@COMMENT{{{This file has been generated by bib2bib 1.74}}
@COMMENT{{{Command line: ./bib2bib -c 'author:"alvim" | author:"andres" | author:"aranda" | author:"aristizabal" | author:"beauxis" | author:"bonchi" | author:"bordenabe" | author:"braun" | author:"chatzikokolakis" | author:"chothia" | author:"deng" | author:"dubreil" | author:"elsalamouny" | author:"giunti" | author:"hamadou" | author:"knight" | author:"kramer" | author:"mio" | author:"olarte" | author:"palamidessi" | author:"pang" | author:"pino" | author:"pradalier" | author:"stronati" | author: "troina" | author:"valencia" | author:"wu" | author:"xu" | author:"ziegler"' -c year=2010 papers.bib}}

@INPROCEEDINGS{hamadou:2010:inria-00424853:2,
  ADDRESS = {Eindhoven, The Netherlands},
  AUTHOR = {Hamadou, Sardaouna and Palamidessi, Catuscia and Sassone, Vladimiro and ElSalamouny, Ehab},
  BOOKTITLE = {Postproceedings of the 6th International Workshop on Formal Aspects in Security and Trust},
  DATE-ADDED = {2011-01-02 19:05:50 +0100},
  DATE-MODIFIED = {2011-01-02 19:09:15 +0100},
  DOI = {10.1007/978-3-642-12459-4{\_}11},
  EDITOR = {Pierpaolo Degano and Joshua D. Guttman},
  PAGES = {141-156},
  PUBLISHER = {Springer},
  SERIES = {Lecture Notes in Computer Science},
  TITLE = {Probable Innocence and Independent Knowledge},
  URL = {http://hal.inria.fr/inria-00424853/en},
  VOLUME = {5983},
  X-ID-HAL = {inria-00424853},
  X-INTERNATIONAL-AUDIENCE = {yes},
  X-PAYS = {GB,CA},
  X-PROCEEDINGS = {yes},
  YEAR = {2010},
  BDSK-URL-1 = {http://dx.doi.org/10.1007/978-3-642-12459-4%7B%5C_%7D11}
}

@ARTICLE{Kramer:10:JCV,
  AUTHOR = {Simon Kramer and Julian C. Bradfield},
  BIBSOURCE = {DBLP, http://dblp.uni-trier.de},
  DATE-ADDED = {2010-12-30 03:55:53 +0100},
  DATE-MODIFIED = {2010-12-30 03:55:53 +0100},
  EE = {http://dx.doi.org/10.1007/s11416-009-0137-1},
  JOURNAL = {Journal in Computer Virology},
  NUMBER = {2},
  PAGES = {105-114},
  TITLE = {A general definition of malware},
  URL = {http://www.springerlink.com/content/x5373l5445477225/},
  VOLUME = {6},
  X-EDITORIAL-BOARD = {yes},
  X-INTERNATIONAL-AUDIENCE = {yes},
  X-PAYS = {GB},
  YEAR = {2010},
  BDSK-URL-1 = {http://www.springerlink.com/content/x5373l5445477225/}
}

@INPROCEEDINGS{PALAMIDESSI:2010:HAL-00548210:1,
  ADDRESS = {{L}ac {B}eaufort, {Q}u\'ebec {C}ity, {C}anada},
  AUTHOR = {{C}atuscia {P}alamidessi},
  BOOKTITLE = {Joint Conference: 10th International Conference on the Mathematics of Program Construction (MPC 2010), and 13th International Conference on Algebraic Methodology And Software Technology (AMAST 2010)},
  DATE-ADDED = {2010-12-30 03:55:53 +0100},
  DATE-MODIFIED = {2010-12-30 03:55:53 +0100},
  DOI = {10.1007/978-3-642-13321-3\_2},
  EDITOR = {{C}laude {B}olduc and {J}ules {D}esharnais and {B}{\'e}chir {K}tari},
  HAL_ID = {hal-00548210},
  LANGUAGE = {{E}nglish},
  PAGES = {19-19},
  PUBLISHER = {{S}pringer},
  SERIES = {{L}ecture {N}otes in {C}omputer {S}cience},
  TITLE = {{C}ompositionality of {S}ecure {I}nformation {F}low},
  URL = {http://hal.archives-ouvertes.fr/hal-00548210/en/},
  VOLUME = {6120},
  X-INTERNATIONAL-AUDIENCE = {yes},
  X-INVITED-CONFERENCE = {yes},
  X-PROCEEDINGS = {yes},
  YEAR = {2010},
  BDSK-URL-1 = {http://hal.archives-ouvertes.fr/hal-00548210/en/},
  BDSK-URL-2 = {http://dx.doi.org/10.1007/978-3-642-13321-3_2}
}

@INPROCEEDINGS{PALAMIDESSI:2010:HAL-00548211:1,
  ADDRESS = {{P}aphos, {C}yprus},
  AUTHOR = {Catuscia {P}alamidessi and {M}\'ario S. {A}lvim and Miguel E. Andres},
  BOOKTITLE = {{J}oint {W}orkshop on {A}utomated {R}easoning for {S}ecurity {P}rotocol {A}nalysis and {I}ssues in the {T}heory of {S}ecurity ({ARSPA}-{WITS} 2010)},
  DATE-ADDED = {2010-12-30 03:55:53 +0100},
  DATE-MODIFIED = {2010-12-30 03:55:53 +0100},
  DOI = {10.1007/978-3-642-16074-5\_8},
  EDITOR = {{A}lessandro {A}rmando and {G}avin {L}owe},
  HAL_ID = {hal-00548211},
  LANGUAGE = {{E}nglish},
  PAGES = {111-111},
  PUBLISHER = {{S}pringer},
  SERIES = {{L}ecture {N}otes in {C}omputer {S}cience},
  TITLE = {{I}nteractive {I}nformation {F}low},
  URL = {http://hal.archives-ouvertes.fr/hal-00548211/en/},
  VOLUME = {6186},
  X-INTERNATIONAL-AUDIENCE = {yes},
  X-INVITED-CONFERENCE = {yes},
  X-PAYS = {NL},
  X-PROCEEDINGS = {yes},
  YEAR = {2010},
  BDSK-URL-1 = {http://hal.archives-ouvertes.fr/hal-00548211/en/},
  BDSK-URL-2 = {http://dx.doi.org/10.1007/978-3-642-16074-5_8}
}

@INPROCEEDINGS{ALVIM:2010:HAL-00548212:1,
  ADDRESS = {{B}risbane, {A}ustralia},
  AUDIENCE = {international},
  AUTHOR = {{M}\'ario S. {A}lvim and Miguel E. Andres and {C}atuscia {P}alamidessi},
  BOOKTITLE = {6th {IFIP} {I}nternational {C}onference on {T}heoretical {C}omputer {S}cience ({TCS} 2010)},
  DATE-ADDED = {2010-12-30 03:55:53 +0100},
  DATE-MODIFIED = {2010-12-30 03:55:53 +0100},
  DOI = {10.1007/978-3-642-15240-5\_4},
  EDITOR = {{C}ristian {S}. {C}alude and {V}ladimiro {S}assone},
  HAL_ID = {hal-00548212},
  LANGUAGE = {{E}nglish},
  PAGES = {53-54},
  PUBLISHER = {{S}pringer},
  SERIES = {{IFIP} {A}dvances in {I}nformation and {C}ommunication {T}echnology},
  TITLE = {{E}ntropy and {A}ttack {M}odels in {I}nformation {F}low},
  URL = {http://hal.archives-ouvertes.fr/hal-00548212/en/},
  VOLUME = {323},
  X-INTERNATIONAL-AUDIENCE = {yes},
  X-INVITED-CONFERENCE = {yes},
  X-PAYS = {NL},
  X-PROCEEDINGS = {yes},
  YEAR = {2010},
  BDSK-URL-1 = {http://hal.archives-ouvertes.fr/hal-00548212/en/},
  BDSK-URL-2 = {http://dx.doi.org/10.1007/978-3-642-15240-5_4}
}

@ARTICLE{chatzikokolakis:2010:inria-00424860:2,
  AUTHOR = {Chatzikokolakis, Konstantinos and Palamidessi, Catuscia},
  DATE-ADDED = {2010-12-30 03:55:53 +0100},
  DATE-MODIFIED = {2010-12-30 03:55:53 +0100},
  DOI = {10.1016/j.ic.2009.06.006},
  JOURNAL = {Information and Computation},
  NUMBER = {6},
  PAGES = {694-715},
  TITLE = {Making Random Choices Invisible to the Scheduler},
  URL = {http://hal.inria.fr/inria-00424860/en},
  VOLUME = {208},
  X-EDITORIAL-BOARD = {yes},
  X-ID-HAL = {inria-00424860},
  X-INTERNATIONAL-AUDIENCE = {yes},
  YEAR = {2010},
  BDSK-URL-1 = {http://dx.doi.org/10.1016/j.ic.2009.06.006}
}

@INPROCEEDINGS{chiarugi:2010:hal-00548213:1,
  ADDRESS = {Niagara Falls, New York, USA},
  AUTHOR = {Chiarugi, Davide and Falaschi, Moreno and Olarte, Carlos and Palamidessi, Catuscia},
  BOOKTITLE = {First ACM International Conference on Bioinformatics and Computational Biology (BCB 2010)},
  DATE-ADDED = {2010-12-30 03:55:53 +0100},
  DATE-MODIFIED = {2010-12-30 03:55:53 +0100},
  DOI = {10.1145/1854776.1854843},
  PAGES = {414-417},
  PUBLISHER = {ACM Digital Libraries},
  TITLE = {Compositional modelling of signalling pathways in timed concurrent constraint programming},
  URL = {http://hal.inria.fr/hal-00548213/en},
  X-ID-HAL = {hal-00548213},
  X-INTERNATIONAL-AUDIENCE = {yes},
  X-PAYS = {IT,CO},
  X-PROCEEDINGS = {yes},
  YEAR = {2010},
  BDSK-URL-1 = {http://dx.doi.org/10.1145/1854776.1854843}
}

@INPROCEEDINGS{andres:2010:hal-00445445:2,
  ADDRESS = {Cyprus},
  AUTHOR = {Andres, Miguel E. and Palamidessi, Catuscia and Van Rossum, Peter and Smith, Geoffrey},
  BOOKTITLE = {16th International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS 2010)},
  DATE-ADDED = {2010-12-30 03:55:53 +0100},
  DATE-MODIFIED = {2010-12-30 03:55:53 +0100},
  DOI = {10.1007/978-3-642-12002-2{\_}32},
  EDITOR = {Javier Esparza and Rupak Majumdar},
  PAGES = {373-389},
  PUBLISHER = {Springer},
  SERIES = {Lecture Notes in Computer Science},
  TITLE = {Computing the Leakage of Information-Hiding Systems},
  URL = {http://hal.inria.fr/hal-00445445/en},
  VOLUME = {6015},
  X-ID-HAL = {hal-00445445},
  X-INTERNATIONAL-AUDIENCE = {yes},
  X-PAYS = {NL,US},
  X-PROCEEDINGS = {yes},
  YEAR = {2010},
  BDSK-URL-1 = {http://dx.doi.org/10.1007/978-3-642-12002-2%7B%5C_%7D32}
}

@INPROCEEDINGS{andres:2010:hal-00548187:1,
  ADDRESS = {Williamsburg, VA, USA},
  AUTHOR = {Andres, Miguel E. and Palamidessi, Catuscia and Van Rossum, Peter and Sokolova, Ana},
  BOOKTITLE = {7th IEEE International Conference on Quantitative Evaluation of SysTems (QEST 2010)},
  DATE-ADDED = {2010-12-30 03:55:53 +0100},
  DATE-MODIFIED = {2010-12-30 03:55:53 +0100},
  DOI = {10.1109/QEST.2010.11},
  PAGES = {17-26},
  PUBLISHER = {IEEE Computer Society},
  TITLE = {Information Hiding in Probabilistic Concurrent Systems},
  URL = {http://hal.inria.fr/hal-00548187/en},
  X-ID-HAL = {hal-00548187},
  X-INTERNATIONAL-AUDIENCE = {yes},
  X-PAYS = {NL,AT},
  X-PROCEEDINGS = {yes},
  YEAR = {2010},
  BDSK-URL-1 = {http://dx.doi.org/10.1109/QEST.2010.11}
}

@INPROCEEDINGS{alvim:2010:inria-00479672:2,
  ADDRESS = {Paris, France},
  AUTHOR = {Alvim, M{\'a}rio S. and Andres, Miguel E. and Palamidessi, Catuscia},
  BOOKTITLE = {21th International Conference on Concurrency Theory (CONCUR 2010)},
  DATE-ADDED = {2010-12-30 03:55:53 +0100},
  DATE-MODIFIED = {2010-12-30 03:55:53 +0100},
  DOI = {10.1007/978-3-642-15375-4{\_}8},
  EDITOR = {Paul Gastin and Fran{\c{c}}ois Laroussinie},
  PAGES = {102-116},
  PUBLISHER = {Springer},
  SERIES = {Lecture Notes in Computer Science},
  TITLE = {Information Flow in Interactive Systems},
  URL = {http://hal.inria.fr/inria-00479672/en},
  VOLUME = {6269},
  X-ID-HAL = {inria-00479672},
  X-INTERNATIONAL-AUDIENCE = {yes},
  X-PAYS = {NL},
  X-PROCEEDINGS = {yes},
  YEAR = {2010},
  BDSK-URL-1 = {http://dx.doi.org/10.1007/978-3-642-15375-4%7B%5C_%7D8}
}

@INPROCEEDINGS{alvim:2010:inria-00479674:2,
  ADDRESS = {Brisbane, Australia},
  AUTHOR = {Alvim, M{\'a}rio S. and Andres, Miguel E. and Palamidessi, Catuscia and Van Rossum, Peter},
  BOOKTITLE = {6th IFIP International Conference on Theoretical Computer Science (TCS 2010)},
  DATE-ADDED = {2010-12-30 03:55:53 +0100},
  DATE-MODIFIED = {2010-12-30 03:55:53 +0100},
  DOI = {10.1007/978-3-642-15240-5{\_}5},
  EDITOR = {Cristian S. Calude and Vladimiro Sassone},
  PAGES = {55-70},
  PUBLISHER = {Springer},
  SERIES = {IFIP Advances in Information and Communication Technology},
  TITLE = {Safe Equivalences for Security Properties},
  URL = {http://hal.inria.fr/inria-00479674/en},
  VOLUME = {323},
  X-ID-HAL = {inria-00479674},
  X-INTERNATIONAL-AUDIENCE = {yes},
  X-PAYS = {NL},
  X-PROCEEDINGS = {yes},
  YEAR = {2010},
  BDSK-URL-1 = {http://dx.doi.org/10.1007/978-3-642-15240-5%7B%5C_%7D5}
}

@INPROCEEDINGS{hamadou:2010:inria-00548007:1,
  ADDRESS = {Berleley/Oakland, California, USA},
  AUTHOR = {Hamadou, Sardaouna and Sassone, Vladimiro and Palamidessi, Catuscia},
  BOOKTITLE = {31st IEEE Symposium on Security and Privacy},
  DATE-ADDED = {2010-12-30 03:55:53 +0100},
  DATE-MODIFIED = {2010-12-30 03:55:53 +0100},
  DOI = {10.1109/SP.2010.13},
  PAGES = {79-92},
  PUBLISHER = {IEEE Computer Society},
  TITLE = {Reconciling Belief and Vulnerability in Information Flow},
  URL = {http://hal.inria.fr/inria-00548007/en},
  X-ID-HAL = {inria-00548007},
  X-INTERNATIONAL-AUDIENCE = {yes},
  X-PAYS = {GB},
  X-PROCEEDINGS = {yes},
  YEAR = {2010},
  BDSK-URL-1 = {http://dx.doi.org/10.1109/SP.2010.13}
}

@INPROCEEDINGS{alvim:2010:hal-00548200:1,
  ADDRESS = {Edinburgh, United Kingdom},
  AUTHOR = {Alvim, M{\'a}rio S. and Andres, Miguel E. and Palamidessi, Catuscia},
  BOOKTITLE = {25th Annual IEEE Symposium on Logic in Computer Science (LICS 2010)},
  DATE-ADDED = {2010-12-30 03:55:53 +0100},
  DATE-MODIFIED = {2010-12-30 03:55:53 +0100},
  DOI = {10.1109/LICS.2010.53},
  PAGES = {314-321},
  PUBLISHER = {IEEE Computer Society},
  TITLE = {Probabilistic Information Flow},
  URL = {http://hal.inria.fr/hal-00548200/en},
  X-ID-HAL = {hal-00548200},
  X-INTERNATIONAL-AUDIENCE = {yes},
  X-INVITED-CONFERENCE = {yes},
  X-PAYS = {NL},
  X-PROCEEDINGS = {yes},
  YEAR = {2010},
  BDSK-URL-1 = {http://dx.doi.org/10.1109/LICS.2010.53}
}

@TECHREPORT{pino:2010:hal-00546849:1,
  AUTHOR = {Pino, Luis},
  DATE-ADDED = {2010-12-30 03:55:53 +0100},
  DATE-MODIFIED = {2010-12-30 03:55:53 +0100},
  INSTITUTION = {Universidad del Valle, Colombia},
  NOTE = {BSc Thesis from Universidad del Valle, Colombia},
  TITLE = {Analysis of the reachability problem in fragments of the Pi-calculus},
  URL = {http://hal.inria.fr/hal-00546849/en},
  X-ID-HAL = {hal-00546849},
  YEAR = {2010}
}

@TECHREPORT{alvim:2010:hal-00548214:1,
  AUTHOR = {Alvim, M{\'a}rio S. and Chatzikokolakis, Konstantinos and Degano, Pierpaolo and Palamidessi, Catuscia},
  DATE-ADDED = {2010-12-30 03:55:53 +0100},
  DATE-MODIFIED = {2010-12-30 03:55:53 +0100},
  INSTITUTION = {INRIA},
  TITLE = {Differential Privacy versus Quantitative Information Flow},
  URL = {http://hal.inria.fr/hal-00548214/en},
  X-ID-HAL = {hal-00548214},
  X-PAYS = {NL,IT},
  YEAR = {2010}
}

@INPROCEEDINGS{darondeau:2010:inria-00510013:1,
  ADDRESS = {Berlin, Germany},
  AUTHOR = {Darondeau, Philippe and Dubreil, J{\'e}r{\'e}my and Marchand, Herv{\'e}},
  BOOKTITLE = {Workshop on Discrete Event Systems (WODES 2010)},
  DATE-ADDED = {2010-12-30 03:55:53 +0100},
  DATE-MODIFIED = {2010-12-30 03:55:53 +0100},
  MONTH = AUG,
  PAGES = {428-435},
  TITLE = {Supervisory Control for Modal Specifications of Services},
  URL = {http://hal.inria.fr/inria-00510013/en},
  X-ID-HAL = {inria-00510013},
  X-INTERNATIONAL-AUDIENCE = {yes},
  X-PROCEEDINGS = {yes},
  YEAR = {2010}
}

@INPROCEEDINGS{aristizabal:2010:hal-00546857:1,
  ADDRESS = {Edinburgh, United Kingdom},
  AUTHOR = {Aristizabal P., Andr\'es A.},
  BOOKTITLE = {Technical Communications of the 26th International Conference on Logic Programming (ICLP 2010)},
  DATE-ADDED = {2010-12-30 03:55:53 +0100},
  DATE-MODIFIED = {2010-12-30 03:55:53 +0100},
  DOI = {10.4230/LIPIcs.ICLP.2010.236},
  EDITOR = {Manuel V. Hermenegildo and Torsten Schaub},
  MONTH = JUL,
  NOTE = {Short paper accepted at the Doctoral Programme of ICLP'2010},
  PAGES = {236-240},
  PUBLISHER = {Schloss Dagstuhl - Leibniz-Zentrum fuer Informatik},
  SERIES = {Leibniz International Proceedings in Informatics},
  TITLE = {Bisimilarity in Concurrent Constraint Programming},
  URL = {http://hal.inria.fr/hal-00546857/en},
  VOLUME = {7},
  X-ID-HAL = {hal-00546857},
  X-INTERNATIONAL-AUDIENCE = {yes},
  X-PROCEEDINGS = {yes},
  YEAR = {2010},
  BDSK-URL-1 = {http://dx.doi.org/10.ISBN%20978-3-939897-17-0}
}

@INCOLLECTION{gabbrielli:2010:hal-00545256:1,
  AUTHOR = {Gabbrielli, Maurizio and Palamidessi, Catuscia and Valencia, Frank D.},
  BOOKTITLE = {A 25-Year Perspective on Logic Programming},
  DATE-ADDED = {2010-12-30 03:55:53 +0100},
  DATE-MODIFIED = {2010-12-30 03:55:53 +0100},
  DOI = {10.1007/978-3-642-14309-0{\_}11},
  EDITOR = {Agostino Dovier and Enrico Pontelli},
  MONTH = JUN,
  PAGES = {231-253},
  PUBLISHER = {Springer},
  TITLE = {Concurrent and Reactive Constraint Programming},
  URL = {http://hal.inria.fr/hal-00545256/en},
  X-ID-HAL = {hal-00545256},
  X-INTERNATIONAL-AUDIENCE = {yes},
  X-PAYS = {IT},
  YEAR = {2010},
  BDSK-URL-1 = {http://dx.doi.org/10.1007/978-3-642-14309-0%7B%5C_%7D11}
}

@ARTICLE{DubreilDM2010,
  AUTHOR = {J{\'e}r{\'e}my Dubreil and Philippe Darondeau and Herv{\'e} Marchand},
  DATE-ADDED = {2010-12-30 03:55:53 +0100},
  DATE-MODIFIED = {2010-12-30 03:55:53 +0100},
  JOURNAL = {IEEE Transactions on Automatic Control},
  MONTH = {May},
  TITLE = {Supervisory Control for Opacity},
  URL = {http://hal.archives-ouvertes.fr/inria-00483891/en},
  X-EDITORIAL-BOARD = {yes},
  X-INTERNATIONAL-AUDIENCE = {yes},
  YEAR = {2010}
}

@PHDTHESIS{braun:2010:tel-00527367:1,
  AUTHOR = {Braun, Christelle},
  DATE-ADDED = {2010-12-30 03:55:53 +0100},
  DATE-MODIFIED = {2010-12-30 03:55:53 +0100},
  MONTH = MAY,
  SCHOOL = {Ecole Polytechnique X},
  TITLE = {Quantitative Approaches to Information Hiding},
  URL = {http://hal.inria.fr/tel-00527367/en},
  X-ID-HAL = {tel-00527367},
  YEAR = {2010}
}

@TECHREPORT{darondeau:2010:inria-00472736:1,
  AUTHOR = {Darondeau, Philippe and Dubreil, J{\'e}r{\'e}my and Marchand, Herv{\'e}},
  DATE-ADDED = {2010-12-30 03:55:53 +0100},
  DATE-MODIFIED = {2010-12-30 03:55:53 +0100},
  INSTITUTION = {INRIA},
  MONTH = APR,
  NUMBER = {RR-7247},
  TITLE = {Supervisory Control for Modal Specifications of Services},
  TYPE = {Research Report},
  URL = {http://hal.inria.fr/inria-00472736/en},
  X-ID-HAL = {inria-00472736},
  YEAR = {2010}
}


This file has been generated by bibtex2html 1.74