@article(aldini, author = {A.~Aldini and A.~Di Pierro}, year = {2008}, title = {Estimating the maximum information leakage}, journal = {Int. J. Inf. Sec.}, volume = {7}, number = {3}, pages = {219--242}, doi = {10.1007/s10207-007-0050-x}, ) @inproceedings(Andersen, author = {H.~R. Andersen}, year = {1995}, title = {Partial Model Checking}, booktitle = {LICS '95}, publisher = {IEEE Computer Society}, pages = {398}, doi = {10.1109/LICS.1995.523274}, ) @inproceedings(borto1, author = {E.~Bartocci and L.~Bortolussi and L.~Nenzi and G.~Sanguinetti}, year = {2013}, title = {On the Robustness of Temporal Properties for Stochastic Models}, booktitle = {2nd International Workshop on Hybrid Systems and Biology}, series = {{EPTCS}}, volume = {125}, pages = {3--19}, doi = {10.4204/EPTCS.125.1}, ) @inproceedings(DBLP:conf/essos/BielovaM11, author = {N.~Bielova and F.~Massacci}, year = {2011}, title = {Predictability of Enforcement}, booktitle = {Proceedings of ESSoS 2011}, volume = {6542}, publisher = {Springer}, pages = {73--86}, doi = {10.1007/978-3-642-19125-1\_6}, ) @article(DBLP:journals/scn/BistarelliFOS10, author = {S.~Bistarelli and S.~N. Foley and B.~O'Sullivan and F.~Santini}, year = {2010}, title = {Semiring-based frameworks for trust propagation in small-world networks and coalition formation criteria}, journal = {Security and Communication Networks}, volume = {3}, number = {6}, pages = {595--610}, doi = {10.1002/sec.252}, ) @article(DBLP:journals/cma/BistarelliMS12, author = {S.~Bistarelli and F.~Martinelli and F.~Santini}, year = {2012}, title = {A semiring-based framework for the deduction/abduction reasoning in access control with weighted credentials}, journal = {CAMWA}, volume = {64}, number = {4}, pages = {447--462}, doi = {10.1016/j.camwa.2011.12.017}, ) @article(jacm97, author = {S.~Bistarelli and U.~Montanari and F.~Rossi}, year = {1997}, title = {Semiring-based constraint satisfaction and optimization}, journal = {J. ACM}, volume = {44}, number = {2}, pages = {201--236}, doi = {10.1145/256303.256306}, ) @inproceedings(gadducci06, author = {Stefano Bistarelli and Fabio Gadducci}, year = {2006}, title = {Enhancing Constraints Manipulation in Semiring-based Formalisms}, booktitle = {Proceedings of the 2006 Conference on ECAI 2006: 17th European Conference on Artificial Intelligence}, publisher = {IOS Press}, pages = {63--67}, url = {http://dl.acm.org/citation.cfm?id=1567016.1567036}, ) @book(residuation, author = {T.~S. Blyth and M.~F. Janowitz}, year = {1972}, title = {Residuation theory}, volume = {102}, publisher = {Pergamon press Oxford}, ) @inproceedings(Buchholz, author = {Peter Buchholz and Peter Kemper}, year = {2001}, title = {Quantifying the Dynamic Behavior of Process Algebras}, booktitle = {Process Algebra and Probabilistic Methods, Performance Modeling and Verification: Joint International Workshop, {PAPM-PROBMIV} 2001, Aachen, Germany, September 12-14, 2001, Proceedings}, pages = {184--199}, doi = {10.1007/3-540-44804-7\_12}, ) @article(cao, author = {Y.~Cao and S.~X. Sun and H.~Wang and G.~Chen}, year = {2013}, title = {A Behavioral Distance for Fuzzy-Transition Systems}, journal = {{IEEE} T. Fuzzy Systems}, volume = {21}, number = {4}, pages = {735--747}, doi = {10.1109/TFUZZ.2012.2230177}, ) @inproceedings(Cheng:2007:FMS:1263552.1264209, author = {Pau{-}Chen Cheng and Pankaj Rohatgi and Claudia Keser and Paul~A. Karger and Grant~M. Wagner and Angela~Schuett Reninger}, year = {2007}, title = {Fuzzy Multi-Level Security: An Experiment on Quantified Risk-Adaptive Access Control}, booktitle = {2007 {IEEE} Symposium on Security and Privacy (S{\&}P 2007), 20-23 May 2007, Oakland, California, {USA}}, pages = {222--230}, doi = {10.1109/SP.2007.21}, ) @inproceedings(DrabikMM12, author = {Peter Dr{\'{a}}bik and Fabio Martinelli and Charles Morisset}, year = {2012}, title = {Cost-Aware Runtime Enforcement of Security Policies}, booktitle = {Security and Trust Management - 8th International Workshop, {STM} 2012, Pisa, Italy, September 13-14, 2012, Revised Selected Papers}, pages = {1--16}, doi = {10.1007/978-3-642-38004-4\_1}, ) @article(stoelinga, author = {Marco Faella and Axel Legay and Mari{\"{e}}lle Stoelinga}, year = {2008}, title = {Model Checking Quantitative Linear Time Logic}, journal = {Electr. Notes Theor. Comput. Sci.}, volume = {220}, number = {3}, pages = {61--77}, doi = {10.1016/j.entcs.2008.11.019}, ) @inproceedings(683116, author = {Riccardo Focardi and Roberto Gorrieri}, year = {2000}, title = {Classification of Security Properties (Part {I:} Information Flow)}, booktitle = {Foundations of Security Analysis and Design, Tutorial Lectures [revised versions of lectures given during the {IFIP} {WG} 1.7 International School on Foundations of Security Analysis and Design, {FOSAD} 2000, Bertinoro, Italy, September 2000]}, pages = {331--396}, doi = {10.1007/3-540-45608-2\_6}, ) @inproceedings(DBLP:conf/fosad/FocardiGM02, author = {Riccardo Focardi and Roberto Gorrieri and Fabio Martinelli}, year = {2002}, title = {Classification of Security Properties - Part {II:} Network Security}, booktitle = {Foundations of Security Analysis and Design II, {FOSAD} 2001/2002 Tutorial Lectures}, pages = {139--185}, doi = {10.1007/978-3-540-24631-2\_4}, ) @inproceedings(FocardiM99, author = {Riccardo Focardi and Fabio Martinelli}, year = {1999}, title = {A Uniform Approach for the Definition of Security Properties}, booktitle = {FM'99 - Formal Methods, World Congress on Formal Methods in the Development of Computing Systems, Toulouse, France, September 20-24, 1999, Proceedings, Volume {I}}, pages = {794--813}, doi = {10.1007/3-540-48119-2\_44}, ) @article(continuous, author = {A.~Girard and G.~J. Pappas}, year = {2007}, title = {Approximation Metrics for Discrete and Continuous Systems}, journal = {{IEEE} Trans. Automat. Contr.}, volume = {52}, number = {5}, pages = {782--798}, doi = {10.1109/TAC.2007.895849}, ) @inproceedings(NI, author = {J.~A. Goguen and J.~Meseguer}, year = {1982}, title = {Security Policy and Security Models}, booktitle = {Proc. of the 1982 Symposium on Security and Privacy}, publisher = {IEEE Press}, pages = {11--20}, doi = {10.1109/SP.1982.10014}, ) @book(golan, author = {J.~Golan}, year = {2003}, title = {Semirings and affine equations over them: theory and applications}, publisher = {Kluwer Academic Pub.}, doi = {10.1007/978-94-017-0383-3}, ) @article(dagstuhl, author = {Boris K{\"{o}}pf and Pasquale Malacaria and Catuscia Palamidessi}, year = {2012}, title = {Quantitative Security Analysis (Dagstuhl Seminar 12481)}, journal = {Dagstuhl Reports}, volume = {2}, number = {11}, pages = {135--154}, doi = {10.4230/DagRep.2.11.135}, ) @inproceedings(GLMM09, author = {Gabriele Lenzini and Fabio Martinelli and Ilaria Matteucci and Stefania Gnesi}, year = {2008}, title = {A Uniform Approach to Security and Fault-Tolerance Specification and Analysis}, booktitle = {Architecting Dependable Systems {VI}}, pages = {172--201}, doi = {10.1007/978-3-642-10248-6\_8}, ) @article(LlM05, author = {A.~Lluch-Lafuente and U.~Montanari}, year = {2005}, title = {Quantitative mu-calculus and {CTL} defined over constraint semirings}, journal = {TCS}, volume = {346}, number = {1}, pages = {135--160}, doi = {10.1016/j.tcs.2005.08.006}, ) @article(DBLP:journals/entcs/MartinelliM07, author = {Fabio Martinelli and Ilaria Matteucci}, year = {2007}, title = {An Approach for the Specification, Verification and Synthesis of Secure Systems}, journal = {Electr. Notes Theor. Comput. Sci.}, volume = {168}, pages = {29--43}, doi = {10.1016/j.entcs.2006.12.003}, ) @inproceedings(Martinelli:2012:QQE:2404707.2404711, author = {Fabio Martinelli and Ilaria Matteucci and Charles Morisset}, year = {2012}, title = {From Qualitative to Quantitative Enforcement of Security Policy}, booktitle = {Computer Network Security - 6th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, {MMM-ACNS} 2012, St. Petersburg, Russia, October 17-19, 2012. Proceedings}, pages = {22--35}, doi = {10.1007/978-3-642-33704-8\_3}, ) @misc(QAPL15-TR, author = {Fabio Martinelli and Ilaria Matteucci and Francesco Santini}, year = {2015}, title = {{Semiring-based Specification Approaches for Quantitative Security}}, note = {Technical Report TR-IIT-08-2015}, ) @article(MiculanP13, author = {Marino Miculan and Marco Peressotti}, year = {2013}, title = {Weak bisimulations for labelled transition systems weighted over semirings}, journal = {CoRR}, volume = {abs/1310.4106}, url = {http://arxiv.org/abs/1310.4106}, ) @book(milner, author = {R.~Milner}, year = {1999}, title = {Communicating and mobile systems: the $\pi$-calculus}, publisher = {Cambridge University Press}, ) @inproceedings(MCR08, author = {Ian Molloy and Pau{-}Chen Cheng and Pankaj Rohatgi}, year = {2008}, title = {Trading in risk: using markets to improve access control}, booktitle = {Proceedings of the 2008 Workshop on New Security Paradigms, Lake Tahoe, CA, USA, September 22-25, 2008}, pages = {107--125}, doi = {10.1145/1595676.1595694}, ) @article(csop, author = {Sergiu Rudeanu and Dragos Vaida}, year = {2004}, title = {Semirings in Operations Research and Computer Science: More Algebra}, journal = {Fundam. Inform.}, volume = {61}, number = {1}, pages = {61--85}, url = {http://content.iospress.com/articles/fundamenta-informaticae/fi61-1-06}, ) @inproceedings(zhang06Policy, author = {Lei Zhang and Alexander Brodsky and Sushil Jajodia}, year = {2006}, title = {Toward Information Sharing: Benefit And Risk Access Control {(BARAC)}}, booktitle = {7th {IEEE} International Workshop on Policies for Distributed Systems and Networks {(POLICY} 2006), 5-7 June 2006, London, Ontario, Canada}, pages = {45--53}, doi = {10.1109/POLICY.2006.36}, )