Author of the publication

Unwinding Conditions for Security in Imperative Languages.

, , and . LOPSTR, volume 3573 of Lecture Notes in Computer Science, page 85-100. Springer, (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Proof System for Information Flow Security., , , and . LOPSTR, volume 2664 of Lecture Notes in Computer Science, page 199-218. Springer, (2002)Bisimulation and Unwinding for Verifying Possibilistic Security Properties., , , and . VMCAI, volume 2575 of Lecture Notes in Computer Science, page 223-237. Springer, (2003)Specialising Logic Programs with Respect to Call?Post Specifications., and . LOPSTR, volume 1559 of Lecture Notes in Computer Science, page 159-178. Springer, (1998)A Matlab Toolkit for the Analysis of Two-Level Processor Sharing Queues., , and . QEST, volume 12289 of Lecture Notes in Computer Science, page 144-147. Springer, (2020)Automated Verification of Prolog Programs., , , and . J. Log. Program., 39 (1-3): 3-42 (1999)On Discrete Time Reversibility modulo State Renaming and its Applications., and . VALUETOOLS, ICST, (2014)DOI:10.4108/icst.valuetools.2014.258200 reused by journals/sas/RossiM15.Declarative Semantics of Input Consuming Logic Programs., , , and . Program Development in Computational Logic, volume 3049 of Lecture Notes in Computer Science, Springer, (2004)Proportional Lumpability., , and . FORMATS, volume 11750 of Lecture Notes in Computer Science, page 265-281. Springer, (2019)Verifying persistent security properties., , , and . Comput. Lang. Syst. Struct., 30 (3-4): 231-258 (2004)On Modular Termination Proofs of General Logic Programs, , , and . CoRR, (2000)