@COMMENT{{{This file has been generated by bib2bib 1.74}}
@COMMENT{{{Command line: ./bib2bib -c 'author:"alvim" | author:"andres" | author:"aranda" | author:"aristizabal" | author:"beauxis" | author:"bonchi" | author:"bordenabe" | author:"braun" | author:"chatzikokolakis" | author:"chothia" | author:"deng" | author:"dubreil" | author:"elsalamouny" | author:"giunti" | author:"hamadou" | author:"knight" | author:"kramer" | author:"mio" | author:"olarte" | author:"palamidessi" | author:"pang" | author:"pino" | author:"pradalier" | author:"stronati" | author: "troina" | author:"valencia" | author:"wu" | author:"xu" | author:"ziegler"' -c year=2010 papers.bib}}
@INPROCEEDINGS{hamadou:2010:inria-00424853:2, ADDRESS = {Eindhoven, The Netherlands}, AUTHOR = {Hamadou, Sardaouna and Palamidessi, Catuscia and Sassone, Vladimiro and ElSalamouny, Ehab}, BOOKTITLE = {Postproceedings of the 6th International Workshop on Formal Aspects in Security and Trust}, DATE-ADDED = {2011-01-02 19:05:50 +0100}, DATE-MODIFIED = {2011-01-02 19:09:15 +0100}, DOI = {10.1007/978-3-642-12459-4{\_}11}, EDITOR = {Pierpaolo Degano and Joshua D. Guttman}, PAGES = {141-156}, PUBLISHER = {Springer}, SERIES = {Lecture Notes in Computer Science}, TITLE = {Probable Innocence and Independent Knowledge}, URL = {http://hal.inria.fr/inria-00424853/en}, VOLUME = {5983}, X-ID-HAL = {inria-00424853}, X-INTERNATIONAL-AUDIENCE = {yes}, X-PAYS = {GB,CA}, X-PROCEEDINGS = {yes}, YEAR = {2010}, BDSK-URL-1 = {http://dx.doi.org/10.1007/978-3-642-12459-4%7B%5C_%7D11} }
@ARTICLE{Kramer:10:JCV, AUTHOR = {Simon Kramer and Julian C. Bradfield}, BIBSOURCE = {DBLP, http://dblp.uni-trier.de}, DATE-ADDED = {2010-12-30 03:55:53 +0100}, DATE-MODIFIED = {2010-12-30 03:55:53 +0100}, EE = {http://dx.doi.org/10.1007/s11416-009-0137-1}, JOURNAL = {Journal in Computer Virology}, NUMBER = {2}, PAGES = {105-114}, TITLE = {A general definition of malware}, URL = {http://www.springerlink.com/content/x5373l5445477225/}, VOLUME = {6}, X-EDITORIAL-BOARD = {yes}, X-INTERNATIONAL-AUDIENCE = {yes}, X-PAYS = {GB}, YEAR = {2010}, BDSK-URL-1 = {http://www.springerlink.com/content/x5373l5445477225/} }
@INPROCEEDINGS{PALAMIDESSI:2010:HAL-00548210:1, ADDRESS = {{L}ac {B}eaufort, {Q}u\'ebec {C}ity, {C}anada}, AUTHOR = {{C}atuscia {P}alamidessi}, BOOKTITLE = {Joint Conference: 10th International Conference on the Mathematics of Program Construction (MPC 2010), and 13th International Conference on Algebraic Methodology And Software Technology (AMAST 2010)}, DATE-ADDED = {2010-12-30 03:55:53 +0100}, DATE-MODIFIED = {2010-12-30 03:55:53 +0100}, DOI = {10.1007/978-3-642-13321-3\_2}, EDITOR = {{C}laude {B}olduc and {J}ules {D}esharnais and {B}{\'e}chir {K}tari}, HAL_ID = {hal-00548210}, LANGUAGE = {{E}nglish}, PAGES = {19-19}, PUBLISHER = {{S}pringer}, SERIES = {{L}ecture {N}otes in {C}omputer {S}cience}, TITLE = {{C}ompositionality of {S}ecure {I}nformation {F}low}, URL = {http://hal.archives-ouvertes.fr/hal-00548210/en/}, VOLUME = {6120}, X-INTERNATIONAL-AUDIENCE = {yes}, X-INVITED-CONFERENCE = {yes}, X-PROCEEDINGS = {yes}, YEAR = {2010}, BDSK-URL-1 = {http://hal.archives-ouvertes.fr/hal-00548210/en/}, BDSK-URL-2 = {http://dx.doi.org/10.1007/978-3-642-13321-3_2} }
@INPROCEEDINGS{PALAMIDESSI:2010:HAL-00548211:1, ADDRESS = {{P}aphos, {C}yprus}, AUTHOR = {Catuscia {P}alamidessi and {M}\'ario S. {A}lvim and Miguel E. Andres}, BOOKTITLE = {{J}oint {W}orkshop on {A}utomated {R}easoning for {S}ecurity {P}rotocol {A}nalysis and {I}ssues in the {T}heory of {S}ecurity ({ARSPA}-{WITS} 2010)}, DATE-ADDED = {2010-12-30 03:55:53 +0100}, DATE-MODIFIED = {2010-12-30 03:55:53 +0100}, DOI = {10.1007/978-3-642-16074-5\_8}, EDITOR = {{A}lessandro {A}rmando and {G}avin {L}owe}, HAL_ID = {hal-00548211}, LANGUAGE = {{E}nglish}, PAGES = {111-111}, PUBLISHER = {{S}pringer}, SERIES = {{L}ecture {N}otes in {C}omputer {S}cience}, TITLE = {{I}nteractive {I}nformation {F}low}, URL = {http://hal.archives-ouvertes.fr/hal-00548211/en/}, VOLUME = {6186}, X-INTERNATIONAL-AUDIENCE = {yes}, X-INVITED-CONFERENCE = {yes}, X-PAYS = {NL}, X-PROCEEDINGS = {yes}, YEAR = {2010}, BDSK-URL-1 = {http://hal.archives-ouvertes.fr/hal-00548211/en/}, BDSK-URL-2 = {http://dx.doi.org/10.1007/978-3-642-16074-5_8} }
@INPROCEEDINGS{ALVIM:2010:HAL-00548212:1, ADDRESS = {{B}risbane, {A}ustralia}, AUDIENCE = {international}, AUTHOR = {{M}\'ario S. {A}lvim and Miguel E. Andres and {C}atuscia {P}alamidessi}, BOOKTITLE = {6th {IFIP} {I}nternational {C}onference on {T}heoretical {C}omputer {S}cience ({TCS} 2010)}, DATE-ADDED = {2010-12-30 03:55:53 +0100}, DATE-MODIFIED = {2010-12-30 03:55:53 +0100}, DOI = {10.1007/978-3-642-15240-5\_4}, EDITOR = {{C}ristian {S}. {C}alude and {V}ladimiro {S}assone}, HAL_ID = {hal-00548212}, LANGUAGE = {{E}nglish}, PAGES = {53-54}, PUBLISHER = {{S}pringer}, SERIES = {{IFIP} {A}dvances in {I}nformation and {C}ommunication {T}echnology}, TITLE = {{E}ntropy and {A}ttack {M}odels in {I}nformation {F}low}, URL = {http://hal.archives-ouvertes.fr/hal-00548212/en/}, VOLUME = {323}, X-INTERNATIONAL-AUDIENCE = {yes}, X-INVITED-CONFERENCE = {yes}, X-PAYS = {NL}, X-PROCEEDINGS = {yes}, YEAR = {2010}, BDSK-URL-1 = {http://hal.archives-ouvertes.fr/hal-00548212/en/}, BDSK-URL-2 = {http://dx.doi.org/10.1007/978-3-642-15240-5_4} }
@ARTICLE{chatzikokolakis:2010:inria-00424860:2, AUTHOR = {Chatzikokolakis, Konstantinos and Palamidessi, Catuscia}, DATE-ADDED = {2010-12-30 03:55:53 +0100}, DATE-MODIFIED = {2010-12-30 03:55:53 +0100}, DOI = {10.1016/j.ic.2009.06.006}, JOURNAL = {Information and Computation}, NUMBER = {6}, PAGES = {694-715}, TITLE = {Making Random Choices Invisible to the Scheduler}, URL = {http://hal.inria.fr/inria-00424860/en}, VOLUME = {208}, X-EDITORIAL-BOARD = {yes}, X-ID-HAL = {inria-00424860}, X-INTERNATIONAL-AUDIENCE = {yes}, YEAR = {2010}, BDSK-URL-1 = {http://dx.doi.org/10.1016/j.ic.2009.06.006} }
@INPROCEEDINGS{chiarugi:2010:hal-00548213:1, ADDRESS = {Niagara Falls, New York, USA}, AUTHOR = {Chiarugi, Davide and Falaschi, Moreno and Olarte, Carlos and Palamidessi, Catuscia}, BOOKTITLE = {First ACM International Conference on Bioinformatics and Computational Biology (BCB 2010)}, DATE-ADDED = {2010-12-30 03:55:53 +0100}, DATE-MODIFIED = {2010-12-30 03:55:53 +0100}, DOI = {10.1145/1854776.1854843}, PAGES = {414-417}, PUBLISHER = {ACM Digital Libraries}, TITLE = {Compositional modelling of signalling pathways in timed concurrent constraint programming}, URL = {http://hal.inria.fr/hal-00548213/en}, X-ID-HAL = {hal-00548213}, X-INTERNATIONAL-AUDIENCE = {yes}, X-PAYS = {IT,CO}, X-PROCEEDINGS = {yes}, YEAR = {2010}, BDSK-URL-1 = {http://dx.doi.org/10.1145/1854776.1854843} }
@INPROCEEDINGS{andres:2010:hal-00445445:2, ADDRESS = {Cyprus}, AUTHOR = {Andres, Miguel E. and Palamidessi, Catuscia and Van Rossum, Peter and Smith, Geoffrey}, BOOKTITLE = {16th International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS 2010)}, DATE-ADDED = {2010-12-30 03:55:53 +0100}, DATE-MODIFIED = {2010-12-30 03:55:53 +0100}, DOI = {10.1007/978-3-642-12002-2{\_}32}, EDITOR = {Javier Esparza and Rupak Majumdar}, PAGES = {373-389}, PUBLISHER = {Springer}, SERIES = {Lecture Notes in Computer Science}, TITLE = {Computing the Leakage of Information-Hiding Systems}, URL = {http://hal.inria.fr/hal-00445445/en}, VOLUME = {6015}, X-ID-HAL = {hal-00445445}, X-INTERNATIONAL-AUDIENCE = {yes}, X-PAYS = {NL,US}, X-PROCEEDINGS = {yes}, YEAR = {2010}, BDSK-URL-1 = {http://dx.doi.org/10.1007/978-3-642-12002-2%7B%5C_%7D32} }
@INPROCEEDINGS{andres:2010:hal-00548187:1, ADDRESS = {Williamsburg, VA, USA}, AUTHOR = {Andres, Miguel E. and Palamidessi, Catuscia and Van Rossum, Peter and Sokolova, Ana}, BOOKTITLE = {7th IEEE International Conference on Quantitative Evaluation of SysTems (QEST 2010)}, DATE-ADDED = {2010-12-30 03:55:53 +0100}, DATE-MODIFIED = {2010-12-30 03:55:53 +0100}, DOI = {10.1109/QEST.2010.11}, PAGES = {17-26}, PUBLISHER = {IEEE Computer Society}, TITLE = {Information Hiding in Probabilistic Concurrent Systems}, URL = {http://hal.inria.fr/hal-00548187/en}, X-ID-HAL = {hal-00548187}, X-INTERNATIONAL-AUDIENCE = {yes}, X-PAYS = {NL,AT}, X-PROCEEDINGS = {yes}, YEAR = {2010}, BDSK-URL-1 = {http://dx.doi.org/10.1109/QEST.2010.11} }
@INPROCEEDINGS{alvim:2010:inria-00479672:2, ADDRESS = {Paris, France}, AUTHOR = {Alvim, M{\'a}rio S. and Andres, Miguel E. and Palamidessi, Catuscia}, BOOKTITLE = {21th International Conference on Concurrency Theory (CONCUR 2010)}, DATE-ADDED = {2010-12-30 03:55:53 +0100}, DATE-MODIFIED = {2010-12-30 03:55:53 +0100}, DOI = {10.1007/978-3-642-15375-4{\_}8}, EDITOR = {Paul Gastin and Fran{\c{c}}ois Laroussinie}, PAGES = {102-116}, PUBLISHER = {Springer}, SERIES = {Lecture Notes in Computer Science}, TITLE = {Information Flow in Interactive Systems}, URL = {http://hal.inria.fr/inria-00479672/en}, VOLUME = {6269}, X-ID-HAL = {inria-00479672}, X-INTERNATIONAL-AUDIENCE = {yes}, X-PAYS = {NL}, X-PROCEEDINGS = {yes}, YEAR = {2010}, BDSK-URL-1 = {http://dx.doi.org/10.1007/978-3-642-15375-4%7B%5C_%7D8} }
@INPROCEEDINGS{alvim:2010:inria-00479674:2, ADDRESS = {Brisbane, Australia}, AUTHOR = {Alvim, M{\'a}rio S. and Andres, Miguel E. and Palamidessi, Catuscia and Van Rossum, Peter}, BOOKTITLE = {6th IFIP International Conference on Theoretical Computer Science (TCS 2010)}, DATE-ADDED = {2010-12-30 03:55:53 +0100}, DATE-MODIFIED = {2010-12-30 03:55:53 +0100}, DOI = {10.1007/978-3-642-15240-5{\_}5}, EDITOR = {Cristian S. Calude and Vladimiro Sassone}, PAGES = {55-70}, PUBLISHER = {Springer}, SERIES = {IFIP Advances in Information and Communication Technology}, TITLE = {Safe Equivalences for Security Properties}, URL = {http://hal.inria.fr/inria-00479674/en}, VOLUME = {323}, X-ID-HAL = {inria-00479674}, X-INTERNATIONAL-AUDIENCE = {yes}, X-PAYS = {NL}, X-PROCEEDINGS = {yes}, YEAR = {2010}, BDSK-URL-1 = {http://dx.doi.org/10.1007/978-3-642-15240-5%7B%5C_%7D5} }
@INPROCEEDINGS{hamadou:2010:inria-00548007:1, ADDRESS = {Berleley/Oakland, California, USA}, AUTHOR = {Hamadou, Sardaouna and Sassone, Vladimiro and Palamidessi, Catuscia}, BOOKTITLE = {31st IEEE Symposium on Security and Privacy}, DATE-ADDED = {2010-12-30 03:55:53 +0100}, DATE-MODIFIED = {2010-12-30 03:55:53 +0100}, DOI = {10.1109/SP.2010.13}, PAGES = {79-92}, PUBLISHER = {IEEE Computer Society}, TITLE = {Reconciling Belief and Vulnerability in Information Flow}, URL = {http://hal.inria.fr/inria-00548007/en}, X-ID-HAL = {inria-00548007}, X-INTERNATIONAL-AUDIENCE = {yes}, X-PAYS = {GB}, X-PROCEEDINGS = {yes}, YEAR = {2010}, BDSK-URL-1 = {http://dx.doi.org/10.1109/SP.2010.13} }
@INPROCEEDINGS{alvim:2010:hal-00548200:1, ADDRESS = {Edinburgh, United Kingdom}, AUTHOR = {Alvim, M{\'a}rio S. and Andres, Miguel E. and Palamidessi, Catuscia}, BOOKTITLE = {25th Annual IEEE Symposium on Logic in Computer Science (LICS 2010)}, DATE-ADDED = {2010-12-30 03:55:53 +0100}, DATE-MODIFIED = {2010-12-30 03:55:53 +0100}, DOI = {10.1109/LICS.2010.53}, PAGES = {314-321}, PUBLISHER = {IEEE Computer Society}, TITLE = {Probabilistic Information Flow}, URL = {http://hal.inria.fr/hal-00548200/en}, X-ID-HAL = {hal-00548200}, X-INTERNATIONAL-AUDIENCE = {yes}, X-INVITED-CONFERENCE = {yes}, X-PAYS = {NL}, X-PROCEEDINGS = {yes}, YEAR = {2010}, BDSK-URL-1 = {http://dx.doi.org/10.1109/LICS.2010.53} }
@TECHREPORT{pino:2010:hal-00546849:1, AUTHOR = {Pino, Luis}, DATE-ADDED = {2010-12-30 03:55:53 +0100}, DATE-MODIFIED = {2010-12-30 03:55:53 +0100}, INSTITUTION = {Universidad del Valle, Colombia}, NOTE = {BSc Thesis from Universidad del Valle, Colombia}, TITLE = {Analysis of the reachability problem in fragments of the Pi-calculus}, URL = {http://hal.inria.fr/hal-00546849/en}, X-ID-HAL = {hal-00546849}, YEAR = {2010} }
@TECHREPORT{alvim:2010:hal-00548214:1, AUTHOR = {Alvim, M{\'a}rio S. and Chatzikokolakis, Konstantinos and Degano, Pierpaolo and Palamidessi, Catuscia}, DATE-ADDED = {2010-12-30 03:55:53 +0100}, DATE-MODIFIED = {2010-12-30 03:55:53 +0100}, INSTITUTION = {INRIA}, TITLE = {Differential Privacy versus Quantitative Information Flow}, URL = {http://hal.inria.fr/hal-00548214/en}, X-ID-HAL = {hal-00548214}, X-PAYS = {NL,IT}, YEAR = {2010} }
@INPROCEEDINGS{darondeau:2010:inria-00510013:1, ADDRESS = {Berlin, Germany}, AUTHOR = {Darondeau, Philippe and Dubreil, J{\'e}r{\'e}my and Marchand, Herv{\'e}}, BOOKTITLE = {Workshop on Discrete Event Systems (WODES 2010)}, DATE-ADDED = {2010-12-30 03:55:53 +0100}, DATE-MODIFIED = {2010-12-30 03:55:53 +0100}, MONTH = AUG, PAGES = {428-435}, TITLE = {Supervisory Control for Modal Specifications of Services}, URL = {http://hal.inria.fr/inria-00510013/en}, X-ID-HAL = {inria-00510013}, X-INTERNATIONAL-AUDIENCE = {yes}, X-PROCEEDINGS = {yes}, YEAR = {2010} }
@INPROCEEDINGS{aristizabal:2010:hal-00546857:1, ADDRESS = {Edinburgh, United Kingdom}, AUTHOR = {Aristizabal P., Andr\'es A.}, BOOKTITLE = {Technical Communications of the 26th International Conference on Logic Programming (ICLP 2010)}, DATE-ADDED = {2010-12-30 03:55:53 +0100}, DATE-MODIFIED = {2010-12-30 03:55:53 +0100}, DOI = {10.4230/LIPIcs.ICLP.2010.236}, EDITOR = {Manuel V. Hermenegildo and Torsten Schaub}, MONTH = JUL, NOTE = {Short paper accepted at the Doctoral Programme of ICLP'2010}, PAGES = {236-240}, PUBLISHER = {Schloss Dagstuhl - Leibniz-Zentrum fuer Informatik}, SERIES = {Leibniz International Proceedings in Informatics}, TITLE = {Bisimilarity in Concurrent Constraint Programming}, URL = {http://hal.inria.fr/hal-00546857/en}, VOLUME = {7}, X-ID-HAL = {hal-00546857}, X-INTERNATIONAL-AUDIENCE = {yes}, X-PROCEEDINGS = {yes}, YEAR = {2010}, BDSK-URL-1 = {http://dx.doi.org/10.ISBN%20978-3-939897-17-0} }
@INCOLLECTION{gabbrielli:2010:hal-00545256:1, AUTHOR = {Gabbrielli, Maurizio and Palamidessi, Catuscia and Valencia, Frank D.}, BOOKTITLE = {A 25-Year Perspective on Logic Programming}, DATE-ADDED = {2010-12-30 03:55:53 +0100}, DATE-MODIFIED = {2010-12-30 03:55:53 +0100}, DOI = {10.1007/978-3-642-14309-0{\_}11}, EDITOR = {Agostino Dovier and Enrico Pontelli}, MONTH = JUN, PAGES = {231-253}, PUBLISHER = {Springer}, TITLE = {Concurrent and Reactive Constraint Programming}, URL = {http://hal.inria.fr/hal-00545256/en}, X-ID-HAL = {hal-00545256}, X-INTERNATIONAL-AUDIENCE = {yes}, X-PAYS = {IT}, YEAR = {2010}, BDSK-URL-1 = {http://dx.doi.org/10.1007/978-3-642-14309-0%7B%5C_%7D11} }
@ARTICLE{DubreilDM2010, AUTHOR = {J{\'e}r{\'e}my Dubreil and Philippe Darondeau and Herv{\'e} Marchand}, DATE-ADDED = {2010-12-30 03:55:53 +0100}, DATE-MODIFIED = {2010-12-30 03:55:53 +0100}, JOURNAL = {IEEE Transactions on Automatic Control}, MONTH = {May}, TITLE = {Supervisory Control for Opacity}, URL = {http://hal.archives-ouvertes.fr/inria-00483891/en}, X-EDITORIAL-BOARD = {yes}, X-INTERNATIONAL-AUDIENCE = {yes}, YEAR = {2010} }
@PHDTHESIS{braun:2010:tel-00527367:1, AUTHOR = {Braun, Christelle}, DATE-ADDED = {2010-12-30 03:55:53 +0100}, DATE-MODIFIED = {2010-12-30 03:55:53 +0100}, MONTH = MAY, SCHOOL = {Ecole Polytechnique X}, TITLE = {Quantitative Approaches to Information Hiding}, URL = {http://hal.inria.fr/tel-00527367/en}, X-ID-HAL = {tel-00527367}, YEAR = {2010} }
@TECHREPORT{darondeau:2010:inria-00472736:1, AUTHOR = {Darondeau, Philippe and Dubreil, J{\'e}r{\'e}my and Marchand, Herv{\'e}}, DATE-ADDED = {2010-12-30 03:55:53 +0100}, DATE-MODIFIED = {2010-12-30 03:55:53 +0100}, INSTITUTION = {INRIA}, MONTH = APR, NUMBER = {RR-7247}, TITLE = {Supervisory Control for Modal Specifications of Services}, TYPE = {Research Report}, URL = {http://hal.inria.fr/inria-00472736/en}, X-ID-HAL = {inria-00472736}, YEAR = {2010} }
This file has been generated by bibtex2html 1.74