2008 | ||
---|---|---|
10 | EE | Damas P. Gruska: Probabilistic Information Flow Security. Fundam. Inform. 85(1-4): 173-187 (2008) |
9 | EE | Damas P. Gruska, Andrea Maggiolo-Schettini, Paolo Milazzo: Security in a Model for Long-running Transactions. Fundam. Inform. 85(1-4): 189-203 (2008) |
2007 | ||
8 | EE | Damas P. Gruska: Observation Based System Security. Fundam. Inform. 79(3-4): 335-346 (2007) |
2006 | ||
7 | EE | Damas P. Gruska: Information-Flow Attacks Based on Limited Observations. Ershov Memorial Conference 2006: 223-234 |
6 | EE | Damas P. Gruska: Network Information Flow. Fundam. Inform. 72(1-3): 167-180 (2006) |
2001 | ||
5 | Damas P. Gruska, Andrea Maggiolo-Schettini: Process Algebras for Network Communication. Fundam. Inform. 45(4): 359-378 (2001) | |
1997 | ||
4 | Damas P. Gruska: Bounded Concurrency. FCT 1997: 198-209 | |
1996 | ||
3 | Damas P. Gruska: Process Algebra for Shared Ressources. Parcella 1996: 300-301 | |
1992 | ||
2 | Damas P. Gruska, Andrea Maggiolo-Schettini: Process Communication Environment. NAPAW 1992: 27-40 | |
1990 | ||
1 | Damas P. Gruska: Genomorphisms of Semi-Modular Lattices. J. Comput. Syst. Sci. 40(2): 182-187 (1990) |
1 | Andrea Maggiolo-Schettini | [2] [5] [9] |
2 | Paolo Milazzo | [9] |