共 19 条
[1]
ALDINI A, IN PRESS J COMPUTER
[3]
ALUR R, 1992, LECT NOTES COMPUT SC, V600, P28, DOI 10.1007/BFb0031986
[4]
[Anonymous], 1995, J COMPUT SECUR, DOI DOI 10.3233/JCS-1994/1995-3103
[5]
Baier C, 1997, LECT NOTES COMPUT SC, V1254, P119
[6]
Barbuti R, 2003, FUND INFORM, V54, P137
[8]
Evans N, 2000, LECT NOTES COMPUT SC, V1895, P222
[9]
Information flow analysis in a discrete-time process algebra
[J].
13TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS,
2000,
:170-184
[10]
Goguen J. A., 1982, Proceedings of the 1982 Symposium on Security and Privacy, P11