References

  1. A. Aldini & A. Di Pierro (2008): Estimating the maximum information leakage. Int. J. Inf. Sec. 7(3), pp. 219–242, doi:10.1007/s10207-007-0050-x.
  2. H. R. Andersen (1995): Partial Model Checking. In: LICS '95. IEEE Computer Society, pp. 398, doi:10.1109/LICS.1995.523274.
  3. E. Bartocci, L. Bortolussi, L. Nenzi & G. Sanguinetti (2013): On the Robustness of Temporal Properties for Stochastic Models. In: 2nd International Workshop on Hybrid Systems and Biology, EPTCS 125, pp. 3–19, doi:10.4204/EPTCS.125.1.
  4. N. Bielova & F. Massacci (2011): Predictability of Enforcement. In: Proceedings of ESSoS 2011 6542. Springer, pp. 73–86, doi:10.1007/978-3-642-19125-1_6.
  5. S. Bistarelli, S. N. Foley, B. O'Sullivan & F. Santini (2010): Semiring-based frameworks for trust propagation in small-world networks and coalition formation criteria. Security and Communication Networks 3(6), pp. 595–610, doi:10.1002/sec.252.
  6. S. Bistarelli, F. Martinelli & F. Santini (2012): A semiring-based framework for the deduction/abduction reasoning in access control with weighted credentials. CAMWA 64(4), pp. 447–462, doi:10.1016/j.camwa.2011.12.017.
  7. S. Bistarelli, U. Montanari & F. Rossi (1997): Semiring-based constraint satisfaction and optimization. J. ACM 44(2), pp. 201–236, doi:10.1145/256303.256306.
  8. Stefano Bistarelli & Fabio Gadducci (2006): Enhancing Constraints Manipulation in Semiring-based Formalisms. In: Proceedings of the 2006 Conference on ECAI 2006: 17th European Conference on Artificial Intelligence. IOS Press, pp. 63–67. Available at http://dl.acm.org/citation.cfm?id=1567016.1567036.
  9. T. S. Blyth & M. F. Janowitz (1972): Residuation theory 102. Pergamon press Oxford.
  10. Peter Buchholz & Peter Kemper (2001): Quantifying the Dynamic Behavior of Process Algebras. In: Process Algebra and Probabilistic Methods, Performance Modeling and Verification: Joint International Workshop, PAPM-PROBMIV 2001, Aachen, Germany, September 12-14, 2001, Proceedings, pp. 184–199, doi:10.1007/3-540-44804-7_12.
  11. Y. Cao, S. X. Sun, H. Wang & G. Chen (2013): A Behavioral Distance for Fuzzy-Transition Systems. IEEE T. Fuzzy Systems 21(4), pp. 735–747, doi:10.1109/TFUZZ.2012.2230177.
  12. Pau-Chen Cheng, Pankaj Rohatgi, Claudia Keser, Paul A. Karger, Grant M. Wagner & Angela Schuett Reninger (2007): Fuzzy Multi-Level Security: An Experiment on Quantified Risk-Adaptive Access Control. In: 2007 IEEE Symposium on Security and Privacy (S&P 2007), 20-23 May 2007, Oakland, California, USA, pp. 222–230, doi:10.1109/SP.2007.21.
  13. Peter Drábik, Fabio Martinelli & Charles Morisset (2012): Cost-Aware Runtime Enforcement of Security Policies. In: Security and Trust Management - 8th International Workshop, STM 2012, Pisa, Italy, September 13-14, 2012, Revised Selected Papers, pp. 1–16, doi:10.1007/978-3-642-38004-4_1.
  14. Marco Faella, Axel Legay & Mariëlle Stoelinga (2008): Model Checking Quantitative Linear Time Logic. Electr. Notes Theor. Comput. Sci. 220(3), pp. 61–77, doi:10.1016/j.entcs.2008.11.019.
  15. Riccardo Focardi & Roberto Gorrieri (2000): Classification of Security Properties (Part I: Information Flow). In: Foundations of Security Analysis and Design, Tutorial Lectures [revised versions of lectures given during the IFIP WG 1.7 International School on Foundations of Security Analysis and Design, FOSAD 2000, Bertinoro, Italy, September 2000], pp. 331–396, doi:10.1007/3-540-45608-2_6.
  16. Riccardo Focardi, Roberto Gorrieri & Fabio Martinelli (2002): Classification of Security Properties - Part II: Network Security. In: Foundations of Security Analysis and Design II, FOSAD 2001/2002 Tutorial Lectures, pp. 139–185, doi:10.1007/978-3-540-24631-2_4.
  17. Riccardo Focardi & Fabio Martinelli (1999): A Uniform Approach for the Definition of Security Properties. In: FM'99 - Formal Methods, World Congress on Formal Methods in the Development of Computing Systems, Toulouse, France, September 20-24, 1999, Proceedings, Volume I, pp. 794–813, doi:10.1007/3-540-48119-2_44.
  18. A. Girard & G. J. Pappas (2007): Approximation Metrics for Discrete and Continuous Systems. IEEE Trans. Automat. Contr. 52(5), pp. 782–798, doi:10.1109/TAC.2007.895849.
  19. J. A. Goguen & J. Meseguer (1982): Security Policy and Security Models. In: Proc. of the 1982 Symposium on Security and Privacy. IEEE Press, pp. 11–20, doi:10.1109/SP.1982.10014.
  20. J. Golan (2003): Semirings and affine equations over them: theory and applications. Kluwer Academic Pub., doi:10.1007/978-94-017-0383-3.
  21. Boris Köpf, Pasquale Malacaria & Catuscia Palamidessi (2012): Quantitative Security Analysis (Dagstuhl Seminar 12481). Dagstuhl Reports 2(11), pp. 135–154, doi:10.4230/DagRep.2.11.135.
  22. Gabriele Lenzini, Fabio Martinelli, Ilaria Matteucci & Stefania Gnesi (2008): A Uniform Approach to Security and Fault-Tolerance Specification and Analysis. In: Architecting Dependable Systems VI, pp. 172–201, doi:10.1007/978-3-642-10248-6_8.
  23. A. Lluch-Lafuente & U. Montanari (2005): Quantitative mu-calculus and CTL defined over constraint semirings. TCS 346(1), pp. 135–160, doi:10.1016/j.tcs.2005.08.006.
  24. Fabio Martinelli & Ilaria Matteucci (2007): An Approach for the Specification, Verification and Synthesis of Secure Systems. Electr. Notes Theor. Comput. Sci. 168, pp. 29–43, doi:10.1016/j.entcs.2006.12.003.
  25. Fabio Martinelli, Ilaria Matteucci & Charles Morisset (2012): From Qualitative to Quantitative Enforcement of Security Policy. In: Computer Network Security - 6th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, MMM-ACNS 2012, St. Petersburg, Russia, October 17-19, 2012. Proceedings, pp. 22–35, doi:10.1007/978-3-642-33704-8_3.
  26. Fabio Martinelli, Ilaria Matteucci & Francesco Santini (2015): Semiring-based Specification Approaches for Quantitative Security. Technical Report TR-IIT-08-2015.
  27. Marino Miculan & Marco Peressotti (2013): Weak bisimulations for labelled transition systems weighted over semirings. CoRR abs/1310.4106. Available at http://arxiv.org/abs/1310.4106.
  28. R. Milner (1999): Communicating and mobile systems: the π-calculus. Cambridge University Press.
  29. Ian Molloy, Pau-Chen Cheng & Pankaj Rohatgi (2008): Trading in risk: using markets to improve access control. In: Proceedings of the 2008 Workshop on New Security Paradigms, Lake Tahoe, CA, USA, September 22-25, 2008, pp. 107–125, doi:10.1145/1595676.1595694.
  30. Sergiu Rudeanu & Dragos Vaida (2004): Semirings in Operations Research and Computer Science: More Algebra. Fundam. Inform. 61(1), pp. 61–85. Available at http://content.iospress.com/articles/fundamenta-informaticae/fi61-1-06.
  31. Lei Zhang, Alexander Brodsky & Sushil Jajodia (2006): Toward Information Sharing: Benefit And Risk Access Control (BARAC). In: 7th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2006), 5-7 June 2006, London, Ontario, Canada, pp. 45–53, doi:10.1109/POLICY.2006.36.

Comments and questions to: eptcs@eptcs.org
For website issues: webmaster@eptcs.org