEFM, volume 12310 of Lecture Notes in Computer Science, page 193-213. Springer, (2020)On the secure implementation of security protocols., and . Sci. Comput. Program., 50 (1-3): 73-99 (2004)On Compositional Information Flow Aware Refinement., , , and . CSF, page 1-16. IEEE, (2021)Efficient and fully abstract routing of futures in object network overlays., and . AGERE!@SPLASH, page 49-60. ACM, (2013)Decidability and proof systems for language-based noninterference relations.. POPL, page 67-78. ACM, (2006)Decentralized real-time monitoring of network-wide aggregates., , , and . LADIS, page 7:1-7:6. ACM, (2008)