![]() | Up a level |
Hadj-Alouane, N. B., Lafrance, S., Lin, F., Mullins, J., & Yeddes, M. (2004, December). An algorithmic approach to verification of intransitive non-interference in security policies [Paper]. 43rd IEEE Conference on Decision and Control (CDC 2004), Atlantis, Paradise Island, Bahamas. External link
Hadj-Alouane, N. B., Lafrance, S., Lin, F., Mullins, J., & Yeddes, M. (2004, September). Discrete event systems approach to the verification of the information flow properties in secure protocols [Paper]. 7th Workshop on Discrete Event System (WODES 2004), Reims, France. External link
Mullins, J., & Yeddes, M. (2001, April). Two proof methods for bisimulation-based non-deterministic admissible interference [Paper]. IEEE TC-ECBS and IFIP WG10.1 Joint Workshop on Formal Specifications of Computer-Based Systems, Washington, D.C.. Unavailable
Yeddes, M., & Mullins, J. (2001, September). Quasi-synchronous approach for distributed control in synchronous systems [Paper]. IEEE International Symposium on Intelligent Control (ISIC 2001), Mexico City, Mexico. External link