![]() |
| 2008 | ||
|---|---|---|
| 10 | EE | Damas P. Gruska: Probabilistic Information Flow Security. Fundam. Inform. 85(1-4): 173-187 (2008) |
| 9 | EE | Damas P. Gruska, Andrea Maggiolo-Schettini, Paolo Milazzo: Security in a Model for Long-running Transactions. Fundam. Inform. 85(1-4): 189-203 (2008) |
| 2007 | ||
| 8 | EE | Damas P. Gruska: Observation Based System Security. Fundam. Inform. 79(3-4): 335-346 (2007) |
| 2006 | ||
| 7 | EE | Damas P. Gruska: Information-Flow Attacks Based on Limited Observations. Ershov Memorial Conference 2006: 223-234 |
| 6 | EE | Damas P. Gruska: Network Information Flow. Fundam. Inform. 72(1-3): 167-180 (2006) |
| 2001 | ||
| 5 | Damas P. Gruska, Andrea Maggiolo-Schettini: Process Algebras for Network Communication. Fundam. Inform. 45(4): 359-378 (2001) | |
| 1997 | ||
| 4 | Damas P. Gruska: Bounded Concurrency. FCT 1997: 198-209 | |
| 1996 | ||
| 3 | Damas P. Gruska: Process Algebra for Shared Ressources. Parcella 1996: 300-301 | |
| 1992 | ||
| 2 | Damas P. Gruska, Andrea Maggiolo-Schettini: Process Communication Environment. NAPAW 1992: 27-40 | |
| 1990 | ||
| 1 | Damas P. Gruska: Genomorphisms of Semi-Modular Lattices. J. Comput. Syst. Sci. 40(2): 182-187 (1990) | |
| 1 | Andrea Maggiolo-Schettini | [2] [5] [9] |
| 2 | Paolo Milazzo | [9] |