Sfoglia per Autore
Performance preorder: Ordering processes with respect to speed
1995 Corradini F.; Gorrieri R.; Roccetti M.
A theory of processes with durational actions
1995 Gorrieri R.; Roccetti M.; Stancampiano E.
Performance preorder and competitive equivalence
1997 Corradini F.; Gorrieri R.; Roccetti M.
Formal Performance Modelling and Evaluation of an Adaptive Mechanism for Packetised Audio over the Internet
1998 Bernardo M.; Gorrieri R.; Roccetti M.
Comparing the QoS of Internet Audio Mechanisms via Formal Methods
2001 Aldini A.; Gorrieri R.; Roccetti M.; Bernardo M.
QoS evaluation of IP telephony services: A specification language based simulation software tool
2003 Roccetti M.; Aldini A.; Bernardo M.; Gorrieri R.
On Securing Real-Time Speech Transmission Over the Internet: An Experimental Study
2003 Aldini A.; Roccetti M.; Gorrieri R.
Web Services for E-commerce: guaranteeing security access and quality of service
2004 M. Bravetti; R. Lucchi; G. Zavattaro; R. Gorrieri
Contrasting Malicious Applets by Modifying the Java Virtual Machine
2004 V.Ciaschini; R.Gorrieri
Two Formal Approaches for Approximating Noninterference Properties
2004 A.Aldini; M.Bravetti; A.Di Pierro; R.Gorrieri; C.Hankin; H.Wiklicky
Classification of Security Properties. Part II: Network Security
2004 R.Focardi; R.Gorrieri; F.Martinelli
Positive Non–Interference in Elementary and Trace Nets
2004 BUSI N.; R. GORRIERI
Foundations of Security Analysis and design II
2004 R. Focardi; R. Gorrieri
Automated Analysis of Timed Security: A Case Study on Web Privacy
2004 R.Gorrieri; R.Lanotte; A.Maggiolo-Schettini; F.Martinelli; S.Tini; E.Tronci
Combining Partitions in SecSpaces
2004 M. Bravetti; R. Gorrieri; R. Lucchi; G. Zavattaro
Proceedings of the MEFISTO Project 2003, Formal Methods for Security and Time
2004 M. Bravetti; R. Gorrieri
Probabilistic and Prioritized Data Retrieval in the Linda Coordination Model
2004 M. Bravetti; R. Gorrieri; R. Lucchi; G. Zavattaro
Approximating Imperfect Cryptography in a Formal Model
2004 Troina, Angelo; Aldini, Alessandro; Gorrieri, Roberto
A Simple Framework for Real-time Cryptographic Protocol Analysis with Compositional Proof Rules
2004 Roberto Gorrieri; F.Martinelli
A Process Algebraic Approach for the Analysis of Probabilistic Non-Interference
2004 A.Aldini; M.Bravetti; R.Gorrieri
Titolo | Autore(i) | Anno | Periodico | Editore | Tipo | File |
---|---|---|---|---|---|---|
Performance preorder: Ordering processes with respect to speed | Corradini F.; Gorrieri R.; Roccetti M. | 1995-01-01 | - | Springer Verlag | 4.01 Contributo in Atti di convegno | - |
A theory of processes with durational actions | Gorrieri R.; Roccetti M.; Stancampiano E. | 1995-01-01 | THEORETICAL COMPUTER SCIENCE | - | 1.01 Articolo in rivista | - |
Performance preorder and competitive equivalence | Corradini F.; Gorrieri R.; Roccetti M. | 1997-01-01 | ACTA INFORMATICA | - | 1.01 Articolo in rivista | - |
Formal Performance Modelling and Evaluation of an Adaptive Mechanism for Packetised Audio over the Internet | Bernardo M.; Gorrieri R.; Roccetti M. | 1998-01-01 | FORMAL ASPECTS OF COMPUTING | - | 1.01 Articolo in rivista | - |
Comparing the QoS of Internet Audio Mechanisms via Formal Methods | Aldini A.; Gorrieri R.; Roccetti M.; Bernardo M. | 2001-01-01 | ACM TRANSACTIONS ON MODELING AND COMPUTER SIMULATION | - | 1.01 Articolo in rivista | - |
QoS evaluation of IP telephony services: A specification language based simulation software tool | Roccetti M.; Aldini A.; Bernardo M.; Gorrieri R. | 2003-01-01 | SYSTEMS ANALYSIS, MODELLING, SIMULATION | - | 1.01 Articolo in rivista | - |
On Securing Real-Time Speech Transmission Over the Internet: An Experimental Study | Aldini A.; Roccetti M.; Gorrieri R. | 2003-01-01 | EURASIP JOURNAL ON APPLIED SIGNAL PROCESSING | - | 1.01 Articolo in rivista | - |
Web Services for E-commerce: guaranteeing security access and quality of service | M. Bravetti; R. Lucchi; G. Zavattaro; R. Gorrieri | 2004-01-01 | - | ACM Press | 4.01 Contributo in Atti di convegno | - |
Contrasting Malicious Applets by Modifying the Java Virtual Machine | V.Ciaschini; R.Gorrieri | 2004-01-01 | - | Kluwer | 4.01 Contributo in Atti di convegno | - |
Two Formal Approaches for Approximating Noninterference Properties | A.Aldini; M.Bravetti; A.Di Pierro; R.Gorrieri; C.Hankin; H.Wiklicky | 2004-01-01 | - | Springer | 2.01 Capitolo / saggio in libro | - |
Classification of Security Properties. Part II: Network Security | R.Focardi; R.Gorrieri; F.Martinelli | 2004-01-01 | - | Springer | 2.01 Capitolo / saggio in libro | - |
Positive Non–Interference in Elementary and Trace Nets | BUSI N.; R. GORRIERI | 2004-01-01 | - | Springer | 2.01 Capitolo / saggio in libro | - |
Foundations of Security Analysis and design II | R. Focardi; R. Gorrieri | 2004-01-01 | - | Springer | 3.02 Curatela | - |
Automated Analysis of Timed Security: A Case Study on Web Privacy | R.Gorrieri; R.Lanotte; A.Maggiolo-Schettini; F.Martinelli; S.Tini; E.Tronci | 2004-01-01 | INTERNATIONAL JOURNAL OF INFORMATION SECURITY | - | 1.01 Articolo in rivista | - |
Combining Partitions in SecSpaces | M. Bravetti; R. Gorrieri; R. Lucchi; G. Zavattaro | 2004-01-01 | ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE | - | 4.01 Contributo in Atti di convegno | - |
Proceedings of the MEFISTO Project 2003, Formal Methods for Security and Time | M. Bravetti; R. Gorrieri | 2004-01-01 | - | Elsevier | 3.02 Curatela | - |
Probabilistic and Prioritized Data Retrieval in the Linda Coordination Model | M. Bravetti; R. Gorrieri; R. Lucchi; G. Zavattaro | 2004-01-01 | - | Springer | 4.01 Contributo in Atti di convegno | - |
Approximating Imperfect Cryptography in a Formal Model | Troina, Angelo; Aldini, Alessandro; Gorrieri, Roberto | 2004-01-01 | ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE | - | 1.01 Articolo in rivista | - |
A Simple Framework for Real-time Cryptographic Protocol Analysis with Compositional Proof Rules | Roberto Gorrieri; F.Martinelli | 2004-01-01 | SCIENCE OF COMPUTER PROGRAMMING | - | 1.01 Articolo in rivista | - |
A Process Algebraic Approach for the Analysis of Probabilistic Non-Interference | A.Aldini; M.Bravetti; R.Gorrieri | 2004-01-01 | JOURNAL OF COMPUTER SECURITY | - | 1.01 Articolo in rivista | - |
Legenda icone
- file ad accesso aperto
- file disponibili sulla rete interna
- file disponibili agli utenti autorizzati
- file disponibili solo agli amministratori
- file sotto embargo
- nessun file disponibile