共 25 条
[1]
Brett N(2017)Rewriting-based runtime verification for alternation-free hyperltl Proce. TACAS. LNCS 10206 77-93
[2]
Siddique U(1985)Security without identification: transaction systems to make big brother obsolete Commun. ACM 28 1030-1044
[3]
Bonakdarpour B(2005)Quantified interference for a while language Electron. Notes Theor. Comput. Sci. 112 149-166
[4]
Chaum D(2010)Hyperproperties J. Comput. Secur. 18 1157-1210
[5]
Clark D(2017)Encodings of bounded synthesis Proc. TACAS. LNCS 10205 354-370
[6]
Hunt S(2019)Monitoring hyperproperties Formal Methods Syst. Des. 15 519-539
[7]
Malacaria P(2013)Bounded synthesis STTT 1 37-58
[8]
Clarkson MR(2015)Detecting unrealizability of distributed fault-tolerant systems Log. Methods Comput. Sci. 52 264-268
[9]
Schneider FB(1992)Proving noninterference and functional correctness using traces J. Comput. Secur. 32 733-749
[10]
Faymonville P(1946)A variant of a recursively unsolvable problem Bull. Am. Math. Soc. undefined undefined-undefined