@article(ABF18, author = {M. Abadi and B. Blanchet and C. Fournet}, year = {2018}, title = {The Applied Pi Calculus: Mobile Values, New Names, and Secure Communication}, journal = {Journal of the {ACM}}, volume = {65}, number = {1}, pages = {1:1--1:41}, doi = {10.1145/3127586}, ) @inproceedings(AB09, author = {A. Aldini and M. Bernardo}, year = {2009}, title = {A General Framework for Nondeterministic, Probabilistic, and Stochastic Noninterference}, booktitle = {Foundations and Applications of Security Analysis, Joint Workshop on Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security, {(ARSPA-WITS)}}, pages = {18--33}, doi = {10.1007/978-3-642-03459-6\_2}, ) @article(hermanns:2005, author = {C. Baier and J.-P. Katoen and H. Hermanns and V. Wolf}, year = {2005}, title = {Comparative branching-time semantics for {M}arkov chains}, journal = {Information and Computation}, volume = {200}, number = {2}, pages = {149--214}, doi = {10.1016/j.ic.2005.03.001}, ) @article(cl-vmcai03, author = {A. Bossi and R. Focardi and C. Piazza and S. Rossi}, year = {2004}, title = {Verifying {P}ersistent {S}ecurity {P}roperties}, journal = {Computer Languages, Systems and Structures}, volume = {30}, number = {3-4}, pages = {231--258}, doi = {10.1016/j.cl.2004.02.005}, ) @inproceedings(boudali:2007, author = {H. Boudali and P. Crouzen and M. Stoelinga}, year = {2007}, title = {A compositional semantics for dynamic fault trees in terms of interactive {M}arkov chains}, booktitle = {Proc. of (ATVA'07}, publisher = {Springer-Verlag}, pages = {441--456}, url = {https://doi.org/10.1007/978-3-540-75596-8\_31}, ) @article(BR05, author = {M. Bugliesi and S. Rossi}, year = {2005}, title = {Non-interference proof techniques for the analysis of cryptographic protocols}, journal = {Journal of Computer Security}, volume = {13}, number = {1}, pages = {87--113}, doi = {10.3233/JCS-2005-13104}, url = {http://content.iospress.com/articles/journal-of-computer-security/jcs227}, ) @inproceedings(CR06, author = {S. Crafa and S. Rossi}, year = {2006}, title = {P-congruences as non-interference for the pi-calculus}, booktitle = {Proceedings of the 2006 {ACM} workshop on Formal methods in security engineering, {(FMSE'06)}}, pages = {13--22}, doi = {10.1145/1180337.1180339}, ) @article(CR07, author = {S. Crafa and S. Rossi}, year = {2007}, title = {Controlling information release in the pi-calculus}, journal = {Information and Computation}, volume = {205}, number = {8}, pages = {1235--1273}, doi = {10.1016/j.ic.2007.01.001}, ) @article(hennessy:2013, author = {Y. Deng and M. Hennessy}, year = {2013}, title = {On the semantics of {M}arkov automata}, journal = {Inf. Comput.}, volume = {222}, pages = {139--168}, doi = {10.1016/j.ic.2012.10.010}, ) @inproceedings(PHW02, author = {{Di Pierro}, A. and C. Hankin and H.Wiklicky}, year = {2002}, title = {Approximate {N}on-{I}nterference}, booktitle = {Proc. of the IEEE Computer Security Foundations Workshop (CSFW'02)}, publisher = {IEEE Computer Society Press}, pages = {3--17}, doi = {10.1109/CSFW.2002.1021803}, ) @article(FG95, author = {R. Focardi and R. Gorrieri}, year = {1994/1995}, title = {A {C}lassification of {S}ecurity {P}roperties for {P}rocess {A}lgebras}, journal = {Journal of Computer Security}, volume = {3}, number = {1}, pages = {5--33}, doi = {10.3233/JCS-1994/1995-3103}, ) @inproceedings(FG01, author = {R. Focardi and R. Gorrieri}, year = {2000}, title = {Classification of {S}ecurity {P}roperties ({P}art {I}: {I}nformation {F}low)}, editor = {R. Focardi and R. Gorrieri}, booktitle = {Proc. of Foundations of Security Analysis and Design (FOSAD'00)}, series = {LNCS}, volume = {2171}, publisher = {Springer-Verlag}, pages = {331--396}, doi = {10.1007/3-540-45608-2\_6}, ) @inproceedings(FGM-ICALP, author = {R. Focardi and R. Gorrieri and F. Martinelli}, year = {2000}, title = {{N}on {I}nterference for the {A}nalysis of {C}ryptographic {P}rotocols}, editor = {U. Montanari and J. D. P. Rolim and E. Welzl}, booktitle = {Proc. of Int. Colloquium on Automata, Languages and Programming (ICALP'00)}, series = {LNCS}, volume = {1853}, publisher = {Springer-Verlag}, pages = {744--755}, doi = {10.1007/3-540-45022-X\_31}, ) @article(JSAC, author = {R. Focardi and R. Gorrieri and F. Martinelli}, year = {2003}, title = {Real-Time Information Flow Analysis}, journal = {IEEE Journal on Selected Areas in Communications}, volume = {21}, number = {1}, doi = {10.1109/JSAC.2002.806122}, ) @article(jcs06, author = {R. Focardi and S. Rossi}, year = {2006}, title = {Information flow security in dynamic contexts}, journal = {Journal of Computer Security}, volume = {14}, number = {1}, pages = {65--110}, doi = {10.3233/JCS-2006-14103}, url = {http://content.iospress.com/articles/journal-of-computer-security/jcs255}, ) @inproceedings(FRS05, author = {R. Focardi and S. Rossi and A. Sabelfeld}, year = {2005}, title = {Bridging Language-Based and Process Calculi Security}, booktitle = {Foundations of Software Science and Computational Structures, 8th International Conference, (FOSSACS'05)}, pages = {299--315}, doi = {10.1007/978-3-540-31982-5\_19}, ) @inproceedings(NI, author = {J. A. Goguen and J. Meseguer}, year = {1982}, title = {{S}ecurity {P}olicy and {S}ecurity {M}odels}, booktitle = {Proc. of the Symposium on Security and Privacy}, publisher = {IEEE Computer Society Press}, pages = {11--20}, doi = {10.1109/SP.1982.10014}, ) @inproceedings(GLM03, author = {R. Gorrieri and E. Locatelli and F. Martinelli}, year = {2003}, title = {A Simple Language for Real-Time Cryptographic Protocol Analysis}, editor = {P. Degano}, booktitle = {Proc. of European Symposium on Programming (ESOP'03)}, series = {LNCS}, volume = {2618}, publisher = {Springer-Verlag}, pages = {114--128}, doi = {10.1007/3-540-36575-3\_9}, ) @article(HR03, author = {M. Hennessy and J. Riely}, year = {2002}, title = {Information {F}low vs. {R}esource {A}ccess in the {A}synchronous {P}i-calculus}, journal = {ACM Transactions on Programming Languages and Systems (TOPLAS)}, volume = {24}, number = {5}, pages = {566--591}, doi = {10.1145/570886.570890}, ) @book(hillston:book, author = {J. Hillston}, year = {1996}, title = {A Compositional Approach to Performance Modelling}, publisher = {Cambridge Press}, doi = {10.1017/CBO9780511569951}, ) @inproceedings(marin:valuetools13, author = {J. Hillston and A. Marin and C. Piazza and S. Rossi}, year = {2013}, title = {Contextual Lumpability}, booktitle = {Proc. of Valuetools 2013}, publisher = {ACM Press}, pages = {194--203}, doi = {10.4108/icst.valuetools.2013.254408}, ) @inproceedings(Man00b, author = {H. Mantel}, year = {2000}, title = {Unwinding {P}ossibilistic {S}ecurity {P}roperties}, booktitle = {Proc. of the European Symposium on Research in Computer Security (ESoRiCS'00)}, series = {LNCS}, volume = {2895}, publisher = {Springer-Verlag}, pages = {238--254}, doi = {10.1007/10722599\_15}, ) @inproceedings(marin:mascots14, author = {A. Marin and S. Rossi}, year = {2014}, title = {On the Relations between Lumpability and Reversibility}, booktitle = {Proc. of {MASCOTS} 2014}, pages = {427--432}, doi = {10.1109/MASCOTS.2014.59}, ) @article(MR-acta17, author = {A. Marin and S. Rossi}, year = {2017}, title = {On the relations between Markov chain lumpability and reversibility}, journal = {Acta Informatica}, volume = {54}, number = {5}, pages = {447--485}, doi = {10.1007/s00236-016-0266-1}, ) @inproceedings(McL94, author = {J. McLean}, year = {1994}, title = {A {G}eneral {T}heory of {C}omposition for {T}race {S}ets {C}losed under {S}elective {I}nterleaving {F}unctions}, booktitle = {Proc. of the IEEE Symposium on Security and Privacy (SSP'94)}, publisher = {IEEE Computer Society Press}, pages = {79--93}, doi = {10.1109/RISP.1994.296590}, ) @inproceedings(Mil94, author = {J. K. Millen}, year = {1994}, title = {Unwinding {F}orward {C}orrectability}, booktitle = {Proc. of the IEEE Computer Security Foundations Workshop (CSFW'94)}, publisher = {IEEE Computer Society Press}, pages = {2--10}, doi = {10.1109/CSFW.1994.315952}, ) @book(Mil89, author = {R. Milner}, year = {1989}, title = {Communication and {C}oncurrency}, publisher = {Prentice-Hall}, url = {https://dblp.org/rec/bib/books/daglib/0067019}, ) @inproceedings(cops, author = {C. Piazza and E. Pivato and S. Rossi}, year = {2004}, title = {CoPS - Checker of Persistent Security}, booktitle = {Tools and Algorithms for the Construction and Analysis of Systems, 10th International Conference (TACAS'04)}, pages = {144--152}, doi = {10.1007/978-3-540-24730-2\_11}, ) @article(RS01, author = {P. Y. A. Ryan and S. Schneider}, year = {2001}, title = {Process {A}lgebra and {N}on-{I}nterference}, journal = {Journal of Computer Security}, volume = {9}, number = {1/2}, pages = {75--103}, doi = {10.3233/JCS-2001-91-204}, url = {http://content.iospress.com/articles/journal-of-computer-security/jcs142}, ) @article(SM03, author = {A. Sabelfeld and A. C. Myers}, year = {2003}, title = {Language-{B}ased {I}nformation-{F}low {S}ecurity}, journal = {IEEE Journal on Selected Areas in Communication}, volume = {21}, number = {1}, pages = {5--19}, doi = {10.1109/JSAC.2002.806121}, ) @inproceedings(SV98, author = {G. Smith and D. M. Volpano}, year = {1998}, title = {Secure {I}nformation {F}low in a {M}ulti-threaded {I}mperative {L}anguage}, booktitle = {Proc. of POPL'98}, publisher = {ACM Press}, pages = {355--364}, doi = {10.1145/268946.268975}, )