The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

A. W. Roscoe: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Steve Schneider, Jim Davies, D. M. Jackson, George M. Reed, Joy N. Reed, A. W. Roscoe
    Timed CSP: Theory and Practice. [Citation Graph (1, 0)][DBLP]
    REX Workshop, 1991, pp:640-675 [Conf]
  2. Stephen D. Brookes, C. A. R. Hoare, A. W. Roscoe
    A Theory of Communicating Sequential Processes. [Citation Graph (1, 0)][DBLP]
    J. ACM, 1984, v:31, n:3, pp:560-599 [Journal]
  3. A. W. Roscoe
    Specifying problem one using the failure sets model for CSP and deriving CSP processes which meett this specification. [Citation Graph (0, 0)][DBLP]
    The Analysis of Concurrent Systems, 1983, pp:103-109 [Conf]
  4. A. W. Roscoe
    A CSP solution to the "trains" problem. [Citation Graph (0, 0)][DBLP]
    The Analysis of Concurrent Systems, 1983, pp:384-388 [Conf]
  5. Ranko Lazic, Thomas Christopher Newcomb, A. W. Roscoe
    On Model Checking Data-Independent Systems with Arrays with Whole-Array Operations. [Citation Graph (0, 0)][DBLP]
    25 Years Communicating Sequential Processes, 2004, pp:275-291 [Conf]
  6. A. W. Roscoe
    Seeing Beyond Divergence. [Citation Graph (0, 0)][DBLP]
    25 Years Communicating Sequential Processes, 2004, pp:15-35 [Conf]
  7. Stephen D. Brookes, A. W. Roscoe
    An Improved Failures Model for Communicating Processes. [Citation Graph (0, 0)][DBLP]
    Seminar on Concurrency, 1984, pp:281-305 [Conf]
  8. George M. Reed, A. W. Roscoe
    Analysing TMFS: a Study of Nondeterminism in Real-Time Concurrency. [Citation Graph (0, 0)][DBLP]
    Concurrency: Theory, Language, And Architecture, 1989, pp:36-63 [Conf]
  9. A. W. Roscoe
    Denotational Semantics for occam. [Citation Graph (0, 0)][DBLP]
    Seminar on Concurrency, 1984, pp:306-329 [Conf]
  10. Philippa J. Broadfoot, A. W. Roscoe
    Capturing Parallel Attacks within the Data Independence Framework. [Citation Graph (0, 0)][DBLP]
    CSFW, 2002, pp:147-159 [Conf]
  11. A. W. Roscoe
    Modelling and verifying key-exchange protocols using CSP and FDR. [Citation Graph (0, 0)][DBLP]
    CSFW, 1995, pp:98-107 [Conf]
  12. A. W. Roscoe
    Intensional specifications of security protocols. [Citation Graph (0, 0)][DBLP]
    CSFW, 1996, pp:28-38 [Conf]
  13. A. W. Roscoe
    Proving Security Protocols with Model Checkers by Data Independence Techniques. [Citation Graph (0, 0)][DBLP]
    CSFW, 1998, pp:84-95 [Conf]
  14. A. W. Roscoe, M. H. Goldsmith
    What Is Intransitive Noninterference? [Citation Graph (0, 0)][DBLP]
    CSFW, 1999, pp:228-238 [Conf]
  15. A. W. Roscoe, L. Wulf
    Composing and decomposing systems under security properties. [Citation Graph (0, 0)][DBLP]
    CSFW, 1995, pp:9-15 [Conf]
  16. Philippa J. Broadfoot, Gavin Lowe, A. W. Roscoe
    Automating Data Independence. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2000, pp:175-190 [Conf]
  17. A. W. Roscoe, Jim Woodcock, L. Wulf
    Non-Interference Through Determinism. [Citation Graph (0, 0)][DBLP]
    ESORICS, 1994, pp:33-53 [Conf]
  18. C. A. R. Hoare, A. W. Roscoe
    Programs as Executable Predicates. [Citation Graph (0, 0)][DBLP]
    FGCS, 1984, pp:220-228 [Conf]
  19. S. J. Creese, A. W. Roscoe
    Verifying an infinite family of inductions simultaneously using data independence and FDR. [Citation Graph (0, 0)][DBLP]
    FORTE, 1999, pp:437-452 [Conf]
  20. George M. Reed, A. W. Roscoe
    A Timed Model for Communicating Sequential Processes. [Citation Graph (0, 0)][DBLP]
    ICALP, 1986, pp:314-323 [Conf]
  21. A. W. Roscoe, Zhenzhong Wu
    Verifying Statemate Statecharts Using CSP and FDR. [Citation Graph (0, 0)][DBLP]
    ICFEM, 2006, pp:324-341 [Conf]
  22. Xu Wang, A. W. Roscoe, Ranko Lazic
    Relating Data Independent Trace Checks in CSP with UNITY Reachability under a Normality Assumption. [Citation Graph (0, 0)][DBLP]
    IFM, 2004, pp:247-266 [Conf]
  23. George M. Reed, A. W. Roscoe
    Metric Spaces as Models for Real-Time Concurrency. [Citation Graph (0, 0)][DBLP]
    MFPS, 1987, pp:331-343 [Conf]
  24. A. W. Roscoe, Geoff Barrett
    Unbounded Nondeterminism in CSP. [Citation Graph (0, 0)][DBLP]
    Mathematical Foundations of Programming Semantics, 1989, pp:160-193 [Conf]
  25. S. J. Creese, A. W. Roscoe
    Data Independent Induction over Structured Networks. [Citation Graph (0, 0)][DBLP]
    PDPTA, 2000, pp:- [Conf]
  26. S. J. Creese, A. W. Roscoe
    Formal Verification of Arbitrary Network Topologies. [Citation Graph (0, 0)][DBLP]
    PDPTA, 1999, pp:1033-1039 [Conf]
  27. Jian Huang, A. W. Roscoe
    Extending noninterference properties to the timed world. [Citation Graph (0, 0)][DBLP]
    SAC, 2006, pp:376-383 [Conf]
  28. Philippa J. Broadfoot, A. W. Roscoe
    Tutorial on FDR and Its Applications. [Citation Graph (0, 0)][DBLP]
    SPIN, 2000, pp:322- [Conf]
  29. A. W. Roscoe, Paul H. B. Gardiner, Michael Goldsmith, J. R. Hulance, D. M. Jackson, J. B. Scattergood
    Hierarchical Compression for Model-Checking CSP or How to Check 1020 Dining Philosophers for Deadlock. [Citation Graph (0, 0)][DBLP]
    TACAS, 1995, pp:133-152 [Conf]
  30. C. A. R. Hoare, Ian J. Hayes, Jifeng He, Carroll Morgan, A. W. Roscoe, Jeff W. Sanders, Ib Holm Sørensen, J. Michael Spivey, Bernard Sufrin
    Laws of Programming. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 1987, v:30, n:8, pp:672-686 [Journal]
  31. Stephen D. Brookes, A. W. Roscoe
    Deadlock Analysis in Networks of Communicating Processes. [Citation Graph (0, 0)][DBLP]
    Distributed Computing, 1991, v:4, n:, pp:209-230 [Journal]
  32. E. Kleiner, A. W. Roscoe
    On the Relationship Between Web Services Security and Traditional Protocols. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2006, v:155, n:, pp:583-603 [Journal]
  33. Lee Momtahan, Andrew Martin, A. W. Roscoe
    A Taxonomy of Web Services Using CSP. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2006, v:151, n:2, pp:71-87 [Journal]
  34. Joy N. Reed, A. W. Roscoe, Jane Sinclair
    Machine-Verifiable Responsiveness. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2006, v:145, n:, pp:185-200 [Journal]
  35. A. W. Roscoe, Philippa J. Broadfoot, Gavin Lowe
    Data independent verification of crypto-protocols. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2000, v:40, n:, pp:- [Journal]
  36. A. W. Roscoe
    Confluence Thanks to Extensional Determinism. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2006, v:162, n:, pp:305-309 [Journal]
  37. Joy N. Reed, J. E. Sinclair, A. W. Roscoe
    Responsiveness of interoperating components. [Citation Graph (0, 0)][DBLP]
    Formal Asp. Comput., 2004, v:16, n:4, pp:394-411 [Journal]
  38. A. W. Roscoe
    On the expressive power of CSP refinement. [Citation Graph (0, 0)][DBLP]
    Formal Asp. Comput., 2005, v:17, n:2, pp:93-112 [Journal]
  39. A. W. Roscoe, Naiem Dathi
    The Pursuit of Deadlock freedom [Citation Graph (0, 0)][DBLP]
    Inf. Comput., 1987, v:75, n:3, pp:289-327 [Journal]
  40. Philippa J. Broadfoot, A. W. Roscoe
    Embedding agents within the intruder to detect parallel attacks. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 2004, v:12, n:3-4, pp:379-408 [Journal]
  41. A. W. Roscoe, Philippa J. Broadfoot
    Proving Security Protocols with Model Checkers by Data Independence Techniques. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 1999, v:7, n:1, pp:- [Journal]
  42. A. W. Roscoe, Jim Woodcock, L. Wulf
    Non-interference through Determinism. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 1996, v:4, n:1, pp:27-54 [Journal]
  43. A. W. Roscoe
    An Alternative Order for the Failures Model. [Citation Graph (0, 0)][DBLP]
    J. Log. Comput., 1992, v:2, n:5, pp:557-577 [Journal]
  44. A. W. Roscoe
    Unbounded Non-Determinism in CSP. [Citation Graph (0, 0)][DBLP]
    J. Log. Comput., 1993, v:3, n:2, pp:131-172 [Journal]
  45. T. Yung Kong, David M. Mount, A. W. Roscoe
    The Decomposition of a Rectangle into Rectangles of Minimal Perimeter. [Citation Graph (0, 0)][DBLP]
    SIAM J. Comput., 1988, v:17, n:6, pp:1215-1231 [Journal]
  46. Michael W. Mislove, A. W. Roscoe, Steve Schneider
    Fixed Points Without Completeness. [Citation Graph (0, 0)][DBLP]
    Theor. Comput. Sci., 1995, v:138, n:2, pp:273-314 [Journal]
  47. George M. Reed, A. W. Roscoe
    A Timed Model for Communicating Sequential Processes. [Citation Graph (0, 0)][DBLP]
    Theor. Comput. Sci., 1988, v:58, n:, pp:249-261 [Journal]
  48. George M. Reed, A. W. Roscoe
    The Timed Failures-Stability Model for CSP. [Citation Graph (0, 0)][DBLP]
    Theor. Comput. Sci., 1999, v:211, n:1-2, pp:85-127 [Journal]
  49. A. W. Roscoe, C. A. R. Hoare
    The Laws of Occam Programming. [Citation Graph (0, 0)][DBLP]
    Theor. Comput. Sci., 1988, v:60, n:, pp:177-229 [Journal]
  50. Ranko Lazic, Thomas Christopher Newcomb, A. W. Roscoe
    On model checking data-independent systems with arrays without reset. [Citation Graph (0, 0)][DBLP]
    TPLP, 2004, v:4, n:5-6, pp:659-693 [Journal]
  51. Gavin Lowe, A. W. Roscoe
    Using CSP to Detect Errors in the TMN Protocol. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Software Eng., 1997, v:23, n:10, pp:659-669 [Journal]
  52. Ranko Lazic, Thomas Christopher Newcomb, Joël Ouaknine, A. W. Roscoe, James Worrell
    Nets with Tokens Which Carry Data. [Citation Graph (0, 0)][DBLP]
    ICATPN, 2007, pp:301-320 [Conf]
  53. Joy N. Reed, A. W. Roscoe, J. E. Sinclair
    Responsiveness and stable revivals. [Citation Graph (0, 0)][DBLP]
    Formal Asp. Comput., 2007, v:19, n:3, pp:303-319 [Journal]

  54. Security and Usability: Analysis and Evaluation. [Citation Graph (, )][DBLP]


  55. Local Search in Model Checking. [Citation Graph (, )][DBLP]


  56. The Three Platonic Models of Divergence-Strict CSP. [Citation Graph (, )][DBLP]


  57. Secure and Usable Out-Of-Band Channels for Ad Hoc Mobile Device Interactions. [Citation Graph (, )][DBLP]


  58. Two heads are better than one: security and usability of device associations in group scenarios. [Citation Graph (, )][DBLP]


  59. Usability and security of out-of-band channels in secure device pairing protocols. [Citation Graph (, )][DBLP]


Search in 0.008secs, Finished in 0.011secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002