A. Aldini & A. Di Pierro (2008):
Estimating the maximum information leakage.
Int. J. Inf. Sec. 7(3),
pp. 219–242,
doi:10.1007/s10207-007-0050-x.
H. R. Andersen (1995):
Partial Model Checking.
In: LICS '95.
IEEE Computer Society,
pp. 398,
doi:10.1109/LICS.1995.523274.
E. Bartocci, L. Bortolussi, L. Nenzi & G. Sanguinetti (2013):
On the Robustness of Temporal Properties for Stochastic Models.
In: 2nd International Workshop on Hybrid Systems and Biology,
EPTCS 125,
pp. 3–19,
doi:10.4204/EPTCS.125.1.
N. Bielova & F. Massacci (2011):
Predictability of Enforcement.
In: Proceedings of ESSoS 2011 6542.
Springer,
pp. 73–86,
doi:10.1007/978-3-642-19125-1_6.
S. Bistarelli, S. N. Foley, B. O'Sullivan & F. Santini (2010):
Semiring-based frameworks for trust propagation in small-world networks and coalition formation criteria.
Security and Communication Networks 3(6),
pp. 595–610,
doi:10.1002/sec.252.
S. Bistarelli, F. Martinelli & F. Santini (2012):
A semiring-based framework for the deduction/abduction reasoning in access control with weighted credentials.
CAMWA 64(4),
pp. 447–462,
doi:10.1016/j.camwa.2011.12.017.
S. Bistarelli, U. Montanari & F. Rossi (1997):
Semiring-based constraint satisfaction and optimization.
J. ACM 44(2),
pp. 201–236,
doi:10.1145/256303.256306.
Stefano Bistarelli & Fabio Gadducci (2006):
Enhancing Constraints Manipulation in Semiring-based Formalisms.
In: Proceedings of the 2006 Conference on ECAI 2006: 17th European Conference on Artificial Intelligence.
IOS Press,
pp. 63–67.
Available at http://dl.acm.org/citation.cfm?id=1567016.1567036.
T. S. Blyth & M. F. Janowitz (1972):
Residuation theory 102.
Pergamon press Oxford.
Peter Buchholz & Peter Kemper (2001):
Quantifying the Dynamic Behavior of Process Algebras.
In: Process Algebra and Probabilistic Methods, Performance Modeling and Verification: Joint International Workshop, PAPM-PROBMIV 2001, Aachen, Germany, September 12-14, 2001, Proceedings,
pp. 184–199,
doi:10.1007/3-540-44804-7_12.
Y. Cao, S. X. Sun, H. Wang & G. Chen (2013):
A Behavioral Distance for Fuzzy-Transition Systems.
IEEE T. Fuzzy Systems 21(4),
pp. 735–747,
doi:10.1109/TFUZZ.2012.2230177.
Pau-Chen Cheng, Pankaj Rohatgi, Claudia Keser, Paul A. Karger, Grant M. Wagner & Angela Schuett Reninger (2007):
Fuzzy Multi-Level Security: An Experiment on Quantified Risk-Adaptive Access Control.
In: 2007 IEEE Symposium on Security and Privacy (S&P 2007), 20-23 May 2007, Oakland, California, USA,
pp. 222–230,
doi:10.1109/SP.2007.21.
Peter Drábik, Fabio Martinelli & Charles Morisset (2012):
Cost-Aware Runtime Enforcement of Security Policies.
In: Security and Trust Management - 8th International Workshop, STM 2012, Pisa, Italy, September 13-14, 2012, Revised Selected Papers,
pp. 1–16,
doi:10.1007/978-3-642-38004-4_1.
Marco Faella, Axel Legay & Mariëlle Stoelinga (2008):
Model Checking Quantitative Linear Time Logic.
Electr. Notes Theor. Comput. Sci. 220(3),
pp. 61–77,
doi:10.1016/j.entcs.2008.11.019.
Riccardo Focardi & Roberto Gorrieri (2000):
Classification of Security Properties (Part I: Information Flow).
In: Foundations of Security Analysis and Design, Tutorial Lectures [revised versions of lectures given during the IFIP WG 1.7 International School on Foundations of Security Analysis and Design, FOSAD 2000, Bertinoro, Italy, September 2000],
pp. 331–396,
doi:10.1007/3-540-45608-2_6.
Riccardo Focardi, Roberto Gorrieri & Fabio Martinelli (2002):
Classification of Security Properties - Part II: Network Security.
In: Foundations of Security Analysis and Design II, FOSAD 2001/2002 Tutorial Lectures,
pp. 139–185,
doi:10.1007/978-3-540-24631-2_4.
Riccardo Focardi & Fabio Martinelli (1999):
A Uniform Approach for the Definition of Security Properties.
In: FM'99 - Formal Methods, World Congress on Formal Methods in the Development of Computing Systems, Toulouse, France, September 20-24, 1999, Proceedings, Volume I,
pp. 794–813,
doi:10.1007/3-540-48119-2_44.
A. Girard & G. J. Pappas (2007):
Approximation Metrics for Discrete and Continuous Systems.
IEEE Trans. Automat. Contr. 52(5),
pp. 782–798,
doi:10.1109/TAC.2007.895849.
J. A. Goguen & J. Meseguer (1982):
Security Policy and Security Models.
In: Proc. of the 1982 Symposium on Security and Privacy.
IEEE Press,
pp. 11–20,
doi:10.1109/SP.1982.10014.
J. Golan (2003):
Semirings and affine equations over them: theory and applications.
Kluwer Academic Pub.,
doi:10.1007/978-94-017-0383-3.
Boris Köpf, Pasquale Malacaria & Catuscia Palamidessi (2012):
Quantitative Security Analysis (Dagstuhl Seminar 12481).
Dagstuhl Reports 2(11),
pp. 135–154,
doi:10.4230/DagRep.2.11.135.
Gabriele Lenzini, Fabio Martinelli, Ilaria Matteucci & Stefania Gnesi (2008):
A Uniform Approach to Security and Fault-Tolerance Specification and Analysis.
In: Architecting Dependable Systems VI,
pp. 172–201,
doi:10.1007/978-3-642-10248-6_8.
A. Lluch-Lafuente & U. Montanari (2005):
Quantitative mu-calculus and CTL defined over constraint semirings.
TCS 346(1),
pp. 135–160,
doi:10.1016/j.tcs.2005.08.006.
Fabio Martinelli & Ilaria Matteucci (2007):
An Approach for the Specification, Verification and Synthesis of Secure Systems.
Electr. Notes Theor. Comput. Sci. 168,
pp. 29–43,
doi:10.1016/j.entcs.2006.12.003.
Fabio Martinelli, Ilaria Matteucci & Charles Morisset (2012):
From Qualitative to Quantitative Enforcement of Security Policy.
In: Computer Network Security - 6th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, MMM-ACNS 2012, St. Petersburg, Russia, October 17-19, 2012. Proceedings,
pp. 22–35,
doi:10.1007/978-3-642-33704-8_3.
Fabio Martinelli, Ilaria Matteucci & Francesco Santini (2015):
Semiring-based Specification Approaches for Quantitative Security.
Technical Report TR-IIT-08-2015.
Marino Miculan & Marco Peressotti (2013):
Weak bisimulations for labelled transition systems weighted over semirings.
CoRR abs/1310.4106.
Available at http://arxiv.org/abs/1310.4106.
R. Milner (1999):
Communicating and mobile systems: the π-calculus.
Cambridge University Press.
Ian Molloy, Pau-Chen Cheng & Pankaj Rohatgi (2008):
Trading in risk: using markets to improve access control.
In: Proceedings of the 2008 Workshop on New Security Paradigms, Lake Tahoe, CA, USA, September 22-25, 2008,
pp. 107–125,
doi:10.1145/1595676.1595694.
Lei Zhang, Alexander Brodsky & Sushil Jajodia (2006):
Toward Information Sharing: Benefit And Risk Access Control (BARAC).
In: 7th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2006), 5-7 June 2006, London, Ontario, Canada,
pp. 45–53,
doi:10.1109/POLICY.2006.36.