Publications

Search results for wp3  [Reset Search]
2013
Formal Modeling and Analysis of Timed Systems - 11th International Conference, FORMATS 2013, Buenos Aires, Argentina, August 29-31, 2013. Proceedings”, FORMATS, vol. 8053. 2013.
M. E. Andrés, N. E. Bordenabe, K. Chatzikokolakis, and C. Palamidessi, “Geo-Indistinguishability: Differential Privacy for Location-Based Systems”, in 20th ACM Conference on Computer and Communications Security, Berlin, Germany, 2013.
F. Biondi, A. Legay, B. F. Nielsen, and A. Wasowski, “Maximizing Entropy over Markov Processes”, in Language and Automata Theory and Applications - 7th International Conference, {LATA} 2013, Bilbao, Spain, April 2-5, 2013. Proceedings, 2013.PDF iconmain.pdf (268.88 KB)
L. Xu, “Modular Reasoning about Differential Privacy in a Probabilistic Process Calculus”, in 7th International Symposium on Trustworthy Global Computing (TGC), Newcastle upon Tyne, United Kingdom, 2013.
I. Gazeau, D. Miller, and C. Palamidessi, “Preserving differential privacy under finite-precision semantics”, in Proceedings of the Eleventh Workshop on Quantitative Aspects of Programming Languages (QAPL), 2013.PDF icondiff_priv.pdf (213.64 KB)
F. Biondi, A. Legay, L. - M. Traonouez, and A. Wasowski, “{QUAIL:} {A} Quantitative Security Analyzer for Imperative Code”, in Computer Aided Verification - 25th International Conference, {CAV} 2013, Saint Petersburg, Russia, July 13-19, 2013. Proceedings, 2013.PDF iconmain.pdf (187.56 KB)
F. Biondi, A. Legay, P. Malacaria, and A. Wasowski, “Quantifying Information Leakage of Randomized Protocols”, in Verification, Model Checking, and Abstract Interpretation, 14th International Conference, {VMCAI} 2013, Rome, Italy, January 20-22, 2013. Proceedings, 2013.PDF iconvmcai2013.pdf (865.61 KB)
C. Palamidessi, “Quantitative Approaches to Information Protection”, in Logic, Language, Information, and Computation - 20th International Workshop, WoLLIC 2013, Darmstadt, Germany, August 20-23, 2013. Proceedings, 2013.
Quantitative Evaluation of Systems - 10th International Conference, QEST 2013, Buenos Aires, Argentina, August 27-30, 2013. Proceedings”, Lecture Notes in Computer Science, vol. 8054. 2013.
S. S. Pelozo and P. R. D'Argenio, “Security Analysis in Probabilistic Distributed Protocols via Bounded Reachability”, in Trustworthy Global Computing, vol. 8191, C. Palamidessi and M. D. Ryan, Eds. 2013, p. 182-197.
M. Veeningen, M. Brusò, J. den Hartog, and N. Zannone, “TRIPLEX: Verifying Data Minimisation in Communication Systems”, in CCS, 2013.
Trustworthy Global Computing - 7th International Symposium, TGC 2012, Newcastle upon Tyne, UK, September 7-8, 2012, Revised Selected Papers”, TGC, vol. 8191. 2013.
2012
C. Palamidessi and M. Stronati, “Differential Privacy for Relational Algebra: Improving the Sensitivity Bounds via Constraint Systems”, in Proceedings 10th Workshop on Quantitative Aspects of Programming Languages and Systems, 2012.
K. Chatzikokolakis, S. Knight, C. Palamidessi, and P. Panangaden, “Epistemic Strategies and Games on Concurrent Processes”, ACM Trans. Comput. Log., vol. 13, p. 28, 2012.
M. Veeningen, B. de Weger, and N. Zannone, “Formal Modelling of (De)Pseudonymisation: A Case Study in Health Care Privacy”, in Security and Trust Management - 8th International Workshop, STM 2012, Pisa, Italy, September 13-14, 2012, Revised Selected Papers, 2012.
M. S. Alvim, K. Chatzikokolakis, C. Palamidessi, and G. Smith, “Measuring Information Leakage using Generalized Gain Functions”, in Proceedings of the Computer Security Foundations Symposium (CSF), 2012, p. 265-279.PDF icongleakage.pdf (330.44 KB)
M. S. Alvim, M. E. Andrés, and C. Palamidessi, “Quantitative information flow in interactive systems”, Journal of Computer Security, vol. 20, p. 3-50, 2012.PDF iconfull.pdf (532.59 KB)
Quantitative Security Analysis (Dagstuhl Seminar 12481)”, Dagstuhl Reports, vol. 2. p. 135-154, 2012.
S. Knight, C. Palamidessi, P. Panangaden, and D. Valencia, Frank, “Spatial and Epistemic Modalities in Constraint-Based Process Calculi”, in Proceedings of CONCUR, Newcastle upon Tyne, UK, 2012.PDF iconhal.archives-ouvertes.fr:docs:00:76:11:16:PDF:eccp.pdf (2.71 MB)
S. Abramsky, M. W. Mislove, and C. Palamidessi, “Special issue dedicated to a selection of papers of the conference Mathematical Foundations of Programming Semantics (MFPS XXV)”, Theor. Comput. Sci., vol. 430, p. 1-2, 2012.
R. Corin and F. Manzano, “Taint Analysis of Security Code in the KLEE Symbolic Execution Engine”, in 2012 International Conference on Information and Communications Security (ICICS), Hong Kong, 2012.PDF icon76180264 (1).pdf (252.37 KB)
K. Bhargavan, C. Fournet, R. Corin, and E. Zalinescu, “Verified Cryptographic Implementations for TLS”, ACM Trans. Inf. Syst. Secur., vol. 15, p. 3, 2012.

Pages