%% This BibTeX bibliography file was created using BibDesk. %% http://bibdesk.sourceforge.net/ %% Created for Catuscia Palamidessi at 2010-05-23 18:07:01 +0200 %% Saved with string encoding Unicode (UTF-8) @inproceedings{Hamadou:10:SSP, Author = {Sardaouna Hamadou and Vladimiro Sassone and Catuscia Palamidessi}, Booktitle = {Proc. of the IEEE Symposium on Security and Privacy }, Date-Added = {2010-05-23 17:52:57 +0200}, Date-Modified = {2010-05-23 18:03:01 +0200}, Note = {To appear}, Publisher = {IEEE}, Title = {Reconciling Belief and Vulnerability in Information Flow}, Year = {2010}} @inproceedings{Giro:09:SBMF, Author = {Sergio Giro}, Bibdate = {2009-11-06}, Bibsource = {DBLP, http://dblp.uni-trier.de/db/conf/sbmf/sbmf2009.html#Giro09}, Booktitle = {Proc. of SBMF}, Date-Added = {2010-05-17 05:49:43 +0200}, Date-Modified = {2010-05-17 05:51:16 +0200}, Isbn = {978-3-642-10451-0}, Pages = {220--235}, Publisher = {Springer}, Series = {LNCS}, Title = {Undecidability Results for Distributed Probabilistic Systems}, Volume = {5902}, Year = {2009}, Bdsk-Url-1 = {http://dx.doi.org/10.1007/978-3-642-10452-7}} @inproceedings{Giro:09:CONCUR, Author = {Sergio Giro and Pedro R. D'Argenio and Luis Mar{\'\i}a Ferrer Fioriti}, Bibdate = {2009-09-04}, Bibsource = {DBLP, http://dblp.uni-trier.de/db/conf/concur/concur2009.html#GiroDF09}, Booktitle = {Proc. of CONCUR}, Date-Added = {2010-05-17 05:47:29 +0200}, Date-Modified = {2010-05-17 05:48:43 +0200}, Isbn = {978-3-642-04080-1}, Pages = {338--353}, Publisher = {Springer}, Series = {LNCS}, Title = {Partial Order Reduction for Probabilistic Systems: {A} Revision for Distributed Schedulers}, Volume = {5710}, Year = {2009}, Bdsk-Url-1 = {http://dx.doi.org/10.1007/978-3-642-04081-8}} @inproceedings{Giro:07:FORMATS, Author = {Sergio Giro and Pedro R. D'Argenio}, Bibsource = {DBLP, http://dblp.uni-trier.de}, Booktitle = {FORMATS}, Date-Added = {2010-05-17 05:45:22 +0200}, Date-Modified = {2010-05-17 05:45:22 +0200}, Ee = {http://dx.doi.org/10.1007/978-3-540-75454-1_14}, Pages = {179-194}, Publisher = {Springer}, Series = {{LNCS}}, Title = {Quantitative Model Checking Revisited: Neither Decidable Nor Approximable}, Volume = {4763}, Year = {2007}} @article{Dubreil:09:TAC, Author = {Dubreil, J. and Darondeau, P. and Marchand, H.}, Date-Added = {2010-05-16 15:56:21 +0200}, Date-Modified = {2010-05-16 17:16:28 +0200}, Doi = {10.1109/TAC.2010.2042008}, Issn = {0018-9286}, Journal = {IEEE Transactions on Automatic Control}, Number = {5}, Pages = {1089 -1100}, Title = {Supervisory Control for Opacity}, Volume = {55}, Year = {2010}, Bdsk-Url-1 = {http://dx.doi.org/10.1109/TAC.2010.2042008}} @inproceedings{Clarkson:08:CSF, Author = {Michael R. Clarkson and Fred B. Schneider}, Booktitle = {CSF}, Date-Added = {2010-05-16 15:55:57 +0200}, Date-Modified = {2010-05-17 07:14:45 +0200}, Doi = {http://doi.ieeecomputersociety.org/10.1109/CSF.2008.7}, Isbn = {978-0-7695-3182-3}, Pages = {51-65}, Publisher = {IEEE}, Title = {Hyperproperties}, Year = {2008}, Bdsk-Url-1 = {http://doi.ieeecomputersociety.org/10.1109/CSF.2008.7}} @inproceedings{Alur:06:ICALP, Author = {Rajeev Alur and Steve Zdancewic}, Booktitle = {Proc. of ICALP}, Date-Added = {2010-05-16 15:55:31 +0200}, Date-Modified = {2010-05-16 17:25:56 +0200}, Number = {4052}, Pages = {107--118}, Publisher = {Springer-Verlag}, Series = {{LNCS}}, Title = {Preserving secrecy under refinement}, Year = {2006}} @inproceedings{Jacob:89:SSP, Author = {Jacob, Jeremy}, Booktitle = {S\&P}, Date-Added = {2010-05-16 15:54:41 +0200}, Date-Modified = {2010-05-16 15:54:41 +0200}, Pages = {242-247}, Publisher = {IEEE}, Title = {On the derivation of secure components}, Year = {1989}} @inproceedings{Jacob:88:SSP, Author = {Jacob, Jeremy}, Booktitle = {S\&P}, Date-Added = {2010-05-16 15:53:16 +0200}, Date-Modified = {2010-05-16 15:53:16 +0200}, Pages = {14--23}, Publisher = {IEEE}, Title = {Security specifications}, Year = {1988}} @article{Morgan:09:SCP, Author = {Morgan, Carroll}, Date-Added = {2010-05-16 15:51:48 +0200}, Date-Modified = {2010-05-16 17:28:15 +0200}, Doi = {http://dx.doi.org/10.1016/j.scico.2007.09.003}, Issn = {0167-6423}, Journal = {Science of Computer Programming}, Number = {8}, Pages = {629--653}, Publisher = {Elsevier}, Title = {The Shadow Knows: Refinement and security in sequential programs}, Volume = {74}, Year = {2009}, Bdsk-Url-1 = {http://dx.doi.org/10.1016/j.scico.2007.09.003}} @article{Back:92:TCS, Author = {Back, R. J. R. and von Wright, J.}, Date-Added = {2010-05-16 15:50:46 +0200}, Date-Modified = {2010-05-16 17:27:24 +0200}, Doi = {http://dx.doi.org/10.1016/0304-3975(92)90309-4}, Issn = {0304-3975}, Journal = {TCS}, Number = {2}, Pages = {365--383}, Publisher = {Elsevier}, Title = {Combining angels, demons and miracles in program specifications}, Volume = {100}, Year = {1992}, Bdsk-Url-1 = {http://dx.doi.org/10.1016/0304-3975(92)90309-4}} @article{Martin:2007:SCP, Author = {Martin, C. E. and Curtis, S. A. and Rewitzky, I.}, Date-Added = {2010-05-16 15:50:16 +0200}, Date-Modified = {2010-05-16 17:27:51 +0200}, Doi = {http://dx.doi.org/10.1016/j.scico.2006.01.007}, Issn = {0167-6423}, Journal = {Science of Computer Programming}, Number = {2}, Pages = {140--158}, Publisher = {Elsevier}, Title = {Modelling angelic and demonic nondeterminism with multirelations}, Volume = {65}, Year = {2007}, Bdsk-Url-1 = {http://dx.doi.org/10.1016/j.scico.2006.01.007}} @inproceedings{Stajano:99:IH, Author = {Frank Stajano and Ross J. Anderson}, Booktitle = {Information Hiding}, Date-Added = {2010-05-06 01:30:56 +0200}, Date-Modified = {2010-05-06 01:30:56 +0200}, Pages = {434-447}, Title = {The Cocaine Auction Protocol: On the Power of Anonymous Broadcast}, Year = {1999}} @book{Poundstone:92:Doubleday, Author = {William Poundstone}, Date-Added = {2010-05-06 01:23:51 +0200}, Date-Modified = {2010-05-06 01:25:34 +0200}, Publisher = {Doubleday NY}, Title = {Prisoners Dilemma}, Year = {1992}} @article{Delaune:09:JCS, Author = {St{\'e}phanie Delaune and Steve Kremer and Mark Ryan}, Bibsource = {DBLP, http://dblp.uni-trier.de}, Date-Added = {2010-05-04 06:49:38 +0200}, Date-Modified = {2010-05-04 06:49:56 +0200}, Ee = {http://dx.doi.org/10.3233/JCS-2009-0340}, Journal = {Journal of Computer Security}, Number = {4}, Pages = {435-487}, Title = {Verifying privacy-type properties of electronic voting protocols}, Volume = {17}, Year = {2009}} @article{Shannon:48:Bell, Abstract = {General theory of communication developed based on theoretical work of NYQUIST and HARTLEY and extended to include such factors as effect of noise in channel and savings possible due to statistical structure of original message and due to nature of final destination of information. Case where signals of messages or both are continuously variable.}, Author = {Claude E. Shannon}, Biburl = {http://www.bibsonomy.org/bibtex/275602c87df729b098112c653ad795c60/jrennstich}, Date-Added = {2010-05-02 23:24:37 +0200}, Date-Modified = {2010-05-02 23:25:00 +0200}, Interhash = {754130207906fcec16a53d330eeff348}, Intrahash = {75602c87df729b098112c653ad795c60}, Journal = {Bell System Technical Journal}, Keywords = {information knowledge theory}, Pages = {379--423, 625-56}, Title = {A Mathematical Theory of Communication}, Volume = 27, Year = 1948, Bdsk-File-1 = {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}, Bdsk-Url-1 = {http://cm.bell-labs.com/cm/ms/what/shannonday/paper.html}} @inproceedings{Renyi:61:Berkeley, Author = {Alfr\'ed R\'enyi}, Booktitle = {Proc. of the 4th Berkeley Symposium on Mathematics, Statistics, and Probability}, Date-Added = {2010-05-02 21:46:48 +0200}, Date-Modified = {2010-05-02 21:47:09 +0200}, Pages = {547--561}, Title = {{On Measures of Entropy and Information}}, Year = {1961}} @article{Csiszar:95:TIT, Author = {Imre Csisz{\'a}r}, Bibsource = {DBLP, http://dblp.uni-trier.de}, Date-Added = {2010-05-02 21:37:52 +0200}, Date-Modified = {2010-05-03 04:33:33 +0200}, Journal = {Transactions on Information Theory}, Number = {1}, Pages = {26-34}, Publisher = {IEEE}, Title = {{Generalized cutoff rates and R{\'e}nyi's information measures}}, Volume = {41}, Year = {1995}} @inproceedings{Kopf:07:CCS, Author = {Boris K{\"o}pf and David A. Basin}, Bibdate = {2008-02-22}, Bibsource = {DBLP, http://dblp.uni-trier.de/db/conf/ccs/ccs2007.html#KopfB07}, Booktitle = {Proc. of CCS}, Date-Added = {2010-05-02 10:32:00 +0200}, Date-Modified = {2010-05-02 10:34:43 +0200}, Doi = {http://doi.acm.org/10.1145/1315245.1315282}, Isbn = {978-1-59593-703-2}, Pages = {286--296}, Publisher = {ACM}, Title = {An information-theoretic model for adaptive side-channel attacks}, Year = {2007}, Bdsk-Url-1 = {http://doi.acm.org/10.1145/1315245.1315282}} @techreport{Alvim:10:TRa, Author = {M\'ario S. Alvim and Miguel E. Andr\'es and Catuscia Palamidessi}, Date-Added = {2010-05-01 18:44:07 +0200}, Date-Modified = {2010-05-02 11:14:05 +0200}, Note = {Submitted for publication.}, Title = {{Information Flow in Interactive Systems}}, Url = {http://hal.archives-ouvertes.fr/inria-00479672/en/}, Year = {2010}, Bdsk-Url-1 = {http://hal.inria.fr/inria-00445212/en/}, Bdsk-Url-2 = {http://hal.archives-ouvertes.fr/inria-00479672/en/}} @inproceedings{Alvim:10:TRb, Author = {M\'ario S. Alvim and Miguel E. Andr\'es and Catuscia Palamidessi and Peter van Rossum}, Booktitle = {Proc. of IFIP TCS}, Date-Added = {2010-05-01 18:22:25 +0200}, Date-Modified = {2010-05-04 07:11:16 +0200}, Note = {Submitted for publication}, Title = {{Safe Equivalences for Security Properties}}, Url = {http://hal.archives-ouvertes.fr/inria-00479674/en/}, Volume = {To appear}, Year = {2010}, Bdsk-Url-1 = {http://hal.inria.fr/inria-00479674/en/}, Bdsk-Url-2 = {http://hal.archives-ouvertes.fr/inria-00479674/en/}} @phdthesis{Cachin:97:PhDThesis, Author = {Christian Cachin}, Date-Added = {2010-05-01 10:04:52 +0200}, Date-Modified = {2010-05-01 10:05:22 +0200}, Note = {Reprint as vol.~1 of {\em ETH Series in Information Security and Cryptography}, {ISBN} 3-89649-185-7, {H}artung-{G}orre {V}erlag, {K}onstanz, 1997}, School = {{ETH} Zurich}, Title = {Entropy Measures and Unconditional Security in Cryptography}, Year = 1997} @inproceedings{Pliam:00:INDOCRYPT, Author = {Pliam}, Booktitle = {Proc. of INDOCRYPT}, Date-Added = {2010-05-01 09:28:07 +0200}, Date-Modified = {2010-05-01 09:30:31 +0200}, Number = {1977}, Pages = {67--79}, Publisher = {Springer-Verlag}, Series = {LNCS}, Title = {On the Incomparability of Entropy and Marginal Guesswork in Brute-Force Attacks}, Year = {2000}} @inproceedings{Massey:94:IT, Author = {Massey}, Booktitle = {Proceedings of the IEEE International Symposium on Information Theory}, Date-Added = {2010-05-01 09:06:29 +0200}, Date-Modified = {2010-05-23 18:05:21 +0200}, Pages = {204}, Publisher = {IEEE}, Title = {Guessing and Entropy}, Year = {1994}} @misc{Andres:10:TechRep, Author = {Miguel E. Andr\'es and Catuscia Palamidessi and Peter van Rossum and Ana Sokolova}, Date-Added = {2010-02-17 03:16:53 +0100}, Date-Modified = {2010-05-17 07:25:18 +0200}, Note = {\url{www.cs.ru.nl/M.Andres/downloads/SAuN.pdf}}, Title = {Information Hiding in Probabilistic Concurrent Systems}, Url = {http://www.cs.ru.nl/M.Andres/downloads/SAuN.pdf}, Bdsk-Url-1 = {http://www.cs.ru.nl/M.Andres/downloads/SAuN.pdf}} @article{Tatikonda:09:TIT, Author = {Sekhar Tatikonda and Sanjoy K. Mitter}, Doi = {10.1109/TIT.2008.2008147}, Journal = {IEEE Transactions on Information Theory}, Number = {1}, Pages = {323-349}, Title = {The Capacity of Channels With Feedback}, Volume = {55}, Year = {2009}, Bdsk-Url-1 = {http://dx.doi.org/10.1109/TIT.2008.2008147}} @article{Kantorovich:42:DAN, Author = {Leonid Kantorovich}, Date-Added = {2010-01-18 09:22:43 +0100}, Date-Modified = {2010-01-18 09:24:05 +0100}, Journal = {Doklady Akademii Nauk}, Note = {Translated in {\it Management Science}, 5(1):1--4, 1958}, Number = {1}, Pages = {1--4}, Title = {On the transfer of masses (in {R}ussian)}, Volume = {5}, Year = {1942}} @article{Hutchinson:81:IUMJ, Author = {J. E. Hutchinson}, Date-Added = {2010-01-18 09:13:51 +0100}, Date-Modified = {2010-01-18 09:21:37 +0100}, Journal = {Indiana University Mathematics Journal}, Pages = {713--747}, Title = {Fractals and self-similarity}, Volume = {30}, Year = {1981}} @inproceedings{Chatzikokolakis:09:FOSSACS, Author = {Konstantinon Chatzikokolakis and Gethin Norman and David Parker}, Booktitle = {Proc. of FOSSACS}, Date-Added = {2010-01-18 09:10:52 +0100}, Date-Modified = {2010-01-18 09:10:52 +0100}, Doi = {10.1007/978-3-642-00596-1}, Pages = {318-332}, Publisher = {Springer}, Series = {LNCS}, Title = {Bisimulation for demonic schedulers}, Volume = {5504}, Year = {2009}, Bdsk-Url-1 = {http://dx.doi.org/10.1007/978-3-642-00596-1}} @inproceedings{vanBreugel:01:ICALP, Author = {Franck van Breugel and James Worrell}, Bibdate = {2002-01-03}, Bibsource = {DBLP, http://dblp.uni-trier.de/db/conf/icalp/icalp2001.html#BreugelW01}, Booktitle = {Proc. of ICALP}, Date-Added = {2010-01-18 07:37:05 +0100}, Date-Modified = {2010-01-18 08:01:53 +0100}, Isbn = {3-540-42287-0}, Pages = {421--432}, Publisher = {Springer}, Series = {LNCS}, Title = {Towards Quantitative Verification of Probabilistic Transition Systems}, Volume = {2076}, Year = {2001}, Bdsk-Url-1 = {http://link.springer.de/link/service/series/0558/bibs/2076/20760421.htm}} @inproceedings{Laneve:09:QAPL, Author = {Cosimo Laneve and Sylvain Pradalier and Gianluigi Zavattaro}, Booktitle = {Proc. of QAPL}, Date-Added = {2010-01-16 06:22:01 +0100}, Date-Modified = {2010-01-16 06:22:01 +0100}, Number = {3}, Pages = {167-185}, Publisher = {Elsevier}, Series = {ENTCS}, Title = {From Biochemistry to Stochastic Processes}, Volume = {253}, Year = {2009}} @book{Carbone:09:BOOK, Bibsource = {DBLP, http://dblp.uni-trier.de}, Date-Added = {2010-01-09 03:07:50 +0100}, Date-Modified = {2010-01-09 03:17:49 +0100}, Doi = {10.1016/j.tcs.2009.06.007}, Ee = {http://dx.doi.org/10.1016/j.tcs.2009.06.007}, Journal = {TCS}, Number = {41}, Pages = {4001-4005}, Publisher = {Elsevier}, Title = {Foreword: Festschrift for Mogens Nielsen's 60th birthday}, Volume = {410}, Year = {2009}, Bdsk-Url-1 = {http://dx.doi.org/10.1016/j.tcs.2009.06.007}} @incollection{Longo:10:BOOK, Author = {Giuseppe Longo and Catuscia Palamidessi and Thierry Paul}, Booktitle = {Randomnes: 5 questions}, Date-Added = {2010-01-08 18:38:01 +0100}, Date-Modified = {2010-01-11 12:35:52 +0100}, Publisher = {Automatic Press / VIP}, Title = {Randomnes: five questions and some challenges}, Year = {2010}, Bdsk-Url-1 = {http://hal.archives-ouvertes.fr/hal-00445553/en/}} @inproceedings{Hamadou:10:FAST, Author = {Sardaouna Hamadou and Catuscia Palamidessi and Vladimiro Sassone and Ehab ElSalamouny}, Booktitle = {Proc. of the 6th Int. Workshop on Formal Aspects in Security and Trust}, Date-Added = {2010-01-08 05:49:54 +0100}, Date-Modified = {2010-01-09 01:59:14 +0100}, Note = {To appear}, Publisher = {Springer}, Series = {LNCS}, Title = {Probable innocence in the presence of independent knowledge}, Year = {2010}, Bdsk-Url-1 = {http://hal.archives-ouvertes.fr/inria-00424853/en/}} @inproceedings{Honda:98:ESOP, Author = {Kohei Honda and Vasco Thudichum Vasconcelos and Makoto Kubo}, Bibsource = {DBLP, http://dblp.uni-trier.de}, Booktitle = {Proc. of the 7th European Symposium on Programming (ESOP)}, Date-Added = {2010-01-08 03:52:39 +0100}, Date-Modified = {2010-01-08 03:52:39 +0100}, Ee = {http://dx.doi.org/10.1007/BFb0053567}, Isbn = {3-540-64302-8}, Pages = {122-138}, Publisher = {Springer}, Series = {LNCS}, Title = {Language Primitives and Type Discipline for Structured Communication-Based Programming}, Volume = {1381}, Year = {1998}} @inproceedings{Aranda:09:FOSSACS, Author = {{A}randa, {J}esus and {V}alencia, {F}rank D. and {V}ersari, {C}ristian}, Booktitle = {Proc. of FOSSACS}, Date-Added = {2010-01-07 12:54:52 +0100}, Date-Modified = {2010-01-11 06:09:41 +0100}, Doi = {10.1007/978-3-642-00596-1\_18}, Keywords = {{P}rocess calculi, {E}xpressiveness, {C}omputability}, Language = {{E}nglish}, Lixcategorie = {CIA}, Lixequipe = {comete}, Pages = {242-256}, Publisher = {Springer}, Series = {{LNCS}}, Title = {{O}n the {E}xpressive {P}ower of {R}estriction and {P}riorities in {CCS} with replication}, Volume = {5504}, X-Int.-Audience = {yes}, X-Pays = {IT}, X-Proc. = {yes}, Year = {2009}, Bdsk-Url-1 = {http://hal.inria.fr/inria-00430531/en/}, Bdsk-Url-2 = {http://dx.doi.org/10.1007/978-3-642-00596-1_18}, Bdsk-Url-3 = {http://dx.doi.org/10.1007/978-3-642-00596-1%5C_18}} @article{Kramer:10:JANCL, Author = {Simon Kramer and Catuscia Palamidessi and Roberto Segala and Andrea Turrini and Christelle Braun}, Date-Added = {2010-01-07 05:12:44 +0100}, Date-Modified = {2010-01-11 12:36:16 +0100}, Journal = {The Journal of Applied Non-Classical Logics}, Title = {A Quantitative Doxastic Logic for Probabilistic Processes and Applications to Information-Hiding}, Year = {2010}, Bdsk-Url-1 = {http://hal.archives-ouvertes.fr/inria-00445212/en/}} @phdthesis{Pradalier:09:Thesis, Author = {Sylvain Pradalier}, Date-Added = {2010-01-07 05:12:28 +0100}, Date-Modified = {2010-01-07 05:12:28 +0100}, Lixequipe = {comete}, School = {LIX, Ecole Polytechnique, France}, Title = {An approach to the modeling, simulation and analysis of nano-devices}, Year = 2009} @article{Kramer:09:JCV, Author = {Simon Kramer and Julian C. Bradfield}, Date-Added = {2010-01-07 05:09:29 +0100}, Date-Modified = {2010-01-09 05:18:21 +0100}, Doi = {10.1007/s11416-009-0137-1}, Journal = {Journal in Computer Virology}, Note = {To appear}, Title = {A General Definition of Malware}, X-Editorial-Board = {yes}, X-Int.-Audience = {yes}, Year = {2009}, Bdsk-Url-1 = {http://dx.doi.org/10.1007/s11416-009-0137-1}} @phdthesis{Beauxis:09:Thesis, Author = {Romain Beauxis}, Date-Added = {2010-01-07 05:07:41 +0100}, Date-Modified = {2010-01-07 05:07:41 +0100}, Lixequipe = {comete}, School = {LIX, Ecole Polytechnique, France}, Title = {Asynchronous Process Calculi for Specification and Verification of Information Hiding Protocols}, Year = 2009} @phdthesis{Aranda:09:Thesis, Author = {Jesus Aranda}, Date-Added = {2010-01-07 04:45:12 +0100}, Date-Modified = {2010-01-07 17:42:36 +0100}, Lixequipe = {comete}, School = {LIX, Ecole Polytechnique, France, and EISC, Universidad del Valle, Colombia}, Title = {On the Expressivity of Infinite and Local Behaviour in Fragments of the pi-calculus}, Year = 2009, Bdsk-Url-1 = {http://tel.archives-ouvertes.fr/tel-00430446/en/}, Bdsk-Url-2 = {http://tel.archives-ouvertes.fr/tel-00430495/en/}} @inproceedings{Aranda:09:CLEI, Author = {{V}illota, {A}ngela and {A}randa, {J}esus and {J}uan {F}rancisco, {D}iaz}, Booktitle = {Proc. of the {XXXV} {L}atin {A}merican {I}nformatics {C}onference, CLEI'09}, Date-Added = {2010-01-07 04:43:48 +0100}, Date-Modified = {2010-01-07 04:43:48 +0100}, Language = {{E}nglish}, Lixcategorie = {CIA}, Lixequipe = {comete}, Title = {{M}odelando {S}istemas de {M}embranas en ntcc}, X-Int.-Audience = {no}, X-Pays = {CO}, X-Proc. = {yes}, Year = {2009}, Bdsk-Url-1 = {http://hal.inria.fr/inria-00430537/en/}} @phdthesis{Olarte:PhDThesis, Author = {Carlos Olarte}, Date-Added = {2010-01-07 04:32:39 +0100}, Date-Modified = {2010-01-07 04:32:39 +0100}, Lixequipe = {comete}, School = {LIX, Ecole Polytechnique}, Title = {Universal Temporal Concurrent Constraint Programming}, Year = 2009, Bdsk-Url-1 = {http://tel.archives-ouvertes.fr/tel-00430446/en/}} @inproceedings{Lopez:09:PLACES, Author = {Hugo L\'{o}pez and Carlos Olarte and Jorge A. P\'{e}rez}, Booktitle = {Proc. of the workshop on Programming Language Approaches to Concurrency and Communication-cEntric Software (PLACES)}, Date-Added = {2010-01-07 04:30:41 +0100}, Date-Modified = {2010-01-09 06:43:14 +0100}, Lixcategorie = {CIA}, Lixequipe = {comete}, Note = {To appear}, Publisher = {Elsevier}, Series = {ENTCS}, Title = {Towards a Unified Framework for Declarative Structured Communications}, X-Int.-Audience = {yes}, X-Pays = {DK,IT}, X-Proc. = {yes}, Year = {2009}, Bdsk-Url-1 = {http://hal.inria.fr/inria-00426609/en/}} @inproceedings{Olarte:09:MCM, Author = {Carlos Olarte and Camilo Rueda}, Booktitle = {Proc. of the Second Int. Conf. on Mathematics and Computation in Music (MCM)}, Date-Added = {2010-01-07 04:23:46 +0100}, Date-Modified = {2010-01-09 04:48:54 +0100}, Doi = {10.1007/978-3-642-02394-1}, Isbn = {978-3-642-02393-4}, Lixcategorie = {CIA}, Lixequipe = {comete}, Pages = {218-227}, Publisher = {Springer}, Series = {Communications in Computer and Information Science}, Title = {A Declarative Language for Dynamic Multimedia Interaction Systems}, Volume = {38}, X-Int.-Audience = {yes}, X-Pays = {CO}, X-Proc. = {yes}, Year = {2009}, Bdsk-Url-1 = {http://hal.inria.fr/inria-00426607/}, Bdsk-Url-2 = {http://dx.doi.org/10.1007/978-3-642-02394-1}} @inproceedings{Olarte:09:IRCAM, Author = {Carlos Olarte and Camilo Rueda and Frank D. Valencia}, Booktitle = {New Computational Paradigms for Computer Music}, Chapter = {3}, Date-Added = {2010-01-07 04:19:54 +0100}, Date-Modified = {2010-01-07 04:19:54 +0100}, Lixcategorie = {CIA}, Lixequipe = {comete}, Pages = {400--402}, Publisher = {Delatour France / Ircam-Centre Pompidou}, Title = {{C}oncurrent {C}onstraint {P}rogramming: a Declarative Paradigm for Modeling Music Systems}, X-Int.-Audience = {no}, X-Pays = {CO}, X-Proc. = {yes}, Year = {2009}, Bdsk-Url-1 = {http://hal.inria.fr/inria-00429592/en/}} @inproceedings{Aranda:09:ICLP, Author = {Jesus Aranda and G{\'e}rard Assayag and Carlos Olarte and Jorge A. P{\'e}rez and Camilo Rueda and Mauricio Toro and Frank D. Valencia}, Booktitle = {Proceeding of the 25th Int. Conf., ICLP'09}, Date-Added = {2010-01-07 04:01:09 +0100}, Date-Modified = {2010-01-09 05:07:21 +0100}, Doi = {10.1007/978-3-642-02846-5\_4}, Isbn = {978-3-642-02845-8}, Lixcategorie = {CIA}, Lixequipe = {comete}, Pages = {509-513}, Publisher = {Springer}, Series = {LNCS}, Title = {An {O}verview of {F}{O}{R}{C}{E}{S}: An {I}{N}{R}{I}{A} Project on Declarative Formalisms for Emergent Systems}, Volume = {5649}, X-Int.-Audience = {yes}, X-Pays = {IT,CO}, X-Proc. = {yes}, Year = {2009}, Bdsk-Url-1 = {http://hal.inria.fr/inria-00426610/en/}, Bdsk-Url-2 = {http://dx.doi.org/10.1007/978-3-642-02846-5_4}, Bdsk-Url-3 = {http://dx.doi.org/10.1007/978-3-642-02846-5%5C_4}} @inproceedings{Falaschi:09:PPDP, Author = {Moreno Falaschi and Carlos Olarte and Catuscia Palamidessi}, Booktitle = {Proc. of the 11th Int. ACM SIGPLAN Conf. on Principles and Practice of Declarative Programming, PPDP'09}, Date-Added = {2010-01-07 03:54:23 +0100}, Date-Modified = {2010-01-07 03:54:23 +0100}, Doi = {10.1145/1599410.1599436}, Lixcategorie = {CIA}, Lixequipe = {comete}, Pages = {207-218}, Publisher = {ACM}, Title = {A framework for abstract interpretation of timed concurrent constraint programs}, X-Int.-Audience = {yes}, X-Pays = {IT}, X-Proc. = {yes}, Year = {2009}, Bdsk-Url-1 = {http://hal.inria.fr/inria-00426608/en/}, Bdsk-Url-2 = {http://dx.doi.org/10.1145/1599410.1599436}} @inproceedings{Andres:10:TACAS, Author = {Miguel E. Andr\'es and Catuscia Palamidessi and Peter van Rossum and Geoffrey Smith}, Booktitle = {Proc. of TACAS}, Date-Added = {2010-01-07 03:26:47 +0100}, Date-Modified = {2010-05-17 07:13:24 +0200}, Note = {To appear}, Pages = {373-389}, Publisher = {Springer}, Series = {{LNCS}}, Title = {Computing the Leakage of Information-Hiding Systems}, Volume = {6015}, Year = {2010}, Bdsk-Url-1 = {http://hal.archives-ouvertes.fr/hal-00445445/en/}} @proceedings{Abramsky:09:MFPS, Bibsource = {DBLP, http://dblp.uni-trier.de}, Date-Added = {2010-01-07 03:00:53 +0100}, Date-Modified = {2010-01-10 23:27:53 +0100}, Doi = {10.1016/j.entcs.2009.07.080}, Ee = {http://dx.doi.org/10.1016/j.entcs.2009.07.080}, Journal = {ENTCS}, Pages = {1-490}, Publisher = {Elsevier}, Title = {Proc. of the 25th Conf. on Mathematical Foundations of Programming Semantics}, Volume = {249}, Year = {2009}, Bdsk-Url-1 = {http://dx.doi.org/10.1016/j.entcs.2009.07.080}} @book{Falaschi:09:TCS, Bibsource = {DBLP, http://dblp.uni-trier.de}, Date-Added = {2010-01-07 01:40:53 +0100}, Date-Modified = {2010-01-10 23:39:14 +0100}, Doi = {10.1016/j.tcs.2009.07.034}, Ee = {http://dx.doi.org/10.1016/j.tcs.2009.07.034}, Journal = {TCS}, Number = {46}, Pages = {4601-4800}, Publisher = {Elsevier}, Title = {Abstract Interpretation and Logic Programming: Festschrift in honor of professor Giorgio Levi}, Volume = {410}, Year = {2009}, Bdsk-Url-1 = {http://dx.doi.org/10.1016/j.tcs.2009.07.034}} @proceedings{Nielsen:09:SOFSEM, Bibsource = {DBLP, http://dblp.uni-trier.de}, Date-Added = {2010-01-07 01:24:10 +0100}, Date-Modified = {2010-01-10 23:42:52 +0100}, Doi = {10.1007/978-3-540-95891-8}, Ee = {http://dx.doi.org/10.1007/978-3-540-95891-8}, Isbn = {978-3-540-95890-1}, Pages = {1-670}, Publisher = {Springer}, Series = {LNCS}, Title = {SOFSEM 2009: Proc. of the 35th Conf. on Current Trends in Theory and Practice of Computer Science}, Volume = {5404}, Year = {2009}, Bdsk-Url-1 = {http://www.springer.com/computer/foundations/book/978-3-540-95890-1}, Bdsk-Url-2 = {http://dx.doi.org/10.1007/978-3-540-95891-8}, Bdsk-Url-3 = {http://www.springer.com/978-3-540-95890-1}} @inproceedings{Daws:04:ICTAC, Author = {Conrado Daws}, Booktitle = {ICTAC}, Date-Added = {2010-01-04 10:28:59 +0100}, Date-Modified = {2010-01-04 10:28:59 +0100}, Pages = {280-294}, Publisher = {Springer}, Series = {LNCS}, Title = {Symbolic and Parametric Model Checking of Discrete-Time Markov Chains}, Volume = {3407}, Year = {2005}} @inproceedings{Aljazzar:08:QEST, Author = {Husain Aljazzar and Stefan Leue}, Bibsource = {DBLP, http://dblp.uni-trier.de}, Booktitle = {Proc. of the Int. Conf. on Quantitative Evaluation of SysTems 2008}, Date-Added = {2010-01-04 10:25:02 +0100}, Date-Modified = {2010-01-04 10:36:17 +0100}, Ee = {http://dx.doi.org/10.1109/QEST.2008.40}, Pages = {189-198}, Publisher = {IEEE}, Title = {Debugging of Dependability Models Using Interactive Visualization of Counterexamples}, Year = {2008}} @inproceedings{Damman:08:QEST, Author = {Berteun Damman and Tingting Han and Joost-Pieter Katoen}, Booktitle = {Proc. of the Int. Conf. on Quantitative Evaluation of SysTems 2008}, Date-Added = {2010-01-04 10:22:01 +0100}, Date-Modified = {2010-01-04 10:44:04 +0100}, Doi = {http://doi.ieeecomputersociety.org/10.1109/QEST.2008.11}, Isbn = {978-0-7695-3360-5}, Pages = {179-188}, Publisher = {IEEE}, Title = {Regular Expressions for {PCTL} Counterexamples}, Year = {2008}, Bdsk-Url-1 = {http://doi.ieeecomputersociety.org/10.1109/QEST.2008.11}} @article{Sabelfeld:03:JSAC, Author = {Andrei Sabelfeld and Andrew C. Myers}, Date-Added = {2010-01-04 10:20:04 +0100}, Date-Modified = {2010-01-04 10:20:04 +0100}, Journal = {IEEE Journal on Selected Areas in Communications}, Number = 1, Pages = {5--19}, Title = {Language-Based Information Flow Security}, Volume = 21, Year = 2003} @inproceedings{Andres:08:HVC, Author = {Andr\'{e}s, Miguel E. and D'Argenio, Pedro and van Rossum, Peter}, Booktitle = {Proc. of HVC'08}, Date-Added = {2010-01-04 10:16:52 +0100}, Date-Modified = {2010-01-04 10:19:16 +0100}, Doi = {http://dx.doi.org/10.1007/978-3-642-01702-5_15}, Isbn = {978-3-642-01701-8}, Location = {Haifa, Israel}, Pages = {129--148}, Publisher = {Springer}, Series = {LNCS}, Title = {Significant Diagnostic Counterexamples in Probabilistic Model Checking}, Volume = {5394}, Year = {2009}, Bdsk-Url-1 = {http://dx.doi.org/10.1007/978-3-642-01702-5_15}} @article{Cortier:07:LMCS, Author = {V{\'e}ronique Cortier and Micha{\"e}l Rusinowitch and Eugen Zalinescu}, Bibsource = {DBLP, http://dblp.uni-trier.de}, Ee = {http://dx.doi.org/10.2168/LMCS-3(3:2)2007}, Journal = {Logical Methods in Computer Science}, Number = {3}, Title = {Relating two standard notions of secrecy}, Volume = {3}, Year = {2007}} @inproceedings{Segala:06:CONCUR, Author = {Roberto Segala}, Bibsource = {DBLP, http://dblp.uni-trier.de}, Booktitle = {Proc. of CONCUR}, Ee = {http://dx.doi.org/10.1007/11817949_5}, Isbn = {3-540-37376-4}, Pages = {64-78}, Publisher = {Springer}, Series = {LNCS}, Title = {Probability and Nondeterminism in Operational Models of Concurrency}, Volume = {4137}, Year = {2006}} @inproceedings{Franz:07:PET, Author = {Matthias Franz and Bernd Meyer and Andreas Pashalidis}, Bibdate = {2007-10-01}, Bibsource = {DBLP, http://dblp.uni-trier.de/db/conf/pet/pet2007.html#FranzMP07}, Booktitle = {Privacy Enhancing Technologies, 7th Int. Symposium, {PET} 2007 Ottawa, Canada, June 20-22, 2007, Revised Selected Papers}, Date-Added = {2009-10-26 05:02:29 +0100}, Date-Modified = {2009-10-26 05:02:29 +0100}, Isbn = {978-3-540-75550-0}, Pages = {1--16}, Publisher = {Springer}, Series = {LNCS}, Title = {Attacking Unlinkability: The Importance of Context}, Volume = {4776}, Year = {2007}, Bdsk-Url-1 = {http://dx.doi.org/10.1007/978-3-540-75551-7_1}} @inproceedings{Massey:90:SITA, Author = {James L. Massey}, Booktitle = {Proc. of the 1990 Intl. Symp. on Info. Th. and its Applications}, Date-Added = {2009-10-25 19:09:32 +0100}, Date-Modified = {2009-10-25 19:09:32 +0100}, Title = {Causality, Feedback and Directed Information}, Year = {1990}} @article{Tatikonda:0:TIT, Author = {Sekhar Tatikonda and Sanjoy K. Mitter}, Bibsource = {DBLP, http://dblp.uni-trier.de}, Date-Added = {2009-10-25 19:07:53 +0100}, Date-Modified = {2009-10-25 19:07:53 +0100}, Ee = {http://dx.doi.org/10.1109/TIT.2008.2008147}, Journal = {IEEE Transactions on Information Theory}, Number = {1}, Pages = {323-349}, Title = {The Capacity of Channels With Feedback}, Volume = {55}, Year = {2009}} @article{Chatzikokolakis:10:IC, Author = {Konstantinos Chatzikokolakis and Catuscia Palamidessi}, Date-Added = {2009-10-19 09:00:48 +0200}, Date-Modified = {2010-01-11 12:36:07 +0100}, Journal = {Inf. and Comp.}, Title = {Making Random Choices Invisible to the Scheduler}, Year = {2010}, Bdsk-Url-1 = {http://hal.archives-ouvertes.fr/inria-00424860/en/}} @article{Beauxis:09:TCS, Author = {Romain Beauxis and Catuscia Palamidessi}, Bibdate = {2009-09-03}, Bibsource = {DBLP, http://dblp.uni-trier.de/db/journals/tcs/tcs410.html#BeauxisP09}, Date-Added = {2009-10-19 06:54:37 +0200}, Date-Modified = {2010-01-10 23:24:26 +0100}, Doi = {10.1016/j.tcs.2009.06.008}, Journal = {TCS}, Number = {41}, Pages = {4006--4025}, Title = {Probabilistic and nondeterministic aspects of anonymity}, Volume = {410}, Year = {2009}, Bdsk-Url-1 = {http://dx.doi.org/10.1016/j.tcs.2009.06.008}, Bdsk-Url-2 = {http://hal.archives-ouvertes.fr/inria-00424855/en/}} @inproceedings{Braun:09:MFPS, Author = {Christelle Braun and Konstantinos Chatzikokolakis and Catuscia Palamidessi}, Booktitle = {Proc. of the 25th Conf. on Mathematical Foundations of Programming Semantics}, Date-Added = {2009-10-04 06:10:19 +0200}, Date-Modified = {2010-01-10 23:36:45 +0100}, Doi = {10.1016/j.entcs.2009.07.085}, Pages = {75-91}, Publisher = {Elsevier}, Series = {ENTCS}, Title = {Quantitative Notions of Leakage for One-try Attacks}, Volume = {249}, Year = {2009}, Bdsk-Url-1 = {http://hal.archives-ouvertes.fr/inria-00424852/en/}, Bdsk-Url-2 = {http://dx.doi.org/10.1016/j.entcs.2009.07.085}} @techreport{Pradalier:09:TR, Author = {Sylvain Pradalier}, Date-Added = {2009-06-01 03:57:46 +0200}, Date-Modified = {2009-06-01 04:00:27 +0200}, Note = {Submitted for publication}, Title = {Comparing Chemical and Computer Science Semantics: Chemical Master equations and Backword Bisimulation}, Year = {2009}} @incollection{Bodei:96:ICALP, Author = {Chiara Bodei and Pierpaolo Degano and Corrado Priami}, Booktitle = {Proc. of ICALP}, Cdate = {1970-01-01}, Date-Added = {2009-04-13 17:06:53 +0200}, Date-Modified = {2009-04-13 18:46:41 +0200}, Mdate = {2005-08-18}, Pages = {490--501}, Publisher = {Springer-Verlag}, Series = {LNCS}, Title = {Mobile processes with a distributed environment}, Volume = {1099}, Year = {1996}, Bdsk-Url-1 = {http://springerlink.metapress.com/openurl.asp?genre=article&issn=0302-9743&volume=1099&spage=490}} @article{Boudol:88:AI, Author = {G\'erard Boudol and Ilaria Castellani}, Date-Added = {2009-04-13 16:59:28 +0200}, Date-Modified = {2009-04-13 17:00:00 +0200}, Journal = {Fundamenta Informaticae}, Keywords = {pcalc ccs binder}, Pages = {433--452}, Publisher = {North-Holland}, Title = {A Non-Interleaving Semantics for {CCS} Based on Proved Transitions}, Volume = {XI}, Year = {1988}} @article{Clark:05:JLC, Abstract = {This paper uses Shannon's information theory to give a quantitative definition of information flow in systems that transform inputs to outputs. For deterministic systems, the definition is shown to specialise to a simpler form when the information source and the known inputs jointly determine the inputs. For this special case, the definition is related to the classical security condition of non-interference and an equivalence is established between non-interference and independence of random variables. Quantitative information flow for deterministic systems is then presented in relational form. With this presentation, it is shown how relational parametricity can be used to derive upper and lower bounds on information flows through families of functions defined in the second order lambda calculus.}, Author = {David Clark and Sebastian Hunt and Pasquale Malacaria}, Date-Modified = {2010-05-23 18:07:01 +0200}, Journal = {J. of Logic and Comp.}, Number = 2, Pages = {181--199}, Title = {Quantitative Information Flow, Relations and Polymorphic Types}, Volume = 18, Year = {2005}} @article{Dodis:08:SIAMJoC, Author = {Yevgeniy Dodis and Rafail Ostrovsky and Leonid Reyzin and Adam Smith}, Bibdate = {2008-06-20}, Bibsource = {DBLP, http://dblp.uni-trier.de/db/journals/siamcomp/siamcomp38.html#DodisORS08}, Date-Added = {2009-03-16 14:32:18 +0100}, Date-Modified = {2009-03-16 14:32:18 +0100}, Journal = {SIAM J. Comput}, Number = {1}, Pages = {97--139}, Title = {Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data}, Volume = {38}, Year = {2008}, Bdsk-Url-1 = {http://dx.doi.org/10.1137/060651380}} @inproceedings{Renyi:60:Berkeley, Author = {Alfr\'ed R\'enyi}, Booktitle = {Proc. of the 4th Berkeley Symposium on Mathematics, Statistics, and Probability}, Date-Added = {2009-03-16 14:30:45 +0100}, Date-Modified = {2010-03-28 10:29:20 +0300}, Pages = {547--561}, Title = {{On Measures of Entropy and Information}}, Year = {1960}} @phdthesis{Cachin:97:PhD, Author = {Christian Cachin}, Date-Added = {2009-03-16 14:29:34 +0100}, Date-Modified = {2010-05-03 04:51:15 +0200}, Title = {Entropy Measures and Unconditional Security in Cryptography}, Year = {1997}, Bdsk-Url-1 = {ftp://ftp.inf.ethz.ch/pub/publications/dissertations/th12187.ps.gz}} @inproceedings{Smith:09:FOSSACS, Author = {Geoffrey Smith}, Booktitle = {Proc. of FOSSACS}, Date-Added = {2009-03-16 14:28:10 +0100}, Date-Modified = {2010-01-09 05:08:54 +0100}, Pages = {288--302}, Publisher = {Springer}, Series = {LNCS}, Title = {On the Foundations of Quantitative Information Flow}, Volume = {5504}, Year = {2009}} @inproceedings{Baelde:07:LPAR, Author = {David Baelde and Dale Miller}, Booktitle = {Int. Conf. on Logic for Programming and Automated Reasoning (LPAR)}, Date-Added = {2009-03-08 22:40:50 +0100}, Date-Modified = {2009-03-08 22:41:31 +0100}, Pages = {92--106}, Publisher = {Springer}, Series = {LNCS}, Title = {Least and greatest fixed points in linear logic}, Volume = {4790}, Year = {2007}} @inproceedings{Blanchet:03:PPDP, Author = {Bruno Blanchet}, Booktitle = {PPDP '03: Proc. of the 5th ACM SIGPLAN Int. Conf. on Principles and Practice of Declaritive Programming}, Date-Added = {2009-03-08 22:39:12 +0100}, Date-Modified = {2009-03-08 22:39:54 +0100}, Location = {Uppsala, Sweden}, Pages = {1--3}, Publisher = {ACM}, Title = {Automatic verification of cryptographic protocols: a logic programming approach}, Year = 2003} @inproceedings{Baelde:07:CADE, Author = {David Baelde and Andrew Gacek and Dale Miller and Gopalan Nadathur and Alwen Tiu}, Booktitle = {Proc. of the Int. Conf. on Automated Deduction}, Date-Added = {2009-03-08 22:35:11 +0100}, Date-Modified = {2009-03-08 22:38:29 +0100}, Number = {4603}, Pages = {391--397}, Publisher = {Springer}, Series = {Lecture Notes in Artificial Intelligence}, Title = {The {Bedwyr} system for model checking over syntactic expressions}, Year = {2007}} @incollection{Goubault:05:CONCUR, Author = {Eric Goubault and Emmanuel Haucourt}, Booktitle = {Proc. of CONCUR}, Date-Added = {2009-03-08 22:16:47 +0100}, Date-Modified = {2009-03-08 22:25:17 +0100}, Pages = {503--517}, Publisher = {Springer-Verlag (New York)}, Series = {LNCS (LNCS)}, Title = {A Practical Application of Geometric Semantics to Static Analysis of Concurrent Programs}, Volume = {3653}, Year = {2005}} @techreport{Goubault:01:CMCIM, Author = {Goubault, E.}, Date-Added = {2009-03-08 21:50:58 +0100}, Date-Modified = {2009-03-08 21:52:17 +0100}, Title = {Cubical Sets are Generalized Transition Systems}, Year = 2001} @inbook{Winskel:94:BOOK, Author = {Winskel, G. and Nielsen, M.}, Booktitle = {Handbook of Logic in Computer Science}, Date-Added = {2009-03-08 21:49:05 +0100}, Date-Modified = {2009-03-08 21:49:44 +0100}, Number = 3, Publisher = {Oxford University Press}, Title = {Models for concurrency}, Year = 1994} @book{Nachbin:65:BOOK, Author = {Nachbin, L.}, Date-Added = {2009-03-08 21:45:07 +0100}, Date-Modified = {2009-03-08 21:45:29 +0100}, Publisher = {Van Nostrand, Princeton}, Title = {Topology and Order}, Year = 1965} @inproceedings{Tiu:05:ESHOL, Aeres = {Dummy Field}, Author = {Alwen Tiu and Gopalan Nadathur and Dale Miller}, Booktitle = {Proc. of the workshop on Empirically Successful Automated Reasoning in Higher-Order Logics (ESHOL'05)}, Date-Added = {2009-03-08 16:32:00 +0100}, Date-Modified = {2009-03-08 16:34:01 +0100}, Lixcategorie = {CIA}, Lixequipe = {Parsifal}, Title = {Mixing Finite Success and Finite Failure in an Automated Prover}, X-Equipes = {parsifal EXT}, X-Support = {actes}, X-Type = {article}, Year = {2005}} @inproceedings{Tiu:05:CONCUR, Author = {Alwen Tiu}, Booktitle = {Proc. of CONCUR}, Date-Added = {2009-03-08 16:31:09 +0100}, Date-Modified = {2009-03-08 16:31:42 +0100}, Pages = {36--50}, Publisher = {Springer}, Series = {LNCS}, Title = {Model Checking for $\pi$-Calculus Using Proof Search}, Volume = {3653}, Year = {2005}} @phdthesis{Tiu:04:PHD, Author = {Alwen Tiu}, Date-Added = {2009-03-08 16:30:34 +0100}, Date-Modified = {2009-03-08 16:30:58 +0100}, Lixcategorie = {TH}, Lixequipe = {Parsifal}, School = {Pennsylvania State University}, Title = {A Logical Framework for Reasoning about Logical Specifications}, Year = {2004}, Bdsk-Url-1 = {http://etda.libraries.psu.edu/theses/approved/WorldWideIndex/ETD-479/}} @inproceedings{Momigliano:03:TYPES, Author = {Alberto Momigliano and Alwen Tiu}, Booktitle = {Post-proceedings of TYPES}, Date-Added = {2009-03-08 16:29:40 +0100}, Date-Modified = {2009-03-08 16:46:24 +0100}, Lixcategorie = {CIA}, Lixequipe = {Parsifal}, Number = {3085}, Pages = {293--308}, Publisher = {Springer}, Series = {LNCS}, Title = {Induction and Co-induction in Sequent Calculus}, Year = {2003}} @article{Miller:05:TOCL, Aeres = {Dummy Field}, Author = {Dale Miller and Alwen Tiu}, Date-Added = {2009-03-08 16:28:31 +0100}, Date-Modified = {2009-03-08 16:44:57 +0100}, Journal = {ACM Transactions on Computational Logic}, Lixcategorie = {CIA}, Lixequipe = {Parsifal}, Number = {4}, Pages = {749--783}, Publisher = {ACM Press}, Title = {A proof theory for generic judgments}, Volume = {6}, X-Cle-Support = {TOCL}, X-Equipes = {parsifal}, X-Support = {revue}, X-Type = {article}, Year = {2005}} @article{Mcdowell:02:TOCL, Author = {Raymond McDowell and Dale Miller}, Date-Added = {2009-03-08 16:26:40 +0100}, Date-Modified = {2009-03-08 16:28:09 +0100}, Journal = {ACM Transactions on Computational Logic}, Lixcategorie = {RI}, Lixequipe = {Parsifal}, Number = {1}, Pages = {80--136}, Title = {Reasoning with Higher-Order Abstract Syntax in a Logical Framework}, Volume = {3}, Year = {2002}} @inproceedings{Millen:84:SSP, Author = {Jonathan K. Millen}, Booktitle = {S\&P}, Date-Added = {2009-03-08 16:25:07 +0100}, Date-Modified = {2009-03-08 16:25:44 +0100}, Pages = {134--141}, Publisher = {IEEE}, Title = {The Interrogator: {A} tool for cryptographic protocol security}, Year = {1984}} @inproceedings{Boreale:01:ICALP, Author = {Michele Boreale}, Booktitle = {Proc. of ICALP}, Date-Added = {2009-03-08 16:23:56 +0100}, Date-Modified = {2009-03-08 16:24:37 +0100}, Pages = {667--681}, Publisher = {Springer-Verlag}, Series = {LNCS}, Title = {Symbolic Trace Analysis of Cryptographic Protocols}, Volume = {2076}, Year = {2001}} @inproceedings{Borgstroem:04:CONCUR, Author = {J. Borgstr\"om and S. Briais and U. Nestmann}, Booktitle = {Proc. of CONCUR}, Date-Added = {2009-03-08 16:22:30 +0100}, Date-Modified = {2009-03-08 16:23:25 +0100}, Number = {3170}, Pages = {161--176}, Publisher = {Springer}, Series = {LNCS}, Title = {Symbolic Bisimulation in the Spi Calculus}, Year = {2004}} @inproceedings{Boreale:04:APLAS, Author = {M. Boreale and M. Buscemi and U. Montanari}, Booktitle = {Proc. of APLAS}, Date-Added = {2009-03-08 16:20:07 +0100}, Date-Modified = {2009-03-08 16:22:10 +0100}, Pages = {296--310}, Publisher = {Springer}, Series = {LNCS}, Title = {{D}-Fusion: a Distinctive Fusion Calculus}, Volume = {3302}, Year = {2004}} @inproceedings{Malacaria:08:PLAS, Author = {Pasquale Malacaria and Han Chen}, Bibsource = {DBLP, http://dblp.uni-trier.de}, Booktitle = {Proc. of PLAS}, Date-Added = {2009-01-18 02:32:51 +0100}, Date-Modified = {2009-01-18 02:46:24 +0100}, Ee = {http://doi.acm.org/10.1145/1375696.1375713}, Pages = {135-146}, Publisher = {ACM}, Title = {Lagrange multipliers and maximum information leakage in different observational models}, Year = {2008}} @inproceedings{Braun:08:FOSSACS, Author = {Christelle Braun and Konstantinos Chatzikokolakis and Catuscia Palamidessi}, Booktitle = {Proc. of FOSSACS}, Date-Added = {2008-12-30 06:11:27 +0100}, Date-Modified = {2008-12-30 06:11:27 +0100}, Doi = {10.1007/978-3-540-78499-9_31}, Pages = {443-457}, Publisher = {Springer}, Series = {LNCS}, Title = {Compositional Methods for Information-Hiding}, Volume = {4962}, Year = {2008}, Bdsk-Url-1 = {http://hal.inria.fr/inria-00349227/en/}, Bdsk-Url-2 = {http://dx.doi.org/10.1007/978-3-540-78499-9_31}, Bdsk-Url-3 = {http://www.lix.polytechnique.fr/~catuscia/papers/Anonymity/Compositional/report.pdf}} @inproceedings{Beauxis:08:BOOK, Author = {Romain Beauxis and Catuscia Palamidessi and Frank D. Valencia}, Booktitle = {Concurrency, Graphs and Models}, Date-Added = {2008-12-30 06:11:03 +0100}, Date-Modified = {2008-12-30 06:11:03 +0100}, Doi = {10.1007/978-3-540-68679-8_29}, Pages = {473-492}, Publisher = {Springer}, Read = {Yes}, Series = {LNCS}, Title = {On the Asynchronous Nature of the Asynchronous pi-Calculus}, Volume = {5065}, Year = {2008}, Bdsk-Url-1 = {http://hal.inria.fr/inria-00349226/en/}, Bdsk-Url-2 = {http://dx.doi.org/10.1007/978-3-540-68679-8_29}, Bdsk-Url-3 = {http://www.lix.polytechnique.fr/~catuscia/papers/Romain/asynchronouspi.pdf}} @inproceedings{Beauxis:08:TGC, Author = {Romain Beauxis and Konstantinos Chatzikokolakis and Catuscia Palamidessi and Prakash Panangaden}, Booktitle = {Proc. of TGC}, Date-Added = {2008-12-30 06:10:45 +0100}, Date-Modified = {2008-12-30 06:10:45 +0100}, Doi = {10.1007/978-3-540-78663-4_23}, Pages = {347-362}, Publisher = {Springer}, Series = {LNCS}, Title = {Formal Approaches to Information-Hiding (Tutorial)}, Volume = {4912}, Year = {2008}, Bdsk-Url-1 = {http://dx.doi.org/10.1007/978-3-540-78663-4_23}, Bdsk-Url-2 = {http://hal.inria.fr/inria-00261827/en/}} @article{Chatzikokolakis:08:JCS, Author = {Konstantinos Chatzikokolakis and Catuscia Palamidessi and Prakash Panangaden}, Date-Added = {2008-12-30 06:07:59 +0100}, Date-Modified = {2010-03-26 16:12:24 +0200}, Doi = {10.3233/JCS-2008-0333}, Journal = {Journal of Computer Security}, Number = {5}, Pages = {531--571}, Title = {On the {Bayes} risk in information-hiding protocols}, Volume = {16}, Year = {2008}, Bdsk-Url-1 = {http://hal.inria.fr/inria-00349224/en/}, Bdsk-Url-2 = {http://dx.doi.org/10.3233/JCS-2008-0333}, Bdsk-Url-3 = {http://www.lix.polytechnique.fr/~catuscia/papers/ProbabilityError/full.pdf}} @inproceedings{DiPierro:98:MFCS, Author = {Alessandra {Di Pierro} and Herbert Wiklicky}, Booktitle = {Proc. of the 23rd Int. Symposium on Mathematical Foundations of Computer Science}, Date-Added = {2008-12-28 14:43:04 +0100}, Date-Modified = {2008-12-28 17:54:39 +0100}, Doi = {10.1007/BFb0055753}, Pages = {446-455}, Publisher = {Springer}, Series = {LNCS}, Title = {Probabilistic Concurrent Constraint Programming: Towards a Fully Abstract Model}, Volume = {1450}, Year = {1998}, Bdsk-Url-1 = {http://dx.doi.org/10.1007/BFb0055753}} @article{Kramer:08:JLAP, Author = {Simon Kramer}, Date-Added = {2008-12-27 13:06:37 +0100}, Date-Modified = {2008-12-27 13:07:13 +0100}, Doi = {DOI: 10.1016/j.jlap.2008.05.005}, Issn = {1567-8326}, Journal = {Journal of Logic and Algebraic Programming}, Keywords = {Process algebra}, Number = {1-2}, Pages = {60 - 91}, Title = {Cryptographic protocol logic: Satisfaction for (timed) Dolev-Yao cryptography}, Volume = {77}, Year = {2008}, Bdsk-Url-1 = {http://www.sciencedirect.com/science/article/B6W8D-4SWP1RX-2/2/04470bcdfa34b9d6ba2ba422afebae42}, Bdsk-Url-2 = {http://dx.doi.org/10.1016/j.jlap.2008.05.005}} @inproceedings{Bhowmick:08:TGC, Author = {Abhishek Bhowmick and Catuscia Palamidessi}, Booktitle = {Proc. of TGC}, Date-Added = {2008-12-25 05:39:04 +0100}, Date-Modified = {2010-01-07 00:45:02 +0100}, Pages = {36--51}, Publisher = {Springer}, Series = {LNCS}, Title = {Bounds on the leakage of the input's distribution in information-hiding protocols}, Volume = {5474}, Year = {2009}, Bdsk-Url-1 = {http://hal.archives-ouvertes.fr/hal-00444579/en/}} @techreport{Troina:08:TechRep, Author = {Angelo Troina and Jean Goubault-Larrecq and Catuscia Palamidessi}, Date-Added = {2008-12-25 01:55:14 +0100}, Date-Modified = {2008-12-25 01:58:13 +0100}, Title = {A Probabilistic Applied Pi-Calculus}, Year = {2008}} @inproceedings{Krivine:08:MFPS, Author = {Jean Krivine and Robin Milner and Angelo Troina}, Booktitle = {Proc. of the 24th Conf. on the Mathematical Foundations of Programming Semantics (MFPS XXIV)}, Date-Added = {2008-12-25 01:48:07 +0100}, Date-Modified = {2008-12-25 01:52:54 +0100}, Doi = {10.1016/j.entcs.2008.10.006}, Pages = {73-96}, Publisher = {Elsevier}, Series = {ENTCS}, Title = {Stochastic Bigraphs}, Volume = {218}, Year = {2008}, Bdsk-Url-1 = {http://dx.doi.org/10.1016/j.entcs.2008.10.006%20%20%20%20}, Bdsk-Url-2 = {http://dx.doi.org/10.1016/j.entcs.2008.10.006}} @inproceedings{Kramer:08:TCV, Author = {Simon Kramer and Julian C. Bradfield}, Booktitle = {Proc. of the Workshop on the Theory of Computer Viruses}, Date-Added = {2008-12-25 01:38:08 +0100}, Date-Modified = {2008-12-27 22:04:05 +0100}, Note = {Extended version submitted to the Journal of Computer Virology}, Title = {A General Definition of Malware}, Year = {2008}, Bdsk-Url-1 = {http://tcv.loria.fr/}} @inproceedings{Kramer:08:IMLA, Author = {Simon Kramer}, Booktitle = {Proc. of the {LiCS}-affiliated Intuitionistic Modal Logics and Applications Workshop}, Date-Added = {2008-12-25 01:33:00 +0100}, Date-Modified = {2008-12-30 03:48:47 +0100}, Note = {To appear. Extended version submitted to Inf. and Comp.}, Publisher = {Elsevier}, Series = {ENTCS}, Title = {Reducing Provability to Knowledge in Multi-Agent Systems}, Year = {2008}, Bdsk-Url-1 = {ftp://ftp.research.microsoft.com/pub/tr/TR-2008-90.pdf}} @article{Cacciagrano:08:LMCS, Author = {Diletta Cacciagrano and Flavio Corradini and Catuscia Palamidessi}, Date-Added = {2008-12-25 01:21:34 +0100}, Date-Modified = {2010-01-07 01:08:42 +0100}, Journal = {Logical Methods in Computer Science}, Number = {2 - 15}, Title = {Explicit Fairness in Testing Semantics}, Volume = {5}, Year = {2009}, Bdsk-Url-1 = {http://hal.archives-ouvertes.fr/hal-00444580/en/}} @article{Norman:08:TSE, Author = {Gethin Norman and Catuscia Palamidessi and David Parker and Peng Wu}, Date-Added = {2008-12-25 01:08:29 +0100}, Date-Modified = {2010-01-07 00:02:35 +0100}, Journal = {IEEE Transactions of Software Engineering}, Number = {2}, Pages = {209--223}, Rating = {1}, Read = {No}, Title = {Model checking probabilistic and stochastic extensions of the $\pi$-calculus}, Volume = {35}, Year = {2009}, Bdsk-Url-1 = {http://hal.archives-ouvertes.fr/inria-00424856/en/}} @article{Credi:08:TCS, Author = {Alberto Credi and Marco Garavelli and Cosimo Laneve and Sylvain Pradalier and Serena Silvi and Gianluigi Zavattaro}, Date-Added = {2008-12-24 18:08:11 +0100}, Date-Modified = {2008-12-24 18:09:22 +0100}, Doi = {10.1016/j.tcs.2008.07.006}, Journal = {TCS}, Number = {1}, Pages = {17-30}, Title = {nanoK: A calculus for the modeling and simulation of nano devices}, Volume = {408}, Year = {2008}, Bdsk-Url-1 = {http://dx.doi.org/10.1016/j.tcs.2008.07.006}} @inproceedings{Beauxis:08:ICLP, Author = {Romain Beauxis}, Booktitle = {24th Int. Conf. on Logic Programming}, Date-Added = {2008-12-24 16:47:59 +0100}, Date-Modified = {2008-12-24 16:50:26 +0100}, Doi = {10.1007/978-3-540-89982-2_80}, Pages = {801-802}, Publisher = {Springer}, Series = {LNCS}, Title = {Probabilistic and Concurrent Models for Security}, Volume = {5366}, Year = {2008}, Bdsk-Url-1 = {http://dx.doi.org/10.1007/978-3-540-89982-2_80}} @inproceedings{Aranda:08:ICLP, Author = {Jes{\'u}s Aranda and Jorge A. P{\'e}rez and Camilo Rueda and Frank D. Valencia}, Booktitle = {24th Int. Conf. on Logic Programming}, Date-Added = {2008-12-24 16:40:08 +0100}, Date-Modified = {2008-12-24 16:42:59 +0100}, Doi = {10.1007/978-3-540-89982-2}, Pages = {682-686}, Publisher = {Springer}, Series = {LNCS}, Title = {Stochastic Behavior and Explicit Discrete Time in Concurrent Constraint Programming}, Volume = {5366}, Year = {2008}, Bdsk-Url-1 = {http://dx.doi.org/10.1007/978-3-540-89982-2}} @inproceedings{Olarte:08:PPDP, Author = {Carlos Olarte and Frank D. Valencia}, Booktitle = {Proc. of the 10th Int. ACM SIGPLAN Conf. on Principles and Practice of Declarative Programming}, Date-Added = {2008-12-24 16:32:28 +0100}, Date-Modified = {2008-12-30 05:38:27 +0100}, Doi = {10.1145/1389449.1389452}, Pages = {8-19}, Title = {The expressivity of universal timed CCP: undecidability of Monadic FLTL and closure operators for security}, Year = {2008}, Bdsk-Url-1 = {http://dx.doi.org/10.1145/1389449.1389452}, Bdsk-Url-2 = {http://hal.inria.fr/inria-00349353/en/}} @article{Palamidessi:00:IandC, Author = {Catuscia Palamidessi and Joachim Parrow and Rob J. van Glabbeek}, Date-Added = {2008-12-24 10:16:23 +0100}, Date-Modified = {2008-12-24 10:18:05 +0100}, Journal = {Inf. and Comp.}, Number = {1-2}, Pages = {1}, Title = {Preface}, Volume = {156}, Year = {2000}} @book{Tijms:07:BOOK, Author = {Henk Tijms}, Date-Added = {2008-07-22 06:59:10 +0200}, Date-Modified = {2008-07-22 07:00:15 +0200}, Publisher = {CUP}, Title = {Understanding Probability: Chance Rules in Everyday Life}, Year = {2007}} @inproceedings{Malacaria:07:POPL, Author = {Pasquale Malacaria}, Bibdate = {2007-01-22}, Bibsource = {DBLP, http://dblp.uni-trier.de/db/conf/popl/popl2007.html#Malacaria07}, Booktitle = {Proc. of POPL}, Date-Added = {2008-07-22 06:12:29 +0200}, Date-Modified = {2008-07-22 06:12:49 +0200}, Isbn = {1-59593-575-4}, Pages = {225--235}, Publisher = {ACM}, Title = {Assessing security threats of looping constructs}, Year = {2007}, Bdsk-Url-1 = {http://doi.acm.org/10.1145/1190216.1190251}} @inproceedings{Chatzikokolakis:08:MFPS, Author = {Konstantinos Chatzikokolakis and Keye Martin}, Booktitle = {Proc. of the Twenty-fourth Conf. on the Mathematical Foundations of Programming Semantics}, Date-Added = {2008-07-22 05:54:40 +0200}, Date-Modified = {2008-12-24 16:25:39 +0100}, Doi = {10.1016/j.entcs.2008.10.008}, Pages = {111-129}, Publisher = {Elsevier}, Series = {ENTCS}, Title = {A Monotonicity Principle for Information Theory.}, Volume = {218}, Year = {2008}, Bdsk-Url-1 = {http://dx.doi.org/10.1016/j.entcs.2008.10.008}} @inproceedings{Smith:07:TGC, Author = {Geoffrey Smith}, Bibdate = {2008-04-15}, Booktitle = {Proc. of TGC}, Date-Added = {2008-07-22 05:44:01 +0200}, Date-Modified = {2008-07-22 06:23:16 +0200}, Isbn = {978-3-540-78662-7}, Pages = {383--400}, Publisher = {Springer}, Series = {LNCS}, Title = {Adversaries and Information Leaks (Tutorial)}, Volume = {4912}, Year = {2007}, Bdsk-Url-1 = {http://dx.doi.org/10.1007/978-3-540-78663-4_25}} @inproceedings{Freedman:02:CCS, Author = {Michael J. Freedman and Robert Morris}, Booktitle = {Proc. of CCS}, Date-Added = {2008-07-22 05:03:31 +0200}, Date-Modified = {2008-07-22 05:44:01 +0200}, Title = {Tarzan: A Peer-to-Peer Anonymizing Network Layer}, Www_Important = {1}, Www_Section = {Anonymous communication}, Www_Tags = {selected}, Year = {2002}} @inproceedings{Dingledine:04:USENIX, Author = {Roger Dingledine and Nick Mathewson and Paul Syverson}, Booktitle = {Proc. of the 13th USENIX Security Symposium}, Date-Added = {2008-07-22 04:42:12 +0200}, Date-Modified = {2008-07-22 05:44:01 +0200}, Title = {Tor: The Second-Generation Onion Router}, Www_Important = {1}, Www_Section = {Anonymous communication}, Www_Tags = {selected}, Year = {2004}} @article{Chaum:81:CACM, Author = {David L. Chaum}, Date-Added = {2008-07-22 04:36:33 +0200}, Date-Modified = {2008-07-22 04:37:17 +0200}, Doi = {http://doi.acm.org/10.1145/358549.358563}, Issn = {0001-0782}, Journal = {Communications of the ACM}, Number = {2}, Pages = {84--90}, Publisher = {ACM}, Title = {Untraceable electronic mail, return addresses, and digital pseudonyms}, Volume = {24}, Year = {1981}, Bdsk-Url-1 = {http://doi.acm.org/10.1145/358549.358563}} @proceedings{Gorla:07:SECCO, Date-Added = {2008-07-02 01:25:09 +0200}, Date-Modified = {2008-12-30 09:49:38 +0100}, Ee = {http://dx.doi.org/10.1016/j.entcs.2007.09.009}, Journal = {ENTCS}, Number = {1}, Pages = {1-2}, Title = {Proocedings of SECCO}, Volume = {194}, Year = {2007}} @proceedings{Palamidessi:08:LIXColloquium, Bibsource = {DBLP, http://dblp.uni-trier.de}, Date-Added = {2008-07-02 01:18:46 +0200}, Date-Modified = {2008-12-24 10:46:22 +0100}, Doi = {10.1016/j.entcs.2008.04.001}, Ee = {http://dx.doi.org/10.1016/j.entcs.2008.04.001}, Journal = {ENTCS}, Pages = {1-200}, Publisher = {Elsevier}, Read = {Yes}, Title = {Proc. of the LIX Colloquium on Emerging Trends in Concurrency Theory (LIX 2006)}, Volume = {209}, Year = {2008}, Bdsk-Url-1 = {http://dx.doi.org/10.1016/j.entcs.2008.04.001}} @article{Busi:00:TCS, Author = {Nadia Busi and Roberto Gorrieri and Gianluigi Zavattaro}, Date-Added = {2008-03-20 16:38:52 -0400}, Date-Modified = {2008-03-20 16:38:52 -0400}, Journal = {TCS}, Number = {1}, Pages = {49--90}, Title = {Comparing Three Semantics for Linda-like Languages}, Volume = {240}, Year = {2000}} @article{Lomuscio:07:SIGACTN, Author = {Alessio Lomuscio and Wojciech Penczek}, Date-Modified = {2008-02-06 02:41:07 +0100}, Journal = {SIGACTN: SIGACT News (ACM Special Interest Group on Automata and Computability Theory)}, Title = {Symbolic Model Checking for Temporal-Epistemic Logics}, Volume = {38}, Year = {2007}} @inproceedings{Kilian:88:STOC, Author = {Joe Kilian}, Bibsource = {DBLP, http://dblp.uni-trier.de}, Booktitle = {Proc. of the 20th ACM Annual Symposium on the Theory of Computing}, Date-Added = {2008-01-29 05:57:36 +0100}, Date-Modified = {2008-01-29 05:57:36 +0100}, Pages = {20-31}, Title = {Founding Cryptography on Oblivious Transfer}, Year = {1988}} @article{Even:85:ACM, Author = {Shimon Even and Oded Goldreich and Abraham Lempel}, Date-Added = {2008-01-29 05:56:58 +0100}, Date-Modified = {2008-01-29 05:56:58 +0100}, Doi = {http://doi.acm.org/10.1145/3812.3818}, Issn = {0001-0782}, Journal = {Commun. ACM}, Number = {6}, Pages = {637--647}, Publisher = {ACM}, Title = {A randomized protocol for signing contracts}, Volume = {28}, Year = {1985}, Bdsk-Url-1 = {http://doi.acm.org/10.1145/3812.3818}} @inproceedings{Desharnais:98:LICS, Author = {Josee Desharnais and Abbas Edalat and Prakash Panangaden}, Bibdate = {2002-01-03}, Bibsource = {DBLP, http://dblp.uni-trier.de/db/conf/lics/lics98.html#DesharnaisEP98}, Booktitle = {Proc. of LICS}, Date-Added = {2008-01-02 14:56:14 +0100}, Date-Modified = {2008-01-02 14:57:45 +0100}, Pages = {478--487}, Title = {A Logical Characterization of Bisimulation for Labeled Markov Processes}, Year = {1998}} @inproceedings{Parma:07:FOSSACS, Author = {Augusto Parma and Roberto Segala}, Bibdate = {2007-07-26}, Bibsource = {DBLP, http://dblp.uni-trier.de/db/conf/fossacs/fossacs2007.html#ParmaS07}, Booktitle = {Proc. of FOSSACS}, Date-Added = {2007-12-31 04:55:53 +0100}, Date-Modified = {2007-12-31 04:56:50 +0100}, Isbn = {978-3-540-71388-3}, Pages = {287--301}, Publisher = {Springer}, Series = {LNCS}, Title = {Logical Characterizations of Bisimulations for Discrete Probabilistic Systems}, Volume = {4423}, Year = {2007}, Bdsk-Url-1 = {http://dx.doi.org/10.1007/978-3-540-71389-0_21}} @inproceedings{Dechesne:07:LPAR, Author = {Francien Dechesne and MohammadReza Mousavi and Simona Orzan}, Booktitle = {Proc. of the 14th Int. Conf. on Logic for Programming Artificial Intelligence and Reasoning (LPAR'07)}, Date-Added = {2007-12-31 04:49:54 +0100}, Date-Modified = {2007-12-31 04:53:42 +0100}, Pages = {226--241}, Publisher = {Springer}, Series = {LNCS}, Title = {Operational and Epistemic Approaches to Protocol Analysis: Bridging the Gap}, Volume = {4790}, Year = {2007}} @inproceedings{Nielsen:98:MFCS, Author = {Mogens Nielsen}, Booktitle = {Proc. of MFCS'98}, Date-Added = {2007-12-31 04:42:46 +0100}, Date-Modified = {2007-12-31 04:42:46 +0100}, Pages = {117--128}, Publisher = {Springer-Verlag}, Series = {LNCS}, Title = {Reasoning About the Past}, Volume = {1450}, Year = {1998}} @techreport{Gorla:07:TechRep, Author = {Daniele Gorla}, Date-Added = {2007-12-27 00:13:52 +0100}, Date-Modified = {2007-12-27 00:15:41 +0100}, Title = {On the Criteria for a `Good' Encoding: a new approach to encodability and separation results}, Year = {2007}} @inproceedings{Olarte:08:SAC, Author = {Carlos Olarte and Frank D. Valencia}, Booktitle = {Proc. of the 23rd ACM Symposium on Applied Computing (SAC)}, Date-Added = {2007-12-09 23:59:15 +0100}, Date-Modified = {2008-12-30 06:06:40 +0100}, Doi = {10.1145/1363686.1363726}, Note = {\url{http://www.lix.polytechnique.fr/~colarte/colarte/Publications_files/sac08.pdf}}, Pages = {145-150}, Publisher = {ACM}, Title = {Universal Concurrent Constraint Programing: Symbolic Semantics and Applications to Security}, Year = 2008, Bdsk-Url-1 = {http://dx.doi.org/10.1145/1363686.1363726}, Bdsk-Url-2 = {http://hal.inria.fr/inria-00201497/en/}, Bdsk-Url-3 = {http://www.lix.polytechnique.fr/~colarte/colarte/Publications_files/sac08.pdf}} @inproceedings{Boreale:06:ICALP, Author = {Michele Boreale}, Bibdate = {2006-07-03}, Bibsource = {DBLP, http://dblp.uni-trier.de/db/conf/icalp/icalp2006-2.html#Boreale06}, Booktitle = {Automata, Languages and Programming, 33rd Int. Colloquium, {ICALP} 2006, Venice, Italy, July 10-14, 2006, Proc., Part {II}}, Date-Added = {2007-12-06 23:26:28 +0100}, Date-Modified = {2007-12-06 23:27:13 +0100}, Isbn = {3-540-35907-9}, Pages = {119--131}, Publisher = {Springer}, Series = {LNCS}, Title = {Quantifying Information Leakage in Process Calculi}, Volume = {4052}, Year = {2006}, Bdsk-Url-1 = {http://dx.doi.org/10.1007/11787006_11}} @inproceedings{Delaune:06:WOTE, Abstract = {In this paper we report on some recent work to formally specify and verify electronic voting protocols. In particular, we use the formalism of the applied pi calculus: the applied pi calculus is a formal language similar to the pi calculus but with useful extensions for modelling cryptographic protocols. We model several important properties, namely fairness, eligibility, privacy, receipt-freeness and coercion-resistance. Verification of these properties is illustrated on two cases studies and has been partially automated using the Blanchet's ProVerif tool.}, Author = {St{\'e}phanie Delaune and Steve Kremer and Mark D. Ryan}, Booktitle = {{P}roceedings of the {IAVoSS} {W}orkshop {O}n {T}rustworthy {E}lections ({WOTE}'06)}, Date-Added = {2007-12-06 03:44:22 +0100}, Date-Modified = {2007-12-06 03:47:10 +0100}, Pages = {45--52}, Title = {Verifying Properties of Electronic Voting Protocols}, Year = {2006}} @inproceedings{Delaune:06:CSFW, Author = {St{\'e}phanie Delaune and Steve Kremer and Mark Ryan}, Bibdate = {2007-01-16}, Bibsource = {DBLP, http://dblp.uni-trier.de/db/conf/csfw/csfw2006.html#DelauneKR06}, Booktitle = {Computer Security Foundations Workshop}, Date-Added = {2007-12-06 03:21:02 +0100}, Date-Modified = {2007-12-06 03:24:24 +0100}, Isbn = {0-7695-2615-2}, Pages = {28--42}, Publisher = {IEEE}, Title = {Coercion-Resistance and Receipt-Freeness in Electronic Voting}, Year = {2006}, Bdsk-Url-1 = {http://doi.ieeecomputersociety.org/10.1109/CSFW.2006.8}} @phdthesis{Chatzikokolakis:07:PhDThesis, Author = {Konstantinos Chatzikokolakis}, Lixcategorie = {TH}, Lixequipe = {comete}, Note = {\url{www.lix.polytechnique.fr/~kostas/thesis.pdf}}, School = {LIX, \'Ecole Polytechnique}, Title = {Probabilistic and Information-Theoretic Approaches to Anonymity}, Year = {2007}} @proceedings{Italiano:07:TCS, Date-Modified = {2008-12-30 05:20:04 +0100}, Number = {1-2}, Pages = {1-218}, Publisher = {Elsevier}, Title = {Special issue of \emph{TCS} dedicated to a selection of the best papers presented at ICALP'05}, Volume = {380}, Year = {2007}} @article{Lanotte:07:FAC, Author = {Ruggero Lanotte and Andrea Maggiolo-Schettini and Angelo Troina}, Journal = {Formal Aspects of Computing}, Number = {1}, Pages = {93--109}, Title = {Parametric probabilistic transition systems for system design and analysis}, Volume = {19}, Year = {2007}} @inproceedings{Cacciagrano:07:EXPRESS, Author = {Diletta Cacciagrano and Flavio Corradini and Jes\'us Aranda and Frank D. Valencia}, Booktitle = {Proc. of 14th Int. Workshop on Expressiveness of Concurrency, ({EXPRESS}'07)}, Date-Modified = {2008-12-28 17:52:46 +0100}, Doi = {10.1016/j.entcs.2007.11.006}, Note = {\url{http://www.brics.dk/~fvalenci/papers/pers-test.pdf}}, Pages = {59-84}, Publisher = {Elsevier}, Series = {ENTCS}, Title = {Linearity, Persistence and Testing Semantics in the Asynchronous Pi-Calculus}, Volume = {194}, Year = {2008}, Bdsk-Url-1 = {http://dx.doi.org/10.1016/j.entcs.2007.11.006}} @inproceedings{Aranda:06:FMCO, Author = {Jesus Aranda and Cinzia Di Giusto and Catuscia Palamidessi and Frank Valencia}, Booktitle = {Postproceedings of the 5th Int. Symposium on Formal Methods for Components and Objects (FMCO'06)}, Date-Modified = {2008-02-06 03:14:14 +0100}, Note = {\url{http://www.lix.polytechnique.fr/~fvalenci/papers/fmco07.pdf}}, Pages = {185-206}, Publisher = {Springer}, Series = {LNCS}, Title = {Expressiveness of Recursion, Replication and Scope Mechanisms in Process Calculi}, Volume = {4709}, Year = {2007}} @inproceedings{Aranda:07:APLAS, Author = {J. Aranda and C. Di Giusto and M. Nielsen and F. Valencia}, Booktitle = {Proc. of The Fifth ASIAN Symposium on Programming Languages ({APLAS'07})}, Date-Modified = {2008-12-24 16:21:17 +0100}, Doi = {10.1007/978-3-540-76637-7_26}, Note = {\url{http://www.brics.dk/~fvalenci/papers/aplas.pdf}}, Number = {4807}, Pages = {383-398}, Publisher = {Springer}, Series = {LNCS}, Title = {{CCS} with Replication in the {C}homsky Hierarchy: The Expressive Power of Divergence}, Year = {2007}, Bdsk-Url-1 = {http://dx.doi.org/10.1007/978-3-540-76637-7_26}} @inproceedings{Rueda:04:ICLP, Author = {C. Rueda and F. Valencia}, Booktitle = {Proc. of the Nineteenth Int. Conf. on Logic Programming (ICLP 2004)}, Isbn = {3-540-22671-0}, Pages = {343--355}, Publisher = {Springer}, Series = {LNCS}, Title = {Non-Viability Deductions in Arc-Consistency Computation.}, Volume = {3132}, Year = {2004}} @inproceedings{Gutierrez:06:MembraneComputing, Author = {Julian Gutierrez and Jorge Perez and Camilo Rueda and Frank D. Valencia}, Booktitle = {Proc. of Workshop on Membrane Computing and Biologically Inspired Process Calculi.}, Date-Modified = {2008-12-28 18:01:42 +0100}, Note = {\url{http://www.brics.dk/~fvalenci/papers/bioccp.pdf}}, Pages = {117--137}, Publisher = {Elsevier}, Series = {ENTCS}, Title = {Timed Concurrent Constraint Programming for Analyzing Biological Systems.}, Volume = {171 (2)}, Year = {2007}} @article{Rueda:04:SC, Author = {Camilo Rueda and Frank D. Valencia}, Journal = {Soft Computing}, Number = {9}, Pages = {641--648}, Publisher = {Springer}, Title = {On validity in modelization of musical problems by {CCP}}, Volume = {8}, Year = {2004}} @article{Chatzikokolakis:08:IC, Author = {Konstantinos Chatzikokolakis and Catuscia Palamidessi and Prakash Panangaden}, Date-Modified = {2010-01-04 10:41:19 +0100}, Doi = {10.1016/j.ic.2007.07.003}, Journal = {Inf. and Comp.}, Number = {2--4}, Pages = {378--401}, Title = {Anonymity Protocols as Noisy Channels}, Volume = {206}, Year = {2008}, Bdsk-Url-1 = {http://hal.inria.fr/inria-00349225/en/}, Bdsk-Url-2 = {http://dx.doi.org/10.1016/j.ic.2007.07.003}} @inproceedings{Goubault-Larrecq:07:APLAS, Author = {Jean Goubault-Larrecq and Catuscia Palamidessi and Angelo Troina}, Booktitle = {Proc. of the 5th Asian Symposium on Programming Languages and Systems (APLAS'07)}, Date-Modified = {2007-12-16 15:51:49 +0100}, Note = {\url{http://www.lix.polytechnique.fr/~catuscia/papers/Angelo/aplas.pdf}}, Pages = {175-190}, Publisher = {Springer}, Series = {LNCS}, Title = {A Probabilistic Applied Pi-Calculus}, Volume = {4807}, Year = 2007} @inproceedings{Widder:07:DSN, Author = {Josef Widder and G{\"u}nther Gridling and Bettina Weiss and Jean-Paul Blanquart}, Booktitle = {Proc. of the 37th Annual IEEE/IFIP Int. Conf. on Dependable Systems and Networks (DSN)}, Note = {To appear}, Title = {Synchronous Consensus with Mortal Byzantines}, Year = 2007} @article{Vigliotti:07:TCS, Author = {Maria Grazia Vigliotti and Iain Phillips and Catuscia Palamidessi}, Date-Modified = {2008-12-28 16:41:03 +0100}, Journal = {TCS}, Note = {\url{http://www.lix.polytechnique.fr/~catuscia/papers/2007/MariaGrazia/tcs.pdf}}, Number = {1-3}, Pages = {267-289}, Title = {Tutorial on separation results in process calculi via leader election problems}, Volume = {388}, Year = 2007, Bdsk-Url-1 = {http://hal.inria.fr/inria-00201071/en/}} @inproceedings{Norman:07:QEST, Author = {Gethin Norman and Catuscia Palamidessi and David Parker and Peng Wu}, Booktitle = {4th Int. Conf. on the Quantitative Evaluation of SysTems (QEST)}, Date-Modified = {2009-01-02 03:27:24 +0100}, Note = {\url{http://www.lix.polytechnique.fr/~catuscia/papers/Wu/qest1.pdf}. Full version in \url{http://www.lix.polytechnique.fr/~catuscia/papers/2009/TSE.pdf}}, Pages = {169-178}, Publisher = {IEEE}, Title = {Model checking the probabilistic pi-calculus}, Year = 2007} @inproceedings{Wu:07:QEST, Author = {Peng Wu and Catuscia Palamidessi and Huimin Lin}, Booktitle = {Proc. of 4th Int. Conf. on the Quantitative Evaluation of SysTems (QEST)}, Date-Modified = {2007-12-23 00:54:37 +0100}, Note = {\url{http://www.lix.polytechnique.fr/~catuscia/papers/Wu/qest2.pdf}}, Pages = {179-188}, Publisher = {IEEE}, Title = {Symbolic Bisimulation for Probabilistic Systems}, Year = 2007} @inproceedings{Olarte:07:ICLP, Author = {Carlos Olarte and Catuscia Palamidessi and Frank D. Valencia}, Booktitle = {Proc. of the 23rd Int. Conf. in Logic Programming (ICLP'07)}, Note = {\url{http://www.lix.polytechnique.fr/~catuscia/papers/Carlos/iclp07DC.pdf}}, Pages = {464--465}, Publisher = {Springer}, Series = {LNCS}, Title = {Universal Timed Concurrent Constraint Programming}, Volume = {4670}, Year = 2007} @inproceedings{Falaschi:07:ICLP, Author = {Moreno Falaschi and Carlos Olarte and Catuscia Palamidessi and Frank D. Valencia}, Booktitle = {Proc. of The 23rd Int. Conf. in Logic Programming (ICLP'07)}, Note = {\url{http://www.lix.polytechnique.fr/~catuscia/papers/Carlos/iclp07.pdf}}, Pages = {271--285}, Publisher = {Springer}, Series = {LNCS}, Title = {Declarative Diagnosis of Temporal Concurrent Constraint Programs}, Volume = {4670}, Year = 2007} @inproceedings{Chatzikokolakis:07:CONCUR, Author = {Konstantinos Chatzikokolakis and Catuscia Palamidessi}, Booktitle = {Proc. of CONCUR'07}, Date-Modified = {2010-05-17 06:23:23 +0200}, Pages = {42--58}, Publisher = {Springer}, Series = {LNCS}, Title = {Making Random Choices Invisible to the Scheduler}, Volume = {4703}, Year = 2007, Bdsk-Url-1 = {http://www.lix.polytechnique.fr/~catuscia/papers/Scheduler/report.pdf}} @inproceedings{Chatzikokolakis:07:CSF, Author = {Konstantinos Chatzikokolakis and Catuscia Palamidessi and Prakash Panangaden}, Booktitle = {CSF}, Date-Modified = {2008-12-30 05:07:47 +0100}, Pages = {341-354}, Publisher = {IEEE}, Title = {Probability of Error in Information-Hiding Protocols}, Year = 2007, Bdsk-Url-1 = {http://www.lix.polytechnique.fr/~catuscia/papers/ProbabilityError/full_original.pdf}} @inproceedings{Cacciagrano:06:EXPRESS, Author = {Diletta Cacciagrano and Flavio Corradini and Catuscia Palamidessi}, Booktitle = {Proc. of the 13th Int. Workshop on Expressiveness in Concurrency (EXPRESS'06)}, Editors = {Iain Phillips and Roberto Amadio}, Note = {\url{http://www.lix.polytechnique.fr/~catuscia/papers/Diletta/FairPi/express06.pdf}}, Pages = {3--26}, Publisher = {Elsevier}, Series = {ENTCS}, Title = {Fair $\Pi$}, Volume = {175 (3)}, Year = {2007}} @inproceedings{Chatzikokolakis:06:TGC, Author = {Konstantinos Chatzikokolakis and Catuscia Palamidessi and Prakash Panangaden}, Booktitle = {Proc. of TGC}, Date-Modified = {2007-12-23 19:18:49 +0100}, Note = {\url{http://www.lix.polytechnique.fr/~catuscia/papers/Anonymity/Channels/tgc.pdf}}, Pages = {281-300}, Publisher = {Springer}, Series = {LNCS}, Title = {Anonymity Protocols as Noisy Channels}, Volume = {4661}, Year = {2006}} @article{Deng:07:TCS, Author = {Yuxin Deng and Catuscia Palamidessi}, Date-Modified = {2008-12-28 16:55:03 +0100}, Journal = {TCS}, Note = {\url{http://www.lix.polytechnique.fr/~catuscia/papers/Prob_Axiom/tcs.pdf}}, Number = {1-2}, Pages = {92--114}, Title = {Axiomatizations for probabilistic finite-state behaviors}, Volume = {373}, Year = {2007}, Bdsk-Url-1 = {http://hal.inria.fr/inria-00200928/en/}} @article{Palamidessi:06:EATCS, Author = {C. Palamidessi and F. Valencia}, Journal = {Bulletin of the European Association for TCS}, Note = {Column: Programming Languages. \url{http://www.lix.polytechnique.fr/~catuscia/papers/Frank/EATCS_06/paper.pdf}}, Pages = {155--171}, Title = {Languages for Concurrency}, Volume = {90}, Year = {2006}} @inproceedings{Lopez:06:ICLP, Author = {Hugo A. L{\'o}pez and Catuscia Palamidessi and Jorge and Camilo Rueda and Frank D. Valencia}, Booktitle = {Proc. of the 22nd Int. Conf. on logic Programming, (ICLP)}, Date-Modified = {2007-12-26 04:06:43 +0100}, Pages = {449--450}, Publisher = {Springer}, Series = {LNCS}, Title = {A Declarative Framework for Security: Secure Concurrent Constraint Programming}, Volume = {4079}, Year = {2006}} @inproceedings{Palamidessi:06:LICS, Author = {Catuscia Palamidessi and Vijay A. Saraswat and Frank D. Valencia and Bj{\"o}rn Victor}, Booktitle = {Proc. of LICS}, Date-Modified = {2008-12-28 17:04:57 +0100}, Note = {\url{http://www.lix.polytechnique.fr/~catuscia/papers/Frank/LICS_06/main.pdf}}, Pages = {59--68}, Publisher = {IEEE}, Title = {On the Expressiveness of Linearity vs Persistence in the Asynchronous pi-calculus}, Year = 2006, Bdsk-Url-1 = {http://hal.inria.fr/inria-00201096/en/}} @article{Cacciagrano:06:TCS, Author = {Diletta Cacciagrano and Flavio Corradini and Catuscia Palamidessi}, Date-Modified = {2008-12-28 17:35:48 +0100}, Journal = {TCS}, Note = {\url{http://www.lix.polytechnique.fr/~catuscia/papers/Diletta/Must/report.pdf}}, Number = {3}, Pages = {218-235}, Title = {Separation of synchronous and asynchronous communication via testing}, Volume = {386}, Year = {2007}, Bdsk-Url-1 = {http://hal.inria.fr/inria-00200916/en/}} @article{Chatzikokolakis:06:TCS, Author = {Konstantinos Chatzikokolakis and Catuscia Palamidessi}, Date-Modified = {2008-12-28 16:57:29 +0100}, Journal = {TCS}, Note = {\url{http://www.lix.polytechnique.fr/~catuscia/papers/Anonymity/tcsPI.pdf}}, Number = {1-2}, Pages = {123--138}, Title = {Probable Innocence Revisited}, Volume = 367, Year = {2006}, Bdsk-Url-1 = {http://hal.inria.fr/inria-00201072/en/}} @inproceedings{Palamidessi:05:FMCO, Author = {Catuscia Palamidessi and Iain Phillips and Maria Grazia Vigliotti}, Booktitle = {Postproceedings of the 4th Int. Symposium on Formal Methods for Components and Objects (FMCO)}, Note = {\url{http://www.lix.polytechnique.fr/~catuscia/papers/2006/MariaGrazia/FMCO/fmco-06.pdf}}, Pages = {172--194}, Publisher = {Springer}, Series = {LNCS}, Title = {Expressiveness via Leader Election Problems}, Volume = {4111}, Year = {2005}} @inproceedings{Pradalier:06:QAPL, Author = {Sylvain Pradalier and Catuscia Palamidessi}, Booktitle = {Proc. of QAPL}, Note = {\url{http://www.lix.polytechnique.fr/~catuscia/papers/Sylvain/QAPL06/FinalBis.pdf}}, Pages = {119--136}, Publisher = {Elsevier}, Series = {ENTCS}, Title = {Expressiveness of probabilistic $\pi$-calculi}, Volume = {164 (3)}, Year = 2006} @inproceedings{Credi:07:CMSB, Author = {Alberto Credi and Marco Garavelli and Cosimo Laneve and Sylvain Pradalier and Serena Silvi and Gianluigi Zavattaro}, Booktitle = {Proc. of the Int. Conf. on Computational Methods in Systems Biology, (CMSB)}, Pages = {168--183}, Publisher = {Springer}, Series = {LNCS}, Title = {Modelization and Simulation of Nano Devices in {\tt nano}$\kappa$ Calculus}, Volume = {4695}, Year = {2007}} @inproceedings{palamidessi_et_al:DSP:2006:299, Author = {Catuscia Palamidessi and Mohit Bhargava}, Booktitle = {Foundations of Global Computing}, Note = {\url{drops.dagstuhl.de/opus/volltexte/2006/299}}, Number = {05081}, Publisher = {Int.es Begegnungs- und Forschungszentrum (IBFI), Schloss Dagstuhl, Germany}, Series = {Dagstuhl Seminar Proc.}, Title = {Probabilistic Anonymity}, Year = {2006}} @inproceedings{Deng:05:FOSSACS, Author = {Yuxin Deng and Catuscia Palamidessi}, Booktitle = {Proc. of FOSSACS'05}, Note = {\url{http://www.lix.polytechnique.fr/~catuscia/papers/Prob_Axiom/fossacs05.pdf}}, Pages = {110--124}, Publisher = {Springer}, Series = {LNCS}, Title = {Axiomatizations for probabilistic finite-state behaviors}, Volume = 3441, Year = {2005}} @article{Palamidessi:05:TCS, Author = {Catuscia Palamidessi and Oltea M. Herescu}, Date-Modified = {2008-12-28 17:01:48 +0100}, Journal = {TCS}, Note = {\url{http://www.lix.polytechnique.fr/~catuscia/papers/prob_enc/report.pdf}}, Number = {2-3}, Pages = {373-404}, Title = {A randomized encoding of the $\pi$-calculus with mixed choice}, Volume = 335, Year = {2005}, Bdsk-Url-1 = {http://hal.inria.fr/inria-00201105/en/}} @article{Chatzikokolakis:05:TCS, Author = {Konstantinos Chatzikokolakis and Catuscia Palamidessi}, Date-Modified = {2007-12-16 16:11:42 +0100}, Journal = {TCS}, Number = {3}, Pages = {512-527}, Title = {A Framework for Analyzing Probabilistic Protocols and its Application to the Partial Secrets Exchange}, Volume = {389}, Year = 2007} @inproceedings{Chatzikokolakis:05:TGC, Author = {Konstantinos Chatzikokolakis and Catuscia Palamidessi}, Booktitle = {Proc. of TGC}, Note = {\url{http://www.lix.polytechnique.fr/~catuscia/papers/PartialSecrets/tgc05.pdf}}, Pages = {146-162}, Publisher = {Springer}, Series = {LNCS}, Title = {A Framework for Analyzing Probabilistic Protocols and its Application to the Partial Secrets Exchange}, Volume = 3705, Year = {2005}} @inproceedings{Deng:05:QAPL, Author = {Yuxin Deng and Tom Chothia and Catuscia Palamidessi and Jun Pang}, Booktitle = {Proc. of QAPL}, Note = {\url{http://www.lix.polytechnique.fr/~catuscia/papers/Metrics/QAPL/gts.pdf}}, Number = {2}, Pages = {79--96}, Publisher = {Elsevier}, Series = {ENTCS}, Title = {Metrics for Action-labelled Quantitative Transition Systems}, Volume = {153}, Year = {2006}} @inproceedings{Chatzikokolakis:05:FAST, Author = {Konstantinos Chatzikokolakis and Catuscia Palamidessi}, Booktitle = {Third Int. Workshop on Formal Aspects in Security and Trust (FAST 2005), Revised Selected Papers}, Pages = {142-157}, Publisher = {Springer}, Series = {LNCS}, Title = {Probable Innocence Revisited}, Volume = {3866}, Year = {2006}} @inproceedings{Deng:05:SECCO, Author = {Yuxin Deng and Catuscia Palamidessi and Jun Pang}, Booktitle = {Proc. of the 3rd Int. Workshop on Security Issues in Concurrency (SecCo)}, Date-Modified = {2007-12-22 09:09:14 +0100}, Note = {\url{http://www.lix.polytechnique.fr/~catuscia/papers/Anonymity/report_wa.pdf}}, Pages = {55--76}, Publisher = {Elsevier}, Series = {ENTCS}, Title = {Weak Probabilistic Anonymity}, Volume = {180 (1)}, Year = {2007}} @inproceedings{Bhargava:05:CONCUR, Author = {Mohit Bhargava and Catuscia Palamidessi}, Booktitle = {Proc. of CONCUR}, Date-Modified = {2010-05-17 06:24:04 +0200}, Pages = {171--185}, Publisher = {Springer}, Series = {LNCS}, Title = {Probabilistic Anonymity}, Volume = 3653, Year = 2005, Bdsk-Url-1 = {http://www.lix.polytechnique.fr/~catuscia/papers/Anonymity/concur.pdf}} @inproceedings{Cacciagrano:05:EXPRESS, Author = {Diletta Cacciagrano and Flavio Corradini and Catuscia Palamidessi}, Booktitle = {Proc. of the 12th Int. Workshop on Expressiveness in Concurrency (EXPRESS 2005)}, Editors = {Jos Baeten and Iain Phillips}, Note = {\url{http://www.lix.polytechnique.fr/~catuscia/papers/Diletta/Must/report.pdf}}, Number = {3}, Pages = {95--108}, Publisher = {Elsevier}, Series = {ENTCS}, Title = {Separation of synchronous and asynchronous communication via testing}, Volume = {154}, Year = {2006}} @inproceedings{Palamidessi:05:MFPS, Author = {Catuscia Palamidessi}, Booktitle = {Proc. of the 21st Conf. on the Mathematical Foundations of Programming Semantics (MFPS XXI)}, Note = {\url{http://www.lix.polytechnique.fr/~catuscia/papers/Anonymity/MFPS/paper.pdf}}, Pages = {33--42}, Publisher = {Elsevier}, Series = {ENTCS}, Title = {Probabilistic and nondeterministic aspects of Anonymity}, Volume = {155}, Year = {2006}} @inproceedings{Palamidessi:05:BERTINORO, Author = {Catuscia Palamidessi}, Booktitle = {Proc. of the Workshop on ``Essays on Algebraic Process Calculi'' (APC 25)}, Editors = {Luca Aceto and Andrew D. Gordon}, Note = {\url{http://www.lix.polytechnique.fr/~catuscia/papers/Anonymity/Bertinoro/paper.pdf}}, Pages = {277-279}, Publisher = {Elsevier}, Series = {ENTCS}, Title = {Anonymity in probabilistic and nondeterministic systems}, Volume = {162}, Year = {2006}} @inproceedings{Ziegler:05:SOS, Author = {Axelle Ziegler and Dale Miller and Catuscia Palamidessi}, Booktitle = {Proc. of the 2nd Workshop on Structural Operational Semantics (SOS'05)}, Note = {\url{http://www.lix.polytechnique.fr/~catuscia/papers/Axelle/SOS_05/report.pdf}}, Number = {1}, Pages = {169--189}, Publisher = {Elsevier}, Series = {ENTCS}, Title = {A Congruence Format for Name-passing Calculi}, Volume = {156}, Year = {2006}} @proceedings{Caires:05:ICALP, Bibsource = {DBLP, http://dblp.uni-trier.de}, Booktitle = {ICALP}, Date-Modified = {2008-07-02 01:29:10 +0200}, Isbn = {3-540-27580-0}, Publisher = {Springer}, Series = {LNCS}, Title = {Automata, Languages and Programming, 32nd Int. Colloquium, ICALP 2005, Lisbon, Portugal, July 11-15, 2005, Proc.}, Volume = {3580}, Year = {2005}} @incollection{Deng:05:BookJW, Author = {Yuxin Deng and Catuscia Palamidessi and Jun Pang}, Booktitle = {Processes, Terms and Cycles: Steps on the Road to Infinity}, Date-Modified = {2009-01-02 02:46:39 +0100}, Note = {\url{http://www.lix.polytechnique.fr/~catuscia/papers/Yuxin/BookJW/par.pdf}}, Pages = {309-337}, Publisher = {Springer}, Series = {LNCS}, Title = {Compositional Reasoning for Probabilistic Finite-State Behaviors}, Volume = {3838}, Year = {2005}} @article{Palamidessi:05:EATCS, Author = {Catuscia Palamidessi and Frank D. Valencia}, Bibdate = {2005-11-14}, Date-Modified = {2010-01-09 05:21:19 +0100}, Journal = {Bulletin of the EATCS}, Note = {Column: Concurrency. \url{http://www.lix.polytechnique.fr/~catuscia/papers/Frank/EATCS_05/recrep.pdf}}, Pages = {105--125}, Title = {Recursion vs Replication in Process Calculi: Expressiveness}, Volume = {87}, Year = {2005}} @inproceedings{Chothia:05:NCUS, Author = {Tom Chothia and Konstantinos Chatzikokolakis}, Booktitle = {Proc. of the IFIP Int. Symposium on Network-Centric Ubiquitous Systems (NCUS 2005)}, Pages = {744--755}, Publisher = {Springer}, Series = {LNCS}, Title = {A Survey of Anonymous Peer-to-Peer File-Sharing}, Volume = {3823}, Year = {2005}} @article{Bartels:04:TCS, Author = {Falk Bartels and Ana Sokolova and Erik P. de Vink}, Bibdate = {2004-11-22}, Journal = {TCS}, Number = {1-2}, Pages = {3--22}, Title = {A hierarchy of probabilistic system types}, Volume = {327}, Year = {2004}} @article{Priami:95:CJ, Author = {Corrado Priami}, Journal = {The Computer Journal}, Number = {7}, Pages = {578-589}, Title = {Stochastic pi-Calculus.}, Volume = {38}, Year = {1995}} @misc{Pradalier:05:RS, Author = {Sylvain Pradalier}, Note = {Rapport de stage. Master Parisien de Recherche en Informatique. \url{http://mpri.master.univ-paris7.fr/attached-documents/stages-2005-rapports/rapport-2005-pradalier.pdf}}, Year = 2005} @unpublished{Phillips:05:TechRep, Author = {Andrews Phillips and Luca Cardelli}, Note = {Technical report}, Title = {A Correct Abstract Machine for the Stochastic Pi-calculus.}, Year = 2005} @inproceedings{Kwiatkowska:04:QEST, Author = {Marta Z. Kwiatkowska and Gethin Norman and David Parker}, Booktitle = {Proc. of the First Int. Conf. on Quantitative Evaluation of Systems (QEST) 2004}, Pages = {322--323}, Publisher = {IEEE}, Title = {{PRISM} 2.0: {A} Tool for Probabilistic Model Checking}, Year = {2004}} @inproceedings{Desharnais:02:LICS, Author = {Josee Desharnais and Radha Jagadeesan and Vineet Gupta and Prakash Panangaden}, Booktitle = {Proc. of LICS}, Pages = {413-422}, Publisher = {IEEE}, Title = {The Metric Analogue of Weak Bisimulation for Probabilistic Processes}, Year = {2002}} @inproceedings{Philippou:00:CONCUR, Author = {Anna Philippou and Insup Lee and Oleg Sokolsky}, Booktitle = {Proc. of CONCUR}, Pages = {334-349}, Publisher = {Springer}, Series = {LNCS}, Title = {Weak Bisimulation for Probabilistic Systems}, Volume = {1877}, Year = {2000}} @inproceedings{Bandini:01:ICALP, Author = {Emanuele Bandini and Roberto Segala}, Booktitle = {Proc. of ICALP}, Pages = {370-381}, Publisher = {Springer}, Series = {LNCS}, Title = {Axiomatizations for Probabilistic Bisimulation}, Volume = {2076}, Year = {2001}} @book{Puterman:94:BOOK, Author = {Martin L. Puterman}, Publisher = {John Wiley \& Sons, Inc.}, Title = {Markov Decision Processes--Discrete Stochastic Dynamic Programming}, Year = {1994}} @article{Halpern:92:AI, Author = {Joseph Y. Halpern and Ronald Fagin}, Journal = {Artificial Intelligence}, Location = {CMU Engineering \&{} Science Library}, Number = {3}, Pages = {275--317}, Title = {Two Views of Belief: Belief as Generalized Probability and Belief as Evidence}, Volume = {54}, Year = {1992}} @article{Shafer:82:JRSS, Author = {Glenn Shafer}, Journal = {Journal of the Royal Statistical Society, Series B}, Pages = {322--352}, Title = {Belief functions and parametric models (with commentary)}, Volume = {44}, Year = {1982}} @article{Walley:87:AS, Author = {Peter Walley}, Journal = {Annals of Statistics}, Number = {4}, Pages = {1439--1465}, Title = {Belief function representations of statistical evidence}, Volume = {18}, Year = {1987}} @inproceedings{Kyburg:83:RWP, Author = {Henry E. Kyburg Jr.}, Booktitle = {Recent Work in Phylosophy}, Editors = {T. Machan and K. Lucey}, Pages = {87-150}, Publisher = {Rowman \& Allanheld}, Title = {Recent work in Inductive Logic}, Year = {1983}} @inproceedings{Larsen:CONCUR:92, Author = {Kim G. Larsen and Arne Skou}, Booktitle = {Proc. of CONCUR}, Isbn = {ISBN 3-540-55822-5 and 0-387-55822-5}, Pages = {456--471}, Publisher = {Springer}, Series = {LNCS}, Title = {Compositional Verification of Probabilistic Processes}, Volume = {630}, Year = {1992}} @inproceedings{Kesdogan:98:IH, Author = {Dogan Kesdogan and Jan Egner and Roland B{\"u}schkes}, Booktitle = {Proc. of Information Hiding Workshop (IH 1998)}, Publisher = {Springer}, Series = {LNCS}, Title = {Stop-and-Go {MIX}es: Providing Probabilistic Anonymity in an Open System}, Volume = {1525}, Www_Important = {1}, Www_Section = {Anonymous communication}, Year = {1998}} @inproceedings{Kremer:05:ESOP, Author = {Kremer, Steve and Ryan, Mark D.}, Booktitle = {{P}rogramming {L}anguages and {S}ystems -- {P}roceedings of the 14th {E}uropean {S}ymposium on {P}rogramming ({ESOP}'05)}, Pages = {186-200}, Publisher = {Springer}, Series = {LNCS}, Title = {Analysis of an Electronic Voting Protocol in the Applied Pi-Calculus}, Volume = {3444}, Year = {2005}} @article{Abadi:04:TCS, Author = {Mart{\'\i}n Abadi and C{\'e}dric Fournet}, Journal = {TCS}, Number = {3}, Pages = {427--476}, Title = {Private Authentication}, Volume = {322}, Year = {2004}} @inproceedings{Gill:97:SSB, Author = {R.D. Gill and M. van der Laan and J. Robins}, Booktitle = {Proc. of the First Seattle Symposium in Biostatistics}, Pages = {255--294}, Publisher = {Springer}, Series = {Lecture Notes in Statistics}, Title = {Coarsening at Random: Characterizations, Conjectures and Counterexamples}, Year = {1997}, Bdsk-Url-1 = {citeseer.ist.psu.edu/gill96coarsening.html}} @article{Grunwald:03:JAIR, Author = {P. D. Grunwald and J. Y. Halpern}, Issn = {1076-9757}, Journal = {Journal of Artificial Intelligence Research}, Pages = {243--278}, Title = {Updating Probabilities}, Volume = {19}, Year = {2003}} @inproceedings{Dingledine:00:DIAU, Author = {Roger Dingledine and Michael J. Freedman and David Molnar}, Booktitle = {Designing Privacy Enhancing Technologies, Int. Workshop on Design Issues in Anonymity and Unobservability}, Pages = {67-95}, Publisher = {Springer}, Series = {LNCS}, Title = {The Free Haven Project: Distributed Anonymous Storage Service.}, Volume = {2009}, Year = {2000}} @inproceedings{Berthold:00:DIAU, Author = {Oliver Berthold and Hannes Federrath and Stefan K{\"o}psell}, Booktitle = {Designing Privacy Enhancing Technologies, Int. Workshop on Design Issues in Anonymity and Unobservability}, Pages = {115-129}, Publisher = {Springer}, Series = {LNCS}, Title = {Web MIXes: A System for Anonymous and Unobservable Internet Access.}, Volume = {2009}, Year = {2000}} @inproceedings{Clarke:00:DIAU, Author = {Ian Clarke and Oskar Sandberg and Brandon Wiley and Theodore W. Hong}, Booktitle = {Designing Privacy Enhancing Technologies, Int. Workshop on Design Issues in Anonymity and Unobservability}, Pages = {44-66}, Publisher = {Springer}, Series = {LNCS}, Title = {Freenet: A Distributed Anonymous Information Storage and Retrieval System.}, Volume = {2009}, Year = {2000}} @proceedings{DBLP:conf/diau/2000, Bibsource = {DBLP, http://dblp.uni-trier.de}, Booktitle = {Int. Workshop on Design Issues in Anonymity and Unobservability}, Isbn = {3-540-41724-9}, Publisher = {Springer}, Series = {LNCS}, Title = {Designing Privacy Enhancing Technologies, Int. Workshop on Design Issues in Anonymity and Unobservability, Berkeley, CA, USA, July 25-26, 2000, Proc.}, Volume = {2009}, Year = {2001}} @inproceedings{Syverson:97:SSP, Author = {P.F. Syverson and D.M. Goldschlag and M.G. Reed}, Booktitle = {S\&P}, Isbn = {0-8186-7828-3}, Pages = {44--54}, Title = {Anonymous Connections and Onion Routing}, Year = {1997}} @article{Reiter:98:TISS, Author = {Michael K. Reiter and Aviel D. Rubin}, Journal = {ACM Transactions on Information and System Security}, Number = {1}, Pages = {66--92}, Title = {Crowds: anonymity for {Web} transactions}, Volume = {1}, Year = {1998}} @article{Chaum:88:JC, Abstract = {Keeping confidential who sends which messages, in a world where any physical transmission can be traced to its origin, seems impossible. The solution presented here is based on passing messages round a ring of participants; it is unconditionally or cryptographically secure, depending on whether it is based on one-time-use keys or on public keys, respectively. It can be adapted to address efficiently a wide variety of practical considerations.}, Author = {David Chaum}, Journal = {Journal of Cryptology}, Pages = {65--75}, Title = {The Dining Cryptographers Problem: Unconditional Sender and Recipient Untraceability}, Volume = {1}, Year = {1988}} @article{Gray:98:DC, Author = {James W. Gray III and Paul F. Syverson}, Journal = {Distributed Computing}, Number = {2}, Pages = {73--90}, Title = {A Logical Approach to Multilevel Security of Probabilistic Systems}, Volume = {11}, Year = {1998}} @inproceedings{Syverson:99:FM, Author = {Paul F. Syverson and Stuart G. Stubblebine}, Booktitle = {World Congress on Formal Methods (1)}, Pages = {814-833}, Title = {Group Principals and the Formalization of Anonymity}, Year = {1999}} @article{Hughes:04:JCS, Author = {Dominic Hughes and Vitaly Shmatikov}, Journal = {Journal of Computer Security}, Number = 1, Pages = {3--36}, Title = {Information Hiding, Anonymity and Privacy: a Modular Approach}, Volume = 12, Year = 2004} @inproceedings{Halpern:03:CSF, Author = {Joseph Y. Halpern and Kevin R. O'Neill}, Booktitle = {Proc. of the 16th IEEE Computer Security Foundations Workshop}, Pages = {75--88}, Title = {Anonymity and information hiding in multiagent systems}, Year = {2003}, Bdsk-Url-1 = {citeseer.ist.psu.edu/halpern03anonymity.html}} @article{Halpern:05:JCS, Author = {Joseph Y. Halpern and Kevin R. O'Neill}, Journal = {Journal of Computer Security}, Number = {3}, Pages = {483--512}, Title = {Anonymity and information hiding in multiagent systems}, Volume = {13}, Year = {2005}} @article{Halpern:05:JLMCS, Author = {Joseph Y. Halpern and Riccardo Pucella}, Journal = {Journal of Logical Methods in Computer Science}, Number = {1}, Title = {Probabilistic algorithmic knowledge}, Volume = {3}, Year = {2005}} @book{Eilenberg:74:BOOK, Author = {S. Eilenberg}, Publisher = {Academic Press}, Title = {Automata, Languages, and Machines}, Year = {1974}} @article{Mohri:03:IJFCS, Author = {Mehryar Mohri}, Journal = {Int. Journal of Foundations of Computer Science}, Number = {6}, Pages = {957-982}, Title = {Edit-Distance Of Weighted Automata: General Definitions And Algorithms}, Volume = {14}, Year = {2003}} @article{vanGlabbeek:95:IC, Author = {Rob J. van Glabbeek and Scott A. Smolka and Bernhard Steffen}, Journal = {Inf. and Comp.}, Number = {1}, Pages = {59--80}, Title = {Reactive, generative, and stratified models of probabilistic processes}, Volume = {121}, Year = {1995}} @inproceedings{Comon:01:ICALP, Author = {H. Comon and V. Cortier and J. Mitchell}, Booktitle = {Proc. of ICALP}, Isbn = {3-540-42287-0}, Optaddress = {Crete, Greece}, Optbooktitle = {28th Int. Colloquium on Automata, Languages and Programming (ICALP'01)}, Optmonth = jul, Optpublisher = sv, Series = {LNCS}, Title = {Tree Automata with One Memory, Set Constraints, and Ping-Pong Protocols}, Volume = 2076, Year = 2001} @inproceedings{Goubault:00:IPDPS, Author = {Jean Goubault-Larrecq}, Booktitle = {Proc. of the 15 IPDPS 2000 Workshops}, Pages = {977--984}, Publisher = {Springer}, Series = {LNCS}, Title = {A method for automatic cryptographic protocol verification}, Volume = 1800, Year = 2000} @inproceedings{Monniaux:99:SAS, Author = {David Monniaux}, Booktitle = {Static Analysis Symposium}, Optbooktitle = {Static Analysis Symposium (SAS'99)}, Optmonth = sep, Optpublisher = sv, Pages = {149--163}, Series = {LNCS}, Title = {Abstracting {C}ryptographic {P}rotocols with {T}ree {A}utomata}, Volume = 1694, Year = 1999} @inproceedings{Denker:98:WFMSP, Author = {Grit Denker and Jose Meseguer and Catherin Talcott}, Booktitle = {Proc. of Workshop on Formal Methods and Security Protocols}, Title = {{Protocol specification and analysis in Maude}}, Year = 1998} @inproceedings{Cervesato:99:CSFW, Author = {Iliano Cervesato and Nancy A. Durgin and Patrick D. Lincoln and John C. Mitchell and Andre Scedrov}, Booktitle = {Proc. of the 12th IEEE Computer Security Foundations Workshop --- CSFW'99}, Pages = {55--69}, Publisher = {IEEE}, Title = {A Meta-Notation for Protocol Analysis}, Year = 1999} @article{Millen:02:JTIT, Author = {Jonathan Millen and Grit Denker}, Journal = {Journal of Telecommunications and Information Technology}, Title = {{CAPSL and MuCAPSL}}, Year = 2002} @inproceedings{Miller:03:FCS, Author = {Dale Miller}, Booktitle = {Proc. of FCS'03: Foundations of Computer Security}, Dvi = {http://www.lix.polytechnique.fr/Labo/Dale.Miller/papers/fcs03.dvi}, Lix-Categorie = {CIA}, Lix-Equipe = {Parsifal}, Pages = {3-14}, Ps = {http://www.lix.polytechnique.fr/Labo/Dale.Miller/papers/fcs03.ps}, Title = {Encryption as an Abstract Data-Type: An extended abstract}, Year = {2003}} @inproceedings{Compton:99:ICALP, Author = {Kevin Compton and Scott Dexter}, Booktitle = {Proc. of the 26th Int. Colloquium on Automata, Languages, and Programming}, Pages = {25--39}, Publisher = {Springer}, Series = {LNCS}, Title = {Proof Techniques for Cryptographic Protocols}, Volume = 1644, Year = 1999} @inproceedings{Amadio:00:CONCUR, Annote = {A generalization to public keys and an implementation of this work in collaboration with Vincent Vanackere has been presented at the Workshop on Issues in the theory of security (Wits 00), Geneve, July 2000.}, Author = {Roberto M. Amadio and Denis Lugiez}, Booktitle = {Proc. of CONCUR 00}, Date-Modified = {2007-11-25 17:45:35 +0100}, Note = {INRIA Research Report 3915, march 2000}, Publisher = {Springer}, Series = {LNCS}, Title = {On the reachability problem in cryptographic protocols}, Volume = 1877, Year = 2000, Bdsk-Url-1 = {http://hal.inria.fr/inria-00072738}} @inproceedings{Schneider:96:SSP, Author = {S. Schneider}, Booktitle = {S\&P}, Title = {{Security properties and CSP}}, Year = 1996} @inproceedings{Roscoe:95:CSFW, Author = {A. W. Roscoe}, Booktitle = {Proc. of the 8th IEEE Computer Security Foundations Workshop}, Pages = {98--107}, Publisher = {IEEE}, Title = {Modelling and Verifying Key-Exchange Protocols Using {CSP} and {FDR}}, Year = 1995} @inproceedings{Lowe:97:CSFW, Author = {Gavin Lowe}, Booktitle = {Proc. of 10th IEEE Computer Security Foundations Workshop}, Note = {Also in Journal of Computer Security, Volume 6, pages 53-84, 1998}, Title = {Casper: A Compiler for the Analysis of Security Protocols}, Year = 1997} @inproceedings{Cervesato:00:CSFW, Author = {Iliano Cervesato and Nancy A. Durgin and Patrick D. Lincoln and John C. Mitchell and Andre Scedrov}, Booktitle = {13th IEEE Computer Security Foundations Workshop --- CSFW'00}, Pages = {35--51}, Publisher = {IEEE}, Title = {Relating Strands and Multiset Rewriting for Security Protocol Analysis}, Year = 2000} @inproceedings{Fabrega:98:SSP, Author = {F. Javier Thayer F{\'a}brega and Jonathan C. Herzog and Joshua D. Guttman}, Booktitle = {S\&P}, Pages = {160--171}, Publisher = {IEEE}, Title = {Strand spaces: Why is a security protocol correct?}, Year = 1998} @article{Walker:90:IC, Author = {D.J. Walker}, Journal = {Information and {C}omputation}, Number = 2, Pages = {202--241}, Title = {Bisimulation and divergence}, Volume = 85, Year = 1990} @article{Mitchell:93:SCP, Author = {John C. Mitchell}, Bibdate = {Sun Oct 10 09:12:09 MDT 1999}, Coden = {SCPGD4}, Issn = {0167-6423}, Journal = {Science of Computer Programming}, Mrclass = {68N15}, Mrnumber = {94i:68035}, Note = {Selected papers of the Conf. on Theoretical Aspects of Computer Software (TACS '91) (Sendai, 1991)}, Number = {2}, Pages = {141--163}, Title = {On Abstraction and the Expressive Power of Programming Languages}, Volume = {21}, Year = {1993}} @article{Bernardo:98:TUTORIAL, Author = {Marco Bernardo and Roberto Gorrieri}, Journal = {TCS}, Number = {1--2}, Pages = {1--54}, Title = {A tutorial on {EMPA}: {A} theory of concurrent processes with nondeterminism, priorities, probabilities and time}, Volume = {202}, Year = {1998}} @inproceedings{Phillips:2001:CONCUR, Author = {Iain Phillips}, Bibdate = {Sat Feb 2 13:05:57 MST 2002}, Booktitle = {Proc. of CONCUR}, Coden = {LNCSD9}, Issn = {0302-9743}, Pages = {305--320}, Publisher = {LNCS, Springer}, Title = {{CCS} with Priority Guards}, Volume = {2154}, Year = {2001}} @book{Baeten:90:BOOK, Author = {{J.C.M.} Baeten and {W.P.} Weijland}, Publisher = {CUP}, Series = {Cambridge tracts in theoretical computer science}, Title = {{Procesalgebra}}, Volume = {18}, Year = {1990}} @article{DFP:04:DISTCOMP, Author = {M. Duflot and L. Fribourg and C. Picaronny}, Journal = {Distributed Computing}, Number = {17}, Pages = {65--76}, Publisher = {Springer}, Title = {Randomized Dining Philosophers Without Fairness Assumption}, Volume = {1}, Year = {2004}} @article{Reiter:99:CommACM, Author = {M. K. Reiter and A. D. Rubin}, Journal = {Communications of the ACM (USA)}, Number = {2}, Pages = {32--38}, Title = {Anonymous web transactions with Crowds}, Volume = {42}, Year = {1999}} @article{Ben-Or:90:FPS, Author = {Michael {Ben-Or} and Oded Goldreich and Silvio Micali and Ronald L. Rivest}, Journal = {IEEE Transactions on Information Theory}, Number = {1}, Pages = {40--46}, Title = {A Fair Protocol for Signing Contracts}, Volume = {36}, Year = {1990}} @book{Sangiorgi:01:BOOK, Author = {Davide Sangiorgi and David Walker}, Publisher = {CUP}, Title = {The $\pi$-calculus: a Theory of Mobile Processes}, Year = {2001}} @incollection{Milner:93:BOOK, Author = {R. Milner}, Booktitle = {Logic and Algebra of Specification}, Pages = {203--246}, Publisher = {Springer}, Title = {The polyadic pi-calculus: a tutorial}, Year = {1993}} @misc{Pugliese:97:PERS, Author = {Rosario Pugliese}, Note = {Personal communication}, Year = 1997} @article{Needham:78:COMMACM, Author = {Roger Needham and Michael Schroeder}, Journal = {Communications of the ACM}, Number = 12, Pages = {993--999}, Title = {Using encryption for authentication in large networks of computers}, Volume = 21, Year = 1978} @inproceedings{Lincoln:98:CCCS, Added-At = {Fri Jul 23 10:15:45 1999}, Added-By = {sti}, Author = {P. Lincoln and J. Mitchell and M. Mitchell and A. Scedrov}, Booktitle = {Proc. of CCS}, Pages = {112--121}, Publisher = {ACM Press}, Title = {A probabilistic poly-time framework for protocol analysis}, Year = {1998}} @inproceedings{Lowe:96:TACAS, Added-At = {Mon Sep 4 11:02:09 2000}, Added-By = {sti}, Annote = {Attack with result Alice believing having authenticated Eve whereas Bob thinks to have authenitcated Alice.}, Author = {Gavin Lowe}, Booktitle = {Proc. of TACAS}, Pages = {147--166}, Publisher = {Springer}, Series = {LNCS}, Title = {Breaking and fixing the {N}eedham-{S}chroeder public-key protocol using {FDR}}, Volume = {1055}, Year = {1996}} @inproceedings{Gabbay:99:LICS, Author = {Murdoch Gabbay and Andrew Pitts}, Booktitle = {Proc. of LICS}, Keywords = {misc}, Pages = {214--224}, Publisher = {IEEE}, Title = {A New Approach to Abstract Syntax Involving Binders}, Year = {1999}} @article{Abadi:99:IC, Author = {Mart{\'\i}n Abadi and Andrew D. Gordon}, Journal = {Inf. and Comp.}, Number = {1}, Pages = {1--70}, Refkey = {C2015}, Title = {A Calculus for Cryptographic Protocols: The Spi Calculus}, Volume = {148}, Year = {1999}} @inproceedings{Saraswat:91:POPL, Author = {Vijay A. Saraswat and Martin Rinard and Prakash Panangaden}, Booktitle = {Proc. of POPL}, Pages = {333--352}, Publisher = {ACM Press}, Title = {Semantic foundations of concurrent constraint programming}, Year = {1991}} @phdthesis{Saraswat:89:PhDThesis, Author = {Vijay A. Saraswat}, Date-Modified = {2008-12-28 14:18:26 +0100}, Note = {In ACM distinguished dissertation series. The MIT Press, 1993}, School = {Carnegie-Mellon University}, Title = {Concurrent Programming Languages}, Year = {1989}} @incollection{Roscoe:94:HOARE, Author = {A. W. Roscoe}, Booktitle = {A classical mind: essays in honour of C. A. R. Hoare}, Isbn = {0-13-294844-3}, Pages = {353--378}, Publisher = {Prentice Hall Int. (UK) Ltd.}, Title = {{Model-checking CSP}}, Year = {1994}} @inproceedings{Schneider:96:ESORICS, Author = {Steve Schneider and Abraham Sidiropoulos}, Booktitle = {Proc. of ESORICS}, Pages = {198-218}, Publisher = {Springer}, Series = {LNCS}, Title = {{CSP} and Anonymity}, Volume = {1146}, Year = {1996}} @book{Ryan:01:BOOK, Author = {Peter Y. Ryan and Steve Schneider}, Publisher = {Addison-Wesley}, Title = {Modelling and Analysis of Security Protocols}, Year = {2001}} @inproceedings{Palamidessi:01:CP, Author = {Catuscia Palamidessi and Frank D. Valencia}, Booktitle = {Proc. of the 7th Int. Conf. on Principles and Practice of Constraint Programming}, Date-Modified = {2010-01-09 05:21:39 +0100}, Note = {\url{http://www.lix.polytechnique.fr/~catuscia/papers/Ntcc/final.ps}}, Pages = {302--316}, Publisher = {Springer}, Series = {LNCS}, Title = {A Temporal Concurrent Constraint Programming Calculus}, Volume = {2239}, Year = {2001}} @inproceedings{deBoer:91:CONCUR, Author = {Frank S. {de Boer} and Catuscia Palamidessi}, Pages = {127--141}, Publisher = {Springer}, Series = {LNCS}, Title = {Embedding as a Tool for Language Comparison: On the {CSP} Hierarchy}, Volume = {527}, Year = {1991}} @article{deBoer:97:IC, Author = {Frank S. de Boer and Alessandra Di Pierro and Catuscia Palamidessi}, Journal = {Journal of Logic and Computation}, Number = {1}, Pages = {1--38}, Title = {An Algebraic Perspective of Constraint Logic Programming}, Volume = {7}, Year = {1997}} @article{deBoer:95:TCS, Author = {Frank S. de Boer and Alessandra Di Pierro and Catuscia Palamidessi}, Journal = {TCS}, Number = {1}, Pages = {37--78}, Title = {Nondeterminism and infinite computations in constraint programming}, Volume = {151}, Year = {1995}} @misc{Pugliese:97, Author = {Rosario Pugliese}, Note = {Personal Communication}, Year = 1997} @article{Chandy:84:TOPLAS, Abstract = {The problem of resolving conflicts between processes in distributed systems is of practical importance. A conflict between a set of processes must be resolved in favor of some (usually one) process and against the others: a favored process must have some property that distinguishes it from others. To guarantee fairness, the distinguishing property must be such that the process selected for favorable treatment is not always the same. A distributed implementation of an acyclic precedence graph, in which the depth of a process (the longest chain of predecessors) is a distinguishing property, is presented. A simple conflict resolution rule coupled with the acyclic graph ensures fair resolution of all conflicts. To make the problem concrete, two paradigms are presented: the well-known distributed dining philosophers problem and a generalization of it, the distributed drinking philosophers problem.}, Acknowledgement = ack-pb, Author = {K. M. Chandy and Jayadev Misra}, Bibdate = {Thu Feb 7 12:01:54 1985}, Coden = {ATPSDT}, Issn = {0164-0925}, Journal = {ACM Transactions on Programming Languages and Systems}, Keywords = {Asymmetry; dining philosophers problem}, Number = {4}, Pages = {632--646}, Title = {The Drinking Philosophers Problem}, Volume = {6}, Year = {1984}} @book{Chandy:88:Book, Author = {K. Mani Chandy and Jayadev Misra}, Publisher = {Addison-Wesley}, Title = {Parallel Program Design : a Foundation}, Year = {1988}} @article{Reif84a, Author = {John H. Reif and Paul G. Spirakis}, Journal = {ACM Transactions on Programming Languages and Systems}, Number = {2}, Pages = {215--238}, Title = {Real-Time Synchronization of Interprocess Communications}, Volume = {6}, Year = {1984}} @article{Joung:98:SIF, Author = {Yuh-Jzer Joung and Scott A. Smolka}, Journal = {IEEE Transactions on Parallel and Distributed Systems}, Number = {2}, Pages = {137--149}, Title = {Strong Interaction Fairness Via Randomization}, Volume = {9}, Year = {1998}} @article{Joung:00:TCS, Author = {Yuh-Jzer Joung}, Journal = {TCS}, Number = {1--2}, Pages = {307--338}, Title = {Two decentralized algorithms for strong interaction fairness for systems with unbounded speed variability}, Volume = {243}, Year = {2000}} @article{Knabe:93:CAI, Author = {F. Knabe}, Journal = {Computers and Artificial Intelligence}, Number = {5}, Pages = {475--490}, Title = {A Distributed Protocol for Channel-Based Communications with Choice}, Volume = {12}, Year = {1993}} @inproceedings{Parrow:92:CONCUR, Author = {Joachim Parrow and Peter Sjodin}, Booktitle = {Proc. of CONCUR}, Pages = {518--533}, Publisher = {LNCS, Springer}, Title = {Multiway Synchronization Verified with Coupled Simulation}, Volume = {630}, Year = {1992}} @article{Tsay:94:FTA, Author = {Yih-Kuen Tsay and Rajive L. Bagrodia}, Journal = {IEEE Transactions on Parallel and Distributed Systems}, Number = {7}, Pages = {737--748}, Title = {Fault-tolerant algorithms for fair interprocess synchronization}, Volume = {5}, Year = {1994}} @article{Boreale:98:TCS, Acknowledgement = ack-nhfb, Author = {M. Boreale}, Bibdate = {Wed May 27 07:21:35 MDT 1998}, Classification = {C4210 (Formal logic); C4240P (Parallel programming and algorithm theory)}, Coden = {TCSCDI}, Conflocation = {Pisa, Italy; 26-29 Aug. 1996}, Conftitle = {CONCUR '96: Concurrency Theory. 7th Int. Conf.}, Corpsource = {Dipt. di Sci. dell'Inf., Rome Univ., Italy}, Day = {30}, Issn = {0304-3975}, Journal = {TCS}, Keywords = {barbed-equivalent; calculus of communicating systems; CCS; equivalence classes; expressiveness; internal mobility; name-passing calculi; pi-calculus; process algebra}, Number = {2}, Pages = {205--226}, Pubcountry = {Netherlands}, Title = {On the expressiveness of internal mobility in name-passing calculi}, Treatment = {T Theoretical or Mathematical}, Volume = {195}, Year = {1998}} @inproceedings{Boreale:96:CONCUR, Author = {Michele Boreale}, Booktitle = {Proc. of CONCUR}, Isbn = {ISBN 3-540-61604-7}, Pages = {163--178}, Publisher = {Springer}, Series = {LNCS}, Title = {On the Expressiveness of Internal Mobility in Name-Passing Calculi}, Volume = {1119}, Year = {1996}} @inproceedings{Parrow:1992:CONCUR, Author = {Joachim Parrow and Peter Sj{\"o}din}, Booktitle = {Proc. of CONCUR}, Isbn = {ISBN 3-540-55822-5 and 0-387-55822-5}, Pages = {518--533}, Publisher = {Springer}, Series = {LNCS}, Title = {Multiway Synchronization Verified with Coupled Simulation}, Volume = {630}, Year = {1992}} @book{Milner:89:BOOK, Author = {R. Milner}, Publisher = {Prentice Hall}, Series = {Series in Comp. Sci.}, Title = {Communication and Concurrency}, Year = {1989}} @inproceedings{He:1990:IFIP, Author = {Jifeng He and M. B. Josephs and C. A. R. Hoare}, Booktitle = {Programming Concepts and Methods, Proc.\null{} of the {IFIP} {WG} 2.2/2.3, Working Conf.\null{} on Programming Concepts and Methods}, Pages = {459--478}, Publisher = {North-Holland}, Title = {A Theory of Synchrony and Asynchrony}, Year = {1990}} @inproceedings{Francez:80:FOCS, Author = {N. Francez and M. Rodeh}, Booktitle = {Proc. 21st Ann. IEEE Symp. on Foundations of Computer Science}, Pages = {373--379}, Title = {A Distributed Abstract Data Type Implemented by a Probabilistic Communication Scheme}, Year = {1980}} @article{Bouge:1988:AI, Acknowledgement = ack-nhfb, Author = {Luc Boug{\'e}}, Bibdate = {Sat Oct 9 09:56:22 MDT 1999}, Coden = {AINFA2}, Issn = {0001-5903 (print), 1432-0525 (electronic)}, Journal = {Acta Informatica}, Mrclass = {68Q10}, Mrnumber = {89a:68060}, Number = {2}, Pages = {179--201}, Title = {On the Existence of Symmetric Algorithms to Find Leaders in Networks of Communicating Sequential Processes}, Volume = {25}, Year = {1988}} @inproceedings{Bergstra:85:LNCS, Author = {J. A. Bergstra and J. W. Klop and J. V. Tucker}, Booktitle = {Proc. of the Seminar on Concurrency}, Pages = {76--95}, Publisher = {Springer}, Series = {LNCS}, Title = {Process Algebra with Asynchronous Communication Mechanisms}, Volume = {197}, Year = {1984}} @article{NestmannPierce:00:IC, Author = {Uwe Nestmann and Benjamin C. Pierce}, Journal = {Journal of Inf. and Comp.}, Pages = {1--59}, Title = {Decoding Choice Encodings}, Volume = 163, Year = 2000} @article{Nestmann:00:IC, Author = {Uwe Nestmann}, Journal = {Journal of Inf. and Comp.}, Pages = {287--319}, Title = {What Is a `Good' Encoding of Guarded Choice?}, Volume = {156}, Year = {2000}} @book{Lynch:96:BOOK, Author = {Nancy Lynch}, Keywords = {book, text, asynchronous/synchronous network models, ring, consensus, failures, Byzantine, shared memory, mutex (mutual exclusion), resource allocation, atomic objects, logical time, partial synchrony,}, Publisher = {Morgan Kaufmann}, Title = {Distributed Algorithms}, Year = {1996}, Bdsk-Url-1 = {theory.lcs.mit.edu/tds/distalgs.html}} @article{Dijkstra:71:AI, Abstract = {One of the primary functions of an operating system is to rebuild a machine that must be regarded as non-deterministic (on account of cycle stealing and interrupts) into a more or less deterministic automaton. Taming the degree of indeterminacy in steps will lead to a layered operating system. A bottom layer will be discussed and so will the adequacy of the interface it presents. An analysis of the requirements of the correctness proofs will give us an insight into the logical issues at hand. A `director-secretary' relationship will be introduced to reflect a possible discipline in the use of sequencing primitives.}, Author = {Edsger W. Dijkstra}, Bibdate = {Sun Jan 15 17:52:42 1984}, Coden = {AINFA2}, Issn = {0001-5903 (print), 1432-0525 (electronic)}, Journal = {Acta Informatica}, Keywords = {Deadlocks; operating systems synchronization communication; Semaphore}, Note = {Reprinted in {\em Operating Systems Techniques\/}, C.A.R. Hoare and R.H. Perrot, Eds., Academic Press, 1972, pp. 72--93. This paper introduces the classical synchronization problem of Dining Philosophers.}, Number = {2}, Pages = {115--138}, Title = {Hierarchical Ordering of Sequential Processes}, Volume = {1}, Year = {1971}} @inproceedings{Lynch:94:PODC, Author = {Nancy Lynch and Isaac Saias and Roberto Segala}, Booktitle = {Proc. of DISC}, Isbn = {089791-654-9}, Pages = {314--323}, Publisher = {ACM Press}, Title = {Proving Time Bounds for Randomized Distributed Algorithms}, Year = {1994}} @article{Aceto:94:IC, Author = {Luca Aceto and Bard Bloom and Frits Vaandrager}, Journal = {Inf. and Comp.}, Number = {1}, Pages = {1--52}, Title = {Turning {SOS} Rules into Equations}, Volume = {111}, Year = {1994}} @article{Groote:92:IC, Author = {Jan Friso Groote and Frits Vaandrager}, Journal = {Inf. and Comp.}, Number = {2}, Pages = {202--260}, Title = {Structured Operational Semantics and Bisimulation as a Congruence}, Volume = {100}, Year = {1992}} @article{Bloom:95:JACM, Author = {Bard Bloom and Sorin Istrail and Albert R. Meyer}, Journal = {Journal of the ACM}, Number = {1}, Pages = {232--268}, Title = {Bisimulation Can't Be Traced}, Volume = {42}, Year = {1995}} @inproceedings{Bernstein:98:LICS, Author = {Karen L. Bernstein}, Booktitle = {Proc. of LICS}, Pages = {153--164}, Title = {A Congruence Theorem for Structured Operational Semantics of Higher-Order Languages}, Year = {1998}} @article{deSimone:85:TCS, Author = {R. {de Simone}}, Journal = {TCS}, Number = {3}, Pages = {245--267}, Title = {Higher-level synchronising devices in {MEIJE-SCCS}}, Volume = {37}, Year = {1985}} @article{Bodei:98:TCS, Author = {Chiara Bodei and Pierpaolo Degano and Corrado Priami}, Date-Modified = {2008-12-24 15:42:55 +0100}, Journal = {TCS}, Notes = {1998}, Number = {2}, Pages = {155-184}, Title = {Names of the $\pi$-Calculus Agents Handled Locally}, Volume = {253}, Year = {2001}} @article{VanRoy:97:TOPLAS, Author = {Peter {Van Roy} and Seif Haridi and Per Brand and Gert Smolka and Michael Mehl and Ralf Scheidhauer}, Journal = {ACM Transactions on Programming Languages and Systems}, Number = 5, Pages = {804--851}, Title = {{Mobile Objects in Distributed Oz}}, Volume = 19, Year = 1997} @article{Rety:98:FI, Author = {Jean-Hugues R\'ety}, Journal = {Fundamenta Informaticae}, Number = 3, Pages = {323--346}, Title = {Distributed Concurrent Constraint Programming}, Volume = 34, Year = 1998} @inproceedings{Yi:92:IFIP, Author = {Wang Yi and Kim G. Larsen}, Booktitle = {Proc. of the 12th IFIP Int. Symposium on Protocol Specification, Testing and Verification}, Publisher = {North Holland}, Title = {Testing Probabilistic and Nondeterministic Processes}, Year = 1992} @inproceedings{Cleaveland:92:ICALP, Author = {Rance Cleaveland and Scott A. Smolka and Amy Zwarico}, Booktitle = {Proc. of the 19th Int. Colloquuium on Automata, Languages and Programming}, Pages = {708--719}, Publisher = {Springer}, Series = {LNCS}, Title = {Testing Preorders for Probabilistic Processes}, Volume = 623, Year = 1992} @article{Rabin:63:IC, Author = {Michael O. Rabin}, Journal = {Information and Control}, Number = 3, Pages = {230--245}, Title = {Probabilistic Automata}, Volume = 6, Year = 1963} @inproceedings{Vardi:85:FOCS, Author = {Moshe Y. Vardi}, Booktitle = {Proc. of the 26th Annual Symposium on Foundations of Computer Science}, Organization = {IEEE Computer Society Press}, Pages = {327--338}, Title = {Automatic Verification of Probabilistic Concurrent Finite-State Programs}, Year = 1985} @inproceedings{Segala:96:CONCUR, Author = {Roberto Segala}, Booktitle = {Proc. of CONCUR}, Pages = {299--314}, Publisher = {Springer}, Series = {LNCS}, Title = {Testing Probabilistic Automata}, Volume = 1119, Year = 1996} @incollection{Jonsson:2001:HANDBOOK, Author = {Bengt Jonsson and Kim G. Larsen and Wang Yi}, Booktitle = {Handbook of Process Algebra}, Chapter = {11}, Isbn = {0-444-82830-3}, Pages = {685--710}, Publisher = {Elsevier}, Title = {Probabilistic Extensions of Process Algebras}, Year = {2001}} @inproceedings{Jonsson:95:LICS, Author = {Bengt Jonsson and Wang Yi}, Booktitle = {Proc. of LICS}, Organization = {IEEE Computer Society Press}, Pages = {431--441}, Title = {Compositional Testing Preorders for Probabilistic Processes}, Year = 1995} @phdthesis{Segala:95:PhD, Author = {Roberto Segala}, Date-Modified = {2010-01-04 10:50:23 +0100}, Note = {Tech. Rep. MIT/LCS/TR-676}, Title = {Modeling and Verification of Randomized Distributed Real-Time Systems}, Year = {1995}} @phdthesis{Herescu:02:PhD, Author = {Oltea Mihaela Herescu}, Note = {\url{http://www.cse.psu.edu/~herescu/thesis.ps}}, School = {Department of Computer Science and Engineering, The Pennsylvania State University}, Title = {The Probabilistic Asynchronous $\pi$-calculus}, Year = {2002}} @inproceedings{Nestmann:98:EXPRESS, Author = {Uwe Nestmann}, Booktitle = {{EXPRESS} '98: Expressiveness in Concurrency}, Publisher = {Elsevier}, Series = {ENTCS}, Title = {On the Expressive Power of Joint Input}, Volume = {16.2}, Year = {1998}} @inproceedings{Palamidessi:97:JFPLC, Author = {Catuscia Palamidessi}, Booktitle = {Proc. of the JFPLC-UNIF '97}, Note = {Invited talk.}, Pages = {11--20}, Title = {Constraint Programming for Concurrent and Distributed Computing}, Year = 1997} @inproceedings{Best:97:COORDINATION, Author = {Eike Best and Frank S. de Boer and Catuscia Palamidessi}, Booktitle = {Proc. of Coordination 97}, Pages = {256--273}, Publisher = {Springer}, Series = {LNCS}, Title = {Partial Order and SOS Semantics for Linear Constraint Programs}, Volume = 1282, Year = 1997} @inproceedings{Best:96:CONCUR, Author = {Eike Best and Catuscia Palamidessi}, Booktitle = {Proc. of CONCUR 96}, Pages = {498--513}, Publisher = {Springer}, Series = {LNCS}, Title = {Linear Constraint Systems as High-level Nets}, Volume = 1119, Year = 1996} @inproceedings{deBoer:94:POPL, Author = {F. S. de Boer and M. Gabbrielli and E. Marchiori and C. Palamidessi}, Booktitle = {Proc. of POPL}, Pages = {98--108}, Publisher = {ACM}, Title = {Proving concurrent constraint programs correct}, Year = 1994} @article{deBoer:97:TOPLAS, Author = {F. S. de Boer and M. Gabbrielli and E. Marchiori and C. Palamidessi}, Journal = {ACM Transactions on Programming Languages and Systems}, Number = 5, Pages = {685--725}, Title = {Proving concurrent constraint programs correct}, Volume = 19, Year = 1997} @article{Falaschi:97:IC, Author = {Moreno Falaschi and Maurizio Gabbrielli and Kim Marriott and Catuscia Palamidessi}, Journal = {Information and {C}omputation}, Number = 1, Pages = {41-67}, Title = {{C}onstraint {L}ogic {P}rogramming with {D}ynamic {S}cheduling: {A} {S}emantics {B}ased on {C}losure {O}perators}, Volume = 137, Year = 1997} @inproceedings{Falaschi:93:LICS, Author = {Moreno Falaschi and Maurizio Gabbrielli and Kim Marriott and Catuscia Palamidessi}, Booktitle = {Proc. of LICS}, Pages = {210-221}, Publisher = {IEEE}, Title = {Compositional Analysis for Concurrent Constraint Programming}, Year = {1993}} @article{Falaschi:97:TCS, Author = {M. Falaschi and M. Gabbrielli and K. Marriott and C. Palamidessi}, Journal = {TCS}, Number = {2}, Pages = {281--315}, Title = {Confluence in Concurrent Constraint Programming}, Volume = {183}, Year = {1997}} @article{deBoer:94:IC, Author = {F.S. de Boer and C. Palamidessi}, Journal = {Inf. and Comp.}, Number = 1, Pages = {128--157}, Title = {{Embedding as a Tool for Language Comparison}}, Volume = 108, Year = 1994} @proceedings{Palamidessi:IC, Date-Modified = {2008-12-24 10:20:13 +0100}, Series = {Inf. and Comp.}, Title = {Special Issue dedicated to Express'97}, Year = {2000}} @proceedings{Palamidessi:97:EXPRESS, Publisher = {Elsevier}, Series = {ENTCS}, Title = {Proc. of EXPRESS'97}, Volume = 7, Year = 1997, Bdsk-Url-1 = {http://www.elsevier.nl/locate/entcs/volume7.html}} @article{Bergstra:84:IC, Author = {J.A. Bergstra and J.W. Klop}, Journal = {Information and Control}, Number = {1,3}, Pages = {109-137}, Title = {Process Algebra for Synchronous Communication}, Volume = 60, Year = 1984} @article{Hoare:78:CACM, Author = {C.A.R. Hoare}, Journal = cacm, Number = {8}, Pages = {666--677}, Title = {Communicating sequential processes}, Volume = {21}, Year = 1978} @article{Brookes:84:JACM, Author = {S.D. Brookes and C.A.R. Hoare and A.W. Roscoe}, Journal = jacm, Number = 3, Pages = {560--599}, Title = {A theory of communicating sequential processes}, Volume = 31, Year = 1984} @book{Hoare:85:CSP, Author = {C. A. R. Hoare}, Publisher = {Prentice-Hall}, Title = {Communicating Sequential Processes}, Year = 1985} @book{Milner:80:LNCS, Author = {Robin Milner}, Publisher = {Springer}, Series = {LNCS}, Title = {A Calculus of Communicating Systems}, Volume = {92}, Year = {1980}} @book{Milner:99:BOOK, Author = {Robin Milner}, Publisher = {CUP}, Title = {Communicating and mobile systems: the $\pi$-calculus}, Year = 1999} @inproceedings{Fournet:96:POPL, Acknowledgement = ack-nhfb, Author = {C{\'e}dric Fournet and Georges Gonthier}, Booktitle = {Proc. of POPL}, Isbn = {0-89791-769-3}, Keywords = {theory; verification}, Pages = {372--385}, Publisher = {ACM Press}, Title = {The reflexive {CHAM} and the join-calculus}, Year = {1996}, Bdsk-Url-1 = {http://www.acm.org:80/pubs/citations/proceedings/plan/237721/p372-fournet/}} @inproceedings{Fournet:96:CONCUR, Author = {C\'{e}dric Fournet and Georges Gonthier and Jean-Jacques L{\'e}vy and Luc Maranget and Didier R{\'e}my}, Booktitle = {Proc. of CONCUR}, Pages = {406--421}, Publisher = {Springer}, Series = {LNCS}, Title = {A Calculus of Mobile Agents}, Volume = {1119}, Year = {1996}} @inproceedings{PIERCE:98:MILNER, Author = {Benjamin C. Pierce and David N. Turner}, Booktitle = {Proof, Language and Interaction: Essays in Honour of Robin Milner}, Pages = {455--494}, Publisher = {The MIT Press}, Title = {Pict: {A} Programming Language Based on the Pi-Calculus}, Year = {1998}} @inproceedings{Thomsen:89:POPL, Acknowledgement = ack-nhfb, Author = {B. Thomsen}, Booktitle = {{POPL} '89. Proc. of the sixteenth annual {ACM} symposium on Principles of programming languages, January 1989, Austin, {TX}}, Keywords = {algorithms; design; languages; theory}, Pages = {143--154}, Publisher = {ACM Press}, Title = {A calculus of higher order communicating systems}, Year = {1989}, Bdsk-Url-1 = {http://www.acm.org:80/pubs/citations/proceedings/plan/75277/p143-thomsen/}} @article{BS:98:TCS, Author = {Michele Boreale and Davide Sangiorgi}, Journal = {TCS}, Number = {1,2}, Pages = {159--176}, Title = {Some congruence properties for $\pi$-calculus bisimilarities}, Volume = {198}, Year = {1998}} @inproceedings{Cleaveland:94:CONCUR, Author = {Shoji Yuen and Rance Cleaveland and Zeynep Dayar and Scott A. Smolka}, Booktitle = {Proc. of CONCUR}, Isbn = {ISBN 3-540-58328-7 and 0-387-58329-7}, Note = {A full version of this paper will appear in {\em Inf. and Comp.}}, Pages = {497--512}, Publisher = {Springer}, Series = {LNCS}, Title = {Fully Abstract Characterizations of Testing Preorders for Probabilistic Processes}, Volume = {836}, Year = {1994}} @article{Boreale:95:IC, Author = {Michele Boreale and Rocco De Nicola}, Journal = {Inf. and Comp.}, Number = {2}, Pages = {279--303}, Title = {Testing Equivalence for Mobile Processes}, Volume = {120}, Year = {1995}} @article{DeNicola:84:TCS, Author = {Rocco De Nicola and Matthew C. B. Hennessy}, Journal = {TCS}, Number = {1-2}, Pages = {83--133}, Title = {Testing equivalences for processes}, Volume = {34}, Year = {1984}} @article{Sangiorgi:96:TCS, Author = {Davide Sangiorgi}, Journal = {TCS}, Number = {1,2}, Pages = {235--274}, Title = {$\pi$-Calculus, Internal Mobility and Agent-Passing Calculi}, Volume = {167}, Year = {1996}} @article{Milner:92:IC, Author = {Robin Milner and Joachim Parrow and David Walker}, Journal = {Inf. and Comp.}, Number = {1}, Pages = {1--40 \& 41--77}, Title = {A Calculus of Mobile Processes, {I and II}}, Volume = {100}, Year = {1992}} @article{Milner:93:TCS, Author = {Robin Milner and Joachim Parrow and David Walker}, Journal = {TCS}, Number = {1}, Pages = {149--171}, Title = {Modal logics for mobile processes}, Volume = {114}, Year = {1993}} @article{Amadio:98:TCS, Author = {Roberto M. Amadio and Ilaria Castellani and Davide Sangiorgi}, Journal = {TCS}, Number = 2, Pages = {291--324}, Title = {On Bisimulations for the Asynchronous $\pi$-Calculus}, Volume = 195, Year = 1998} @inproceedings{Nestmann:96:CONCUR, Author = {Uwe Nestmann and Benjamin C. Pierce}, Booktitle = {Proc. of CONCUR}, Note = {Full version to appear in {\em Inf. and Comp.}}, Pages = {179--194}, Publisher = {Springer}, Series = {LNCS}, Title = {Decoding Choice Encodings}, Volume = {1119}, Year = {1996}} @inproceedings{Nestmann:97:EXPRESS, Author = {Uwe Nestmann}, Booktitle = {Proc. of {EXPRESS} '97: Expressiveness in Concurrency (Santa Margherita Ligure, Italy, September 8--12, 1997)}, Note = {Full version to appear in {\em Inf. and Comp.}.}, Publisher = {Elsevier}, Series = {ENTCS}, Title = {What Is a `Good' Encoding of Guarded Choice?}, Volume = {7}, Year = {1997}} @inproceedings{Palamidessi:97:POPL, Author = {Catuscia Palamidessi}, Booktitle = {Proc. of POPL}, Pages = {256--265}, Title = {Comparing the Expressive Power of the Synchronous and the Asynchronous {$\pi$}-calculus}, Year = {1997}} @article{Segala:95:NJC, Author = {Roberto Segala and Nancy Lynch}, Journal = {Nordic Journal of Computing}, Number = {2}, Pages = {250--273}, Title = {Probabilistic simulations for probabilistic processes}, Volume = {2}, Year = {1995}} @inproceedings{Segala:94:CONCUR, Author = {Roberto Segala and Nancy Lynch}, Booktitle = {Proc. of CONCUR}, Date-Modified = {2010-02-17 03:55:56 +0100}, Pages = {481--496}, Publisher = {Springer}, Series = {LNCS}, Title = {Probabilistic Simulations for Probabilistic Processes}, Volume = {836}, Year = {1994}} @inproceedings{Honda:91:ECOOP, Author = {Kohei Honda and Mario Tokoro}, Booktitle = {Proc. of the European Conf. on Object-Oriented Programming (ECOOP)}, Confaddress = {Geneva, Switzerland}, Pages = {133--147}, Publisher = {Springer}, Series = {LNCS}, Title = {An Object Calculus for Asynchronous Communication}, Volume = {512}, Year = {1991}} @inproceedings{Honda:92:ECOOPWS, Author = {Kohei Honda and Mario Tokoro}, Booktitle = {Proc. of the ECOOP '91 Workshop on Object-Based Concurrent Computing}, Pages = {21--51}, Publisher = {Springer}, Series = {LNCS}, Title = {On Asynchronous Communication Semantics}, Volume = {612}, Year = {1992}} @techreport{Boudol:92:REPORT, Author = {G{\'e}rard Boudol}, Date-Modified = {2007-11-25 17:44:45 +0100}, Number = {1702}, Title = {Asynchrony and the $\pi$-calculus (Note)}, Type = {Rapport de Recherche}, Year = {1992}, Bdsk-Url-1 = {http://hal.inria.fr/inria-00076939}} @article{Glabbeek:95:IC, Author = {Rob J. van Glabbeek and Scott A. Smolka and Bernhard Steffen}, Journal = {Inf. and Comp.}, Number = {1}, Pages = {59--80}, Title = {Reactive, Generative and Stratified Models of Probabilistic Processes}, Volume = {121}, Year = {1995}} @inproceedings{Lehmann:81:POPL, Author = {Daniel Lehmann and Michael O. Rabin}, Booktitle = {Proc. of POPL}, Organization = {ACM}, Pages = {133--138}, Publisher = {ACM}, Title = {On the Advantages of Free Choice: {A} Symmetric and Fully Distributed Solution to the Dining Philosophers Problem}, Year = {1981}} @incollection{Rabin:94:HOARE, Author = {Michael O. Rabin and Daniel Lehmann}, Booktitle = {A Classical Mind: Essays in Honour of C.A.R. Hoare}, Chapter = 20, Pages = {333--352}, Publisher = {Prentice Hall}, Title = {On the Advantages of Free Choice: {A} Symmetric and Fully Distributed Solution to the Dining Philosophers Problem}, Year = {1994}} @book{Magee:99:WILEY, Author = {Jeff Magee and Jeff Kramer}, Publisher = {Wiley}, Title = {Concurrency: State Models and Java Programs}, Year = 1999} @inproceedings{Herescu:00:FOSSACS, Author = {Oltea Mihaela Herescu and Catuscia Palamidessi}, Booktitle = {Proc. of FOSSACS 2000 (Part of ETAPS 2000)}, Note = {\url{http://www.lix.polytechnique.fr/~catuscia/papers/Prob_asy_pi/fossacs.ps}}, Pages = {146--160}, Publisher = {Springer}, Series = {LNCS}, Title = {Probabilistic Asynchronous $\pi$-Calculus}, Volume = {1784}, Year = {2000}} @phdthesis{Herescu:00:PHD, Author = {Oltea Mihaela Herescu}, Note = {\url{http://www.cse.psu.edu/~herescu/thesis.ps}}, School = {Department of Computer Science and Engineering. The Pennsylvania state University}, Title = {The Probabilistic Asynchronous $\pi$-Calculus}, Year = {2002}} @inproceedings{Herescu:01:PODC, Author = {Oltea Mihaela Herescu and Catuscia Palamidessi}, Booktitle = {Proc. of DISC}, Note = {\url{http://www.lix.polytechnique.fr/~catuscia/papers/Gen_Phil/podc.ps}}, Pages = {81--89}, Title = {On the Generalized Dining Philosophers Problem}, Year = {2001}} @inproceedings{Gilbert:00:CL, Author = {David Gilbert and Catuscia Palamidessi}, Booktitle = {Proc. of the Conf. on Computational Logic - CL 2000}, Note = {\url{http://www.lix.polytechnique.fr/~catuscia/papers/CC_Migration/cl.ps}}, Pages = {463--477}, Publisher = {Springer}, Series = {Lecture Notes in Artificial Intelligence}, Title = {Concurrent Constraint Programming with Process Mobility}, Year = {2000}} @inproceedings{Palamidessi:02:TCS, Author = {Catuscia Palamidessi and Oltea M. Herescu}, Booktitle = {Proc. of the {\it 2nd IFIP Int. Conf. on TCS}}, Note = {\url{http://www.lix.polytechnique.fr/~catuscia/papers/prob_enc/ifiptcs02.ps}}, Pages = {537--549}, Title = {A randomized encoding of the $\pi$-calculus with mixed choice}, Year = {2002}} @inproceedings{Nielsen:02:PPDP, Author = {Mogens Nielsen and Catuscia Palamidessi and Frank D. Valencia}, Booktitle = {Proc. of the Fourth {ACM} {SIGPLAN} Conf. on Principles and Practice of Declarative Programming}, Note = {\url{http://www.lix.polytechnique.fr/~catuscia/papers/ppdp02.ps}}, Pages = {156--167}, Publisher = {ACM Press}, Title = {On the expressive power of temporal concurrent constraint programming languages}, Year = {2002}} @article{Nielsen:01:TCC, Author = {Mogens Nielsen and Frank D. Valencia}, Bibdate = {Tue Sep 10 19:09:20 MDT 2002}, Coden = {LNCSD9}, Issn = {0302-9743}, Journal = {LNCS}, Pages = {298--324}, Title = {Temporal Concurrent Constraint Programming: Applications and Behavior}, Volume = {2300}, Year = {2001}} @inproceedings{Palamidessi:02:PPDP, Author = {Catuscia Palamidessi}, Booktitle = {Proc. of the Fourth {ACM} {SIGPLAN} Conf. on Principles and Practice of Declarative Programming ({PPDP}-02)}, Note = {Invited talk}, Pages = {74--75}, Publisher = {ACM Press}, Title = {Mobile calculi for distributed programming}, Year = {2002}} @article{Nielsen:02:NJC, Author = {M. Nielsen and C. Palamidessi and F. Valencia}, Journal = {Nordic Journal of Computing}, Note = {\url {http://www.lix.polytechnique.fr/~catuscia/papers/Ntcc/njc02.ps}}, Pages = {145--188}, Title = {Temporal Concurrent Constraint Programming: Denotation, Logic and Applications}, Volume = {9}, Year = {2002}} @article{Palamidessi:03:MSCS, Author = {Catuscia Palamidessi}, Date-Modified = {2008-12-28 17:00:52 +0100}, Journal = {Mathematical Structures in Computer Science}, Number = {5}, Pages = {685--719}, Title = {Comparing the Expressive Power of the Synchronous and the Asynchronous pi-calculus}, Volume = {13}, Year = {2003}, Bdsk-Url-1 = {http://hal.inria.fr/inria-00201104/en/}} @article{Mcdowell:03:TCS, Author = {Raymond McDowell and Dale Miller and Catuscia Palamidessi}, Journal = {TCS}, Note = {\url{http://www.lix.polytechnique.fr/~catuscia/papers/Tran_Sys_in_SC/tcs.ps}}, Number = 3, Pages = {411-437}, Title = {Encoding transition systems in sequent calculus}, Volume = 294, Year = 2003} @inproceedings{Shmatikov:02:CSFW, Author = {Vitaly Shmatikov}, Booktitle = {15th IEEE Computer Security Foundations Workshop (CSFW)}, Pages = {119--128}, Title = {Probabilistic analysis of anonymity}, Year = {2002}} @inproceedings{Wright:02:NDSS, Author = {M. Wright and M. Adler and B. Levine and C. Shields}, Booktitle = {ISOC Network and Distributed System Security Symposium (NDSS)}, Title = {An analysis of the degradation of anonymous protocols}, Year = {2002}} @article{Shmatikov:04:JCS, Author = {V. Shmatikov}, Journal = {Journal of Computer Security}, Key = {2004}, Number = {3/4}, Pages = {355--377}, Title = {Probabilistic Model Checking of an Anonymity System}, Volume = {12}, Year = {2004}} @techreport{Herescu:04:TR, Author = {Oltea M. Herescu and Catuscia Palamidessi}, Note = {\url{http://www.lix.polytechnique.fr/~catuscia/papers/Prob_asy_pi/report.ps}}, Title = {Probabilistic Asynchronous $\pi$-calculus}, Year = {2004}} @techreport{Bhargava:05:TR, Author = {Mohit Bhargava and Catuscia Palamidessi}, Note = {To appear in the proceedings of CONCUR 2005. Report version available at \url{http://www.lix.polytechnique.fr/~catuscia/papers/Anonymity/report.ps}}, Title = {Probabilistic Anonymity}, Year = {2005}} @techreport{Chatzikokolakis:05:TR, Author = {Konstantinos Chatzikokolakis and Catuscia Palamidessi}, Note = {\url{http://www.lix.polytechnique.fr/~catuscia/papers/Anonymity/reportPI.pdf}}, Title = {Probable Innocence Revisited}, Year = {2005}} @inproceedings{Aldini:02:PAPM-PROBMIV, Author = {Alessandro Aldini and Roberto Gorrieri}, Booktitle = {Process Algebra and Probabilist Methods. Performance Modeling and Verification: Second Joint Int. Workshop {PAPM-PROBMIV 2002}, Copenhagen, Denmark, July 25--26, 2002. Proc.}, Pages = {17}, Publisher = {Springer}, Series = {LNCS}, Title = {Security Analysis of a Probabilistic Non-repudiation Protocol}, Volume = {2399}, Year = {2002}} @article{Rabin:81:TR, Author = {Michael O. Rabin}, Journal = {Technical Memo TR-81, Aiken Computation Laboratory, Harvard University}, Title = {How to exchange secrets by oblivious transfer}, Year = {1981}} @inproceedings{Naor:99:CEC, Author = {Moni Naor and Benny Pinkas and Reuban Sumner}, Booktitle = {Proc. of the 1st ACM Conf. on Electronic Commerce}, Doi = {http://doi.acm.org/10.1145/336992.337028}, Isbn = {1-58113-176-3}, Location = {Denver, Colorado, United States}, Pages = {129--139}, Publisher = {ACM Press}, Title = {Privacy preserving auctions and mechanism design}, Year = {1999}, Bdsk-Url-1 = {http://doi.acm.org/10.1145/336992.337028}} @article{Even:85:CACM, Author = {Shimon Even and Oded Goldreich and Abraham Lempel}, Doi = {http://doi.acm.org/10.1145/3812.3818}, Issn = {0001-0782}, Journal = {Commun. ACM}, Number = {6}, Pages = {637--647}, Publisher = {ACM Press}, Title = {A randomized protocol for signing contracts}, Volume = {28}, Year = {1985}, Bdsk-Url-1 = {http://doi.acm.org/10.1145/3812.3818}} @article{Valencia:05:TCS, Author = {Frank D. Valencia}, Journal = {TCS}, Number = {3}, Pages = {577--607}, Title = {Decidability of infinite-state timed {CCP} processes and first-order {LTL}}, Volume = {330}, Year = {2005}} @inproceedings{Dantchev:05:SAC, Author = {Stefan S. Dantchev and Frank D. Valencia}, Booktitle = {Proc. of the 20th ACM Symposium on Applied Computing}, Pages = {393--397}, Publisher = {ACM Press}, Title = {On the computational limits of infinite satisfaction}, Year = {2005}} @misc{Stirling:98, Author = {C. Stirling}, Howpublished = {Notes for Mathfit Instructural Meeting on Games and Computation}, Title = {Bisimulation, Model Checking and Other Games}, Year = {1998}} @inproceedings{Pnueli:77:FOCS, Author = {A. Pnueli}, Booktitle = {Proc. of FOCS-77}, Organization = {IEEE}, Pages = {46--57}, Publisher = {IEEE}, Title = {The temporal logic of programs}, Year = {1977}} @inproceedings{Fribourg:99:LOPSTR, Author = {L. Fribourg}, Booktitle = {{Proc. of LOPSTR'99}}, Pages = {30--41}, Publisher = {Springer Verlag}, Series = {LNCS}, Title = {{Constraint Logic Programming Applied to Model Checking}}, Volume = {1817}, Year = {1999}} @inproceedings{Delzanno:99:TACAS, Author = {G. Delzanno and A. Podelski}, Booktitle = {{Proc. of TACAS'99}}, Pages = {223--239}, Publisher = {Springer Verlag}, Series = {LNCS}, Title = {{Model checking in CLP}}, Volume = {1579}, Year = {1999}} @incollection{Bodirsky:03:CSL, Author = {M. Bodirsky and J. Nesetril}, Booktitle = {Computer Science Logic}, Pages = {44--57}, Publisher = {Springer}, Series = {LNCS}, Title = {Constraint Satisfaction with Countable Homogeneous Templates}, Volume = {2803}, Year = {2003}} @inproceedings{Bowen:91:AAAI, Author = {J. Bowen and D. Bahler}, Booktitle = {Proc. 9th. National Conf. of the American Association for Artificial Intelligence}, Pages = {215-220}, Title = {Conditional Existence of Variables in Generalized Constraint Networks}, Year = {1991}} @inproceedings{Faltings:02:PPCP, Author = {B. Faltings and S. Macho}, Booktitle = {Proc. of Principles and Practice of Constraint Programming}, Pages = {356-370}, Publisher = {Springer-Verlag}, Title = {Open Constraint Satisfaction}, Volume = {2470}, Year = {2002}} @inproceedings{Busi:03:ICALP, Author = {Nadia Busi and Maurizio Gabbrielli and Gianluigi Zavattaro}, Booktitle = {{Proc. of ICALP 03}}, Date-Modified = {2008-12-28 17:57:09 +0100}, Publisher = {Springer-Verlag}, Series = {LNCS}, Title = {{Replication vs. recursive definition in Channel Based Calculi}}, Year = {2003}} @inproceedings{Busi:04:ICALP, Author = {Nadia Busi and Maurizio Gabbrielli and Gianluigi Zavattaro}, Booktitle = {{Proc. of ICALP 04}}, Date-Modified = {2008-12-28 17:56:56 +0100}, Publisher = {Springer-Verlag}, Series = {LNCS}, Title = {{Comparing Recursion, Replication, and Iteration in Process Calculi}}, Year = {2004}} @inproceedings{Selinger:97:CONCUR, Author = {Peter Selinger}, Booktitle = {Proc. of CONCUR}, Pages = {376--390}, Publisher = {Springer-Verlag}, Series = {LNCS}, Title = {First-Order Axioms for Asynchrony}, Volume = {1243}, Year = {1997}} @inproceedings{Boer:92:LICS, Author = {F. S. de Boer and J. W. Klop and C. Palamidessi}, Booktitle = {Proc. of LICS}, Isbn = {0-8186-2734-2}, Pages = {137--147}, Publisher = {IEEE}, Title = {Asynchronous Communication in Process Algebra}, Year = {1992}} @book{Cover:91:BOOK, Author = {Thomas M. Cover and Joy A. Thomas}, Publisher = {John Wiley \& Sons, Inc.}, Title = {Elements of Information Theory}, Year = {1991}} @inproceedings{Gray:91:SSP, Author = {J. W. {Gray, {III}}}, Booktitle = {S\&P}, Isbn = {0-8186-2168-0}, Pages = {21--35}, Publisher = {IEEE}, Title = {Toward a Mathematical Foundation for Information Flow Security}, Year = {1991}} @inproceedings{McLean:90:SSP, Author = {John McLean}, Bibdate = {2002-01-03}, Bibsource = {DBLP, http://dblp.uni-trier.de/db/conf/sp/sp1990.html#McLean90}, Booktitle = {SSP'90}, Date-Modified = {2008-01-04 09:16:45 +0100}, Pages = {180--189}, Publisher = {IEEE}, Title = {Security Models and Information Flow}, Year = {1990}} @inproceedings{Clark:01:QAPL, Author = {David Clark and Sebastian Hunt and Pasquale Malacaria}, Booktitle = {Proc. of QAPL 2001}, Pages = {238--251}, Publisher = {Elsevier}, Series = {Electr. Notes Theor. Comput. Sci}, Title = {Quantitative Analysis of the Leakage of Confidential Data}, Volume = {59 (3)}, Year = {2001}} @inproceedings{Clark:05:QAPL, Author = {David Clark and Sebastian Hunt and Pasquale Malacaria}, Booktitle = {Proc. of QAPL 2004}, Pages = {149--166}, Publisher = {Elsevier}, Series = {Electr. Notes Theor. Comput. Sci}, Title = {Quantified Interference for a While Language}, Volume = {112}, Year = {2005}} @inproceedings{Sabelfeld:00:CSFW, Author = {Andrei Sabelfeld and David Sands}, Booktitle = {Proc. of CSFW 2000}, Pages = {200--214}, Publisher = {IEEE}, Title = {Probabilistic Noninterference for Multi-Threaded Programs}, Year = {2000}} @inproceedings{Lowe:02:CSFW, Author = {Gavin Lowe}, Booktitle = {Proc. of CSFW 2002}, Pages = {18--31}, Publisher = {IEEE}, Title = {Quantifying Information Flow}, Year = {2002}} @misc{Deng:06:PerComm, Author = {Yuxin Deng and Jun Pang and Peng Wu}, Note = {Personal Communication}, Year = 2006} @inproceedings{Diaz:02:PET, Author = {Claudia D{\'\i}az and Stefaan Seys and Joris Claessens and Bart Preneel}, Booktitle = {Proc. of the workshop on Privacy Enhancing Technologies (PET) 2002}, Pages = {54--68}, Publisher = {Springer}, Series = {LNCS}, Title = {Towards Measuring Anonymity}, Volume = {2482}, Year = {2002}} @inproceedings{Serjantov:02:PET, Author = {Andrei Serjantov and George Danezis}, Booktitle = {Proc. of the workshop on Privacy Enhancing Technologies (PET) 2002}, Pages = {41-53}, Publisher = {Springer}, Series = {LNCS}, Title = {Towards an Information Theoretic Metric for Anonymity.}, Volume = {2482}, Year = {2002}} @article{Cardelli:00:TCS, Author = {Luca Cardelli and Andrew D. Gordon}, Journal = {TCS (TCS)}, Number = {1}, Pages = {177--213}, Title = {Mobile Ambients}, Volume = {240}, Year = {2000}} @inproceedings{Giambiagi:04:FOSSACS, Author = {Pablo Giambiagi and Gerardo Schneider and Frank D. Valencia}, Booktitle = {Proc. of FOSSACS}, Isbn = {3-540-21298-1}, Pages = {226--240}, Publisher = {Springer}, Series = {LNCS}, Title = {On the Expressiveness of Infinite Behavior and Name Scoping in Process Calculi}, Volume = {2987}, Year = {2004}} @inproceedings{Evfimievski:03:PODS, Author = {Alexandre Evfimievski and Johannes Gehrke and Ramakrishnan Srikant}, Booktitle = {Proc. of the Twenty-Second {ACM} {SIGMOD}-{SIGACT}-{SIGART} Symposium on Principles of Database Systems (PODS)}, Pages = {211--222}, Publisher = {ACM Press}, Title = {Limiting privacy breaches in privacy preserving data mining}, Year = {2003}} @article{Boreale:02:IC, Author = {Michele Boreale and Rocco De Nicola and Rosario Pugliese}, Journal = {Inf. and Comp.}, Number = {2}, Pages = {139--164}, Title = {Trace and Testing Equivalence on Asynchronous Processes}, Volume = {172}, Year = {2002}} @inproceedings{Boreale:02:CONCUR, Author = {Michele Boreale and Maria Grazia Buscemi}, Booktitle = {Proc. of CONCUR}, Pages = {483--498}, Publisher = {Springer}, Series = {LNCS}, Title = {A Framework for the Analysis of Security Protocols}, Volume = {2421}, Year = {2002}} @inproceedings{Moskowitz:03:WPES, Author = {Ira S. Moskowitz and Richard E. Newman and Daniel P. Crepeau and Allen R. Miller}, Bibsource = {DBLP, http://dblp.uni-trier.de}, Booktitle = {Proc. of PES}, Crossref = {DBLP:conf/wpes/2003}, Date-Modified = {2010-01-04 10:48:49 +0100}, Ee = {http://doi.acm.org/10.1145/1005140.1005153}, Pages = {79-88}, Title = {Covert channels and anonymizing networks.}, Year = {2003}} @proceedings{DBLP:conf/wpes/2003, Bibsource = {DBLP, http://dblp.uni-trier.de}, Booktitle = {WPES}, Isbn = {1-58113-776-1}, Publisher = {ACM}, Title = {Proc. of the 2003 ACM Workshop on Privacy in the Electronic Society, WPES 2003, Washington, DC, USA, October 30, 2003}, Year = {2003}} @inproceedings{Moskowitz:03:CNIS, Author = {Ira S. Moskowitz and Richard E. Newman and Paul F. Syverson}, Booktitle = {Proc. of CNIS}, Date-Modified = {2010-05-02 12:01:27 +0200}, Pages = {126-131}, Publisher = {IASTED}, Title = {Quasi-anonymous channels}, Year = {2003}} @article{Maurer:00:TIT, Author = {Ueli M. Maurer}, Journal = {IEEE Transactions on Information Theory}, Number = {4}, Pages = {1350--1356}, Title = {Authentication theory and hypothesis testing}, Volume = {46}, Year = {2000}} @article{DiPierro:04:JCS, Author = {Alessandra Di Pierro and Chris Hankin and Herbert Wiklicky}, Journal = {Journal of Computer Security}, Number = {1}, Pages = {37--82}, Title = {Approximate Non-interference}, Volume = {12}, Year = {2004}} @article{DiPierro:05:TCS, Author = {Alessandra Di Pierro and Chris Hankin and Herbert Wiklicky}, Journal = {TCS}, Number = {1}, Pages = {3--56}, Title = {Measuring the confinement of probabilistic systems}, Volume = {340}, Year = {2005}} @article{Costa:84:AI, Author = {Gerardo Costa and Colin Stirling}, Journal = {Acta Informatica}, Pages = {417--441}, Title = {A Fair Calculus of Communicating Systems}, Volume = {21}, Year = {1984}} @article{Costa:87:IC, Author = {Gerardo Costa and Colin Stirling}, Journal = {Inf. and Comp.}, Number = {3}, Pages = {207--244}, Title = {Weak and Strong Fairness in {CCS}}, Volume = {73}, Year = {1987}} @inproceedings{Brinksma:95:CONCUR, Author = {Ed Brinksma and Arend Rensink and Walter Vogler}, Booktitle = {Proc. of CONCUR}, Pages = {313--327}, Publisher = {Springer-Verlag}, Series = {LNCS}, Title = {Fair Testing}, Volume = {962}, Year = {1995}} @inproceedings{Natarajan:95:ICALP, Author = {V. Natarajan and Rance Cleaveland}, Booktitle = {Proc. of ICALP}, Pages = {648--659}, Publisher = {Springer}, Series = {LNCS}, Title = {Divergence and Fair Testing}, Volume = {944}, Year = {1995}} @inproceedings{Deng:06:FAST, Author = {Yuxin Deng and Jun Pang and Peng Wu}, Booktitle = {Proc. of the of the 4th Int. Worshop on Formal Aspects in Security and Trust}, Date-Modified = {2010-01-04 10:47:03 +0100}, Pages = {65--79}, Publisher = {Springer}, Series = {LNCS}, Title = {Measuring Anonymity with Relative Entropy}, Volume = {4691}, Year = {2006}} @article{Wu:06:IJSEKE, Author = {Peng WU and Huimin LIN}, Journal = {Int. Journal of Software Engineering and Knowledge Engineering}, Note = {\url{http://www.worldscinet.com/ijseke/16/1605/S0218194006002999.html}}, Number = {5}, Pages = {727-746}, Title = {Model-based Testing of Concurrent Programs with Predicate Sequencing Constraints}, Volume = {16}, Year = {2006}} @article{Hoare:05:CJ, Author = {Tony Hoare and Robin Milner}, Journal = {Computer Journal}, Number = {1}, Pages = {49-52}, Title = {Grand Challenges for Computing Research}, Volume = {48}, Year = {2005}} @article{Busi:00:IC, Author = {Nadia Busi and Roberto Gorrieri and Gianluigi Zavattaro}, Journal = {Inf. and Comp.}, Number = {1-2}, Pages = {90-121}, Title = {On the Expressiveness of Linda Coordination Primitives}, Volume = {156}, Year = {2000}} @inproceedings{Busi:00:ESOP, Author = {Nadia Busi and Gianluigi Zavattaro}, Booktitle = {Proc. of ESOP}, Pages = {41-55}, Publisher = {Springer}, Series = {LNCS}, Title = {On the Expressiveness of Event Notification in Data-Driven Coordination Languages}, Volume = {1782}, Year = {2000}} @inproceedings{Busi:05:ESOP, Author = {Nadia Busi and Gianluigi Zavattaro}, Booktitle = {Proc. of ESOP}, Pages = {248-262}, Publisher = {Springer}, Series = {LNCS}, Title = {Deciding Reachability in Mobile Ambients}, Volume = {3444}, Year = {2005}} @article{Busi:04:TCS, Author = {Nadia Busi and Gianluigi Zavattaro}, Journal = {TCS}, Number = {3}, Pages = {477-515}, Title = {On the expressive power of movement and restriction in pure mobile ambients.}, Volume = {322}, Year = {2004}} @inproceedings{Cacciagrano:01:ICTCS, Author = {Diletta Cacciagrano and Flavio Corradini}, Booktitle = {Proc. of ICTCS}, Pages = {256-268}, Publisher = {Springer}, Series = {LNCS}, Title = {On Synchronous and Asynchronous Communication Paradigms.}, Volume = {2202}, Year = {2001}} @article{Corradini:03:MSCS, Author = {Flavio Corradini and Dino Di Cola}, Journal = {Mathematical Structures in Computer Science}, Number = {4}, Pages = {619-656}, Title = {The Expressive Power Of Urgent, Lazy And Busy-Waiting Actions In Timed Processes.}, Volume = {13}, Year = {2003}} @inproceedings{Busi:05:WMC, Author = {Nadia Busi}, Booktitle = {Workshop on Membrane Computing}, Pages = {144-158}, Publisher = {Springer}, Series = {LNCS}, Title = {On the Computational Power of the Mate/Bud/Drip Brane Calculus: Interleaving vs. Maximal Parallelism.}, Volume = {3850}, Year = {2005}} @inproceedings{Gorla:06:FOSSACS, Author = {D. Gorla}, Booktitle = {Proc. of FOSSACS}, Date-Modified = {2007-12-26 23:54:53 +0100}, Pages = {47--62}, Publisher = {Springer}, Series = {LNCS}, Title = {On the Relative Expressive Power of Asynchronous Communication Primitives}, Volume = {3921}, Year = {2006}} @article{DeNicola:06:TCS, Author = {R. {De Nicola} and D. Gorla and R. Pugliese}, Journal = {TCS}, Number = {3}, Pages = {387--421}, Publisher = {Elsevier}, Title = {On the Expressive Power of KLAIM-based Calculi}, Volume = {356}, Year = {2006}} @article{Phillips:06:TCS, Author = {Iain C.C. Phillips and Maria Grazia Vigliotti}, Journal = {TCS}, Number = {3}, Pages = {468--494}, Title = {Leader election in rings of ambient processes}, Volume = {356}, Year = {2006}} @inproceedings{Yang:03:VMCAI, Author = {Ping Yang and C. R. Ramakrishnan and Scott A. Smolka}, Booktitle = {Proc. of the 4th Int. Conf. on Verification, Model Checking, and Abstract Interpretation (VMCAI 2003)}, Pages = {116--131}, Publisher = {Springer}, Series = {LNCS}, Title = {A Logical Encoding of the pi-Calculus: Model Checking Mobile Processes Using Tabled Resolution}, Volume = {2575}, Year = {2003}} @article{Hansson:94:FAC, Author = {Hans Hansson and Bengt Jonsson}, Journal = {Formal Aspects of Computing}, Number = {5}, Pages = {512-535}, Title = {A Logic for Reasoning about Time and Reliability}, Volume = {6}, Year = {1994}} @techreport{Sagonas:93:TechRep, Author = {Konstantinos Sagonas and Terrance Swift and David S. Warren}, Oai = {oai:CiteSeerPSU:195039}, Rights = {unrestricted}, Title = {{XSB}: An Overview of its Use and Implementation}, Year = {1993}, Bdsk-Url-1 = {http://citeseer.ist.psu.edu/195039.html;%20ftp://ftp.cs.sunysb.edu/pub/TechReports/warren/auxiliary/xsb_overview_old.ps.Z}} @inproceedings{Abadi:01:POPL, Author = {Mart{\'\i}n Abadi and C{\'e}dric Fournet}, Booktitle = {Proc. of POPL}, Organization = {ACM}, Pages = {104--115}, Title = {Mobile Values, New Names, and Secure Communication}, Year = {2001}} @misc{Santhi:06:ACCCC, Author = {Nandakishore Santhi and Alexander Vardy}, Note = {Presented at the 44-th Annual Allerton Conf. on Communication, Control, and Computing, September 2006. Available at http://arxiv.org/abs/cs/0608087}, Title = {On an Improvement over {R}{\'e}nyi's Equivocation Bound}, Year = {2006}} @article{Hellman:70:TIT, Author = {M.E. Hellman and J. Raviv}, Journal = {IEEE Trans. on Information Theory}, Pages = {368--372}, Title = {Probability of Error, Equivocation, and the {C}hernoff Bound}, Volume = {IT--16}, Year = 2007} @inproceedings{Fujioka:92:ASIACRYPT, Author = {Atsushi Fujioka and Tatsuaki Okamoto and Kazuo Ohta}, Booktitle = {ASIACRYPT '92: Proc. of the Workshop on the Theory and Application of Cryptographic Techniques}, Isbn = {3-540-57220-1}, Pages = {244--251}, Publisher = {Springer-Verlag}, Title = {A Practical Secret Voting Scheme for Large Scale Elections}, Year = {1993}} @inproceedings{Hansson:89:SRTS, Author = {H. Hansson and B. Jonsson}, Booktitle = {Proc. of the 10th IEEE Symposium on Real-Time Systems}, Pages = {102--111}, Publisher = {IEEE}, Title = {A Framework for Reasoning about Time and Reliability}, Year = {1989}} @article{Mitchell:06:TCS, Author = {John C. Mitchell and Ajith Ramanathan and Andre Scedrov and Vanessa Teague}, Journal = {TCS}, Number = {1-3}, Pages = {118--164}, Title = {A probabilistic polynomial-time process calculus for the analysis of cryptographic protocols}, Volume = {353}, Year = {2006}} @inproceedings{deAlfaro:01:CONCUR, Author = {Luca de Alfaro and Thomas A. Henzinger and Ranjit Jhala}, Booktitle = {Proc. of CONCUR}, Publisher = {Springer}, Series = {LNCS}, Title = {Compositional Methods for Probabilistic Systems}, Volume = {2154}, Year = {2001}} @misc{Canetti:07:Rep, Author = {Ran Canetti and Ling Cheung and Nancy Lynch and Olivier Pereira}, Howpublished = {Cryptology ePrint Archive, Report 2007/102}, Title = {On the Role of Scheduling in Simulation-Based Security}, Year = {2007}} @inproceedings{Canetti:06:DISC, Author = {Ran Canetti and Ling Cheung and Dilsun Kirli Kaynar and Moses Liskov and Nancy A. Lynch and Olivier Pereira and Roberto Segala}, Booktitle = {Proc. of DISC}, Pages = {238--253}, Publisher = {Springer}, Series = {LNCS}, Title = {Time-Bounded Task-{PIOA}s: {A} Framework for Analyzing Security Protocols}, Volume = {4167}, Year = {2006}} @inproceedings{Canetti:06:WODES, Author = {Ran Canetti and Ling Cheung and Dilsun Kaynar and Moses Liskov and Nancy Lynch and Olivier Pereira and Roberto Segala}, Booktitle = {Proc. of WODES}, Title = {Task-Structured Probabilistic I/O Automata}, Year = {2006}} @incollection{Sokolova:04:BookChapt, Author = {A. Sokolova and Vink, E.P. de}, Booktitle = {Validation of Stochastic Systems: A Guide to Current Research}, Pages = {1--43}, Publisher = {Springer}, Series = {LNCS}, Title = {Probabilistic automata: system types, parallel composition and comparison}, Volume = {2925}, Year = 2004} @inproceedings{Hansson:90:SRTS, Author = {H. Hansson and B. Jonsson}, Booktitle = {Proc. of the Real-Time Systems Symposium - 1990}, Pages = {278--287}, Publisher = {IEEE}, Title = {A Calculus for Communicating Systems with Time and Probabitilies}, Year = {1990}} @phdthesis{Andova:02:PhD, Author = {Suzana Andova}, School = {Technische Universiteit Eindhoven}, Title = {Probabilistic process algebra}, Year = {2002}, Bdsk-Url-1 = {http://library.tue.nl/csp/dare/LinkToRepository.csp?recordnumber=561343}} @inproceedings{Mislove:03:EXPRESS, Author = {Michael Mislove and Jo{\"e}l Ouaknine and James Worrell}, Booktitle = {Proc.\ of the 10th Int.\ Wksh.\ on Expressiveness in Concurrency (EXPRESS '03)}, Pages = {7--28}, Publisher = {Elsevier}, Series = {ENTCS}, Title = {Axioms for Probability and Nondeterminism}, Volume = {96}, Year = {2004}} @article{Sweene:02:IJUFKSa, Author = {Latanya Sweene}, Journal = {Int. Journal of Uncertainty, Fuzziness and Knowledge-Based Systems}, Number = {5}, Pages = {557--570}, Title = {k-Anonymity: {A} Model for Protecting Privacy}, Volume = {10}, Year = {2002}} @article{Sweene:02:IJUFKSb, Author = {Latanya Sweene}, Journal = {Int. Journal of Uncertainty, Fuzziness and Knowledge-Based Systems}, Number = {5}, Pages = {571--588}, Title = {Achieving k-Anonymity Privacy Protection Using Generalization and Suppression}, Volume = {10}, Year = {2002}} @misc{Garcia:07:arXiv, Author = {Flavio D. Garcia and Peter van Rossum and Ana Sokolova}, Note = {arXiv:0706.1019v1}, Title = {Probabilistic Anonymity and Admissible Schedulers}, Year = 2007} @incollection{Renyi:66:NeymanBOOK, Author = {Alfr\'ed R\'enyi}, Booktitle = {Festschriftf for J. Neyman}, Date-Modified = {2010-03-29 10:02:56 +0200}, Pages = {281--288}, Publisher = {Wiley, New York}, Title = {{On the amount of missing information and the Neyman-Pearson lemma}}, Year = 1966} @article{Desharnais:04:TCS, Author = {Josee Desharnais and Radha Jagadeesan and Vineet Gupta and Prakash Panangaden}, Journal = {TCS}, Number = {3}, Pages = {323-354}, Title = {Metrics for Labelled {M}arkov Processes}, Volume = {318}, Year = {2004}} @article{vanBreugel:05:TCS, Author = {Franck van Breugel and James Worrell}, Journal = {TCS}, Number = {1}, Pages = {115-142}, Title = {A behavioural pseudometric for probabilistic transition systems}, Volume = {331}, Year = {2005}} @article{Larsen:91:IC, Author = {Kim G. Larsen and Arne Skou}, Journal = {Inf. and Comp.}, Number = {1}, Pages = {1--28}, Title = {Bisimulation through Probabilistic Testing}, Volume = {94}, Year = {1991}} @inproceedings{Park:81:GITCS, Author = {{D. Park}}, Booktitle = {Proc. of the Fifth {GI}-Conf. on TCS}, Key = {Park81}, Pages = {167--183}, Publisher = {Springer-Verlag}, Series = {LNCS}, Title = {Concurrency and Automata on Infinite Sequences}, Volume = {104}, Year = {1981}} @inproceedings{Zhu:05:ICDCS, Author = {Ye Zhu and Riccardo Bettati}, Booktitle = {Proc. of ICDCS}, Pages = {514--524}, Publisher = {IEEE}, Title = {Anonymity vs. Information Leakage in Anonymity Systems}, Year = {2005}} @article{Clarkson:09:JCS, Author = {Michael R. Clarkson and Andrew C. Myers and Fred B. Schneider}, Date-Modified = {2010-05-23 17:28:52 +0200}, Journal = {Journal of Computer Security}, Number = {5}, Pages = {655-701}, Read = {No}, Title = {Belief in information flow}, Volume = {17}, Year = {2009}} @article{Yang:04:STTT, Author = {Ping Yang and C. R. Ramakrishnan and Scott A. Smolka}, Journal = {Int. Journal on Software Tools for Technology Transfer}, Number = {1}, Pages = {38--66}, Title = {A logical encoding of the pi-calculus: model checking mobile processes using tabled resolution}, Volume = {6}, Year = {2004}}