Search the dblp DataBase
A. W. Roscoe :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Steve Schneider , Jim Davies , D. M. Jackson , George M. Reed , Joy N. Reed , A. W. Roscoe Timed CSP: Theory and Practice. [Citation Graph (1, 0)][DBLP ] REX Workshop, 1991, pp:640-675 [Conf ] Stephen D. Brookes , C. A. R. Hoare , A. W. Roscoe A Theory of Communicating Sequential Processes. [Citation Graph (1, 0)][DBLP ] J. ACM, 1984, v:31, n:3, pp:560-599 [Journal ] A. W. Roscoe Specifying problem one using the failure sets model for CSP and deriving CSP processes which meett this specification. [Citation Graph (0, 0)][DBLP ] The Analysis of Concurrent Systems, 1983, pp:103-109 [Conf ] A. W. Roscoe A CSP solution to the "trains" problem. [Citation Graph (0, 0)][DBLP ] The Analysis of Concurrent Systems, 1983, pp:384-388 [Conf ] Ranko Lazic , Thomas Christopher Newcomb , A. W. Roscoe On Model Checking Data-Independent Systems with Arrays with Whole-Array Operations. [Citation Graph (0, 0)][DBLP ] 25 Years Communicating Sequential Processes, 2004, pp:275-291 [Conf ] A. W. Roscoe Seeing Beyond Divergence. [Citation Graph (0, 0)][DBLP ] 25 Years Communicating Sequential Processes, 2004, pp:15-35 [Conf ] Stephen D. Brookes , A. W. Roscoe An Improved Failures Model for Communicating Processes. [Citation Graph (0, 0)][DBLP ] Seminar on Concurrency, 1984, pp:281-305 [Conf ] George M. Reed , A. W. Roscoe Analysing TMFS : a Study of Nondeterminism in Real-Time Concurrency. [Citation Graph (0, 0)][DBLP ] Concurrency: Theory, Language, And Architecture, 1989, pp:36-63 [Conf ] A. W. Roscoe Denotational Semantics for occam. [Citation Graph (0, 0)][DBLP ] Seminar on Concurrency, 1984, pp:306-329 [Conf ] Philippa J. Broadfoot , A. W. Roscoe Capturing Parallel Attacks within the Data Independence Framework. [Citation Graph (0, 0)][DBLP ] CSFW, 2002, pp:147-159 [Conf ] A. W. Roscoe Modelling and verifying key-exchange protocols using CSP and FDR. [Citation Graph (0, 0)][DBLP ] CSFW, 1995, pp:98-107 [Conf ] A. W. Roscoe Intensional specifications of security protocols. [Citation Graph (0, 0)][DBLP ] CSFW, 1996, pp:28-38 [Conf ] A. W. Roscoe Proving Security Protocols with Model Checkers by Data Independence Techniques. [Citation Graph (0, 0)][DBLP ] CSFW, 1998, pp:84-95 [Conf ] A. W. Roscoe , M. H. Goldsmith What Is Intransitive Noninterference? [Citation Graph (0, 0)][DBLP ] CSFW, 1999, pp:228-238 [Conf ] A. W. Roscoe , L. Wulf Composing and decomposing systems under security properties. [Citation Graph (0, 0)][DBLP ] CSFW, 1995, pp:9-15 [Conf ] Philippa J. Broadfoot , Gavin Lowe , A. W. Roscoe Automating Data Independence. [Citation Graph (0, 0)][DBLP ] ESORICS, 2000, pp:175-190 [Conf ] A. W. Roscoe , Jim Woodcock , L. Wulf Non-Interference Through Determinism. [Citation Graph (0, 0)][DBLP ] ESORICS, 1994, pp:33-53 [Conf ] C. A. R. Hoare , A. W. Roscoe Programs as Executable Predicates. [Citation Graph (0, 0)][DBLP ] FGCS, 1984, pp:220-228 [Conf ] S. J. Creese , A. W. Roscoe Verifying an infinite family of inductions simultaneously using data independence and FDR. [Citation Graph (0, 0)][DBLP ] FORTE, 1999, pp:437-452 [Conf ] George M. Reed , A. W. Roscoe A Timed Model for Communicating Sequential Processes. [Citation Graph (0, 0)][DBLP ] ICALP, 1986, pp:314-323 [Conf ] A. W. Roscoe , Zhenzhong Wu Verifying Statemate Statecharts Using CSP and FDR. [Citation Graph (0, 0)][DBLP ] ICFEM, 2006, pp:324-341 [Conf ] Xu Wang , A. W. Roscoe , Ranko Lazic Relating Data Independent Trace Checks in CSP with UNITY Reachability under a Normality Assumption. [Citation Graph (0, 0)][DBLP ] IFM, 2004, pp:247-266 [Conf ] George M. Reed , A. W. Roscoe Metric Spaces as Models for Real-Time Concurrency. [Citation Graph (0, 0)][DBLP ] MFPS, 1987, pp:331-343 [Conf ] A. W. Roscoe , Geoff Barrett Unbounded Nondeterminism in CSP. [Citation Graph (0, 0)][DBLP ] Mathematical Foundations of Programming Semantics, 1989, pp:160-193 [Conf ] S. J. Creese , A. W. Roscoe Data Independent Induction over Structured Networks. [Citation Graph (0, 0)][DBLP ] PDPTA, 2000, pp:- [Conf ] S. J. Creese , A. W. Roscoe Formal Verification of Arbitrary Network Topologies. [Citation Graph (0, 0)][DBLP ] PDPTA, 1999, pp:1033-1039 [Conf ] Jian Huang , A. W. Roscoe Extending noninterference properties to the timed world. [Citation Graph (0, 0)][DBLP ] SAC, 2006, pp:376-383 [Conf ] Philippa J. Broadfoot , A. W. Roscoe Tutorial on FDR and Its Applications. [Citation Graph (0, 0)][DBLP ] SPIN, 2000, pp:322- [Conf ] A. W. Roscoe , Paul H. B. Gardiner , Michael Goldsmith , J. R. Hulance , D. M. Jackson , J. B. Scattergood Hierarchical Compression for Model-Checking CSP or How to Check 1020 Dining Philosophers for Deadlock. [Citation Graph (0, 0)][DBLP ] TACAS, 1995, pp:133-152 [Conf ] C. A. R. Hoare , Ian J. Hayes , Jifeng He , Carroll Morgan , A. W. Roscoe , Jeff W. Sanders , Ib Holm Sørensen , J. Michael Spivey , Bernard Sufrin Laws of Programming. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 1987, v:30, n:8, pp:672-686 [Journal ] Stephen D. Brookes , A. W. Roscoe Deadlock Analysis in Networks of Communicating Processes. [Citation Graph (0, 0)][DBLP ] Distributed Computing, 1991, v:4, n:, pp:209-230 [Journal ] E. Kleiner , A. W. Roscoe On the Relationship Between Web Services Security and Traditional Protocols. [Citation Graph (0, 0)][DBLP ] Electr. Notes Theor. Comput. Sci., 2006, v:155, n:, pp:583-603 [Journal ] Lee Momtahan , Andrew Martin , A. W. Roscoe A Taxonomy of Web Services Using CSP. [Citation Graph (0, 0)][DBLP ] Electr. Notes Theor. Comput. Sci., 2006, v:151, n:2, pp:71-87 [Journal ] Joy N. Reed , A. W. Roscoe , Jane Sinclair Machine-Verifiable Responsiveness. [Citation Graph (0, 0)][DBLP ] Electr. Notes Theor. Comput. Sci., 2006, v:145, n:, pp:185-200 [Journal ] A. W. Roscoe , Philippa J. Broadfoot , Gavin Lowe Data independent verification of crypto-protocols. [Citation Graph (0, 0)][DBLP ] Electr. Notes Theor. Comput. Sci., 2000, v:40, n:, pp:- [Journal ] A. W. Roscoe Confluence Thanks to Extensional Determinism. [Citation Graph (0, 0)][DBLP ] Electr. Notes Theor. Comput. Sci., 2006, v:162, n:, pp:305-309 [Journal ] Joy N. Reed , J. E. Sinclair , A. W. Roscoe Responsiveness of interoperating components. [Citation Graph (0, 0)][DBLP ] Formal Asp. Comput., 2004, v:16, n:4, pp:394-411 [Journal ] A. W. Roscoe On the expressive power of CSP refinement. [Citation Graph (0, 0)][DBLP ] Formal Asp. Comput., 2005, v:17, n:2, pp:93-112 [Journal ] A. W. Roscoe , Naiem Dathi The Pursuit of Deadlock freedom [Citation Graph (0, 0)][DBLP ] Inf. Comput., 1987, v:75, n:3, pp:289-327 [Journal ] Philippa J. Broadfoot , A. W. Roscoe Embedding agents within the intruder to detect parallel attacks. [Citation Graph (0, 0)][DBLP ] Journal of Computer Security, 2004, v:12, n:3-4, pp:379-408 [Journal ] A. W. Roscoe , Philippa J. Broadfoot Proving Security Protocols with Model Checkers by Data Independence Techniques. [Citation Graph (0, 0)][DBLP ] Journal of Computer Security, 1999, v:7, n:1, pp:- [Journal ] A. W. Roscoe , Jim Woodcock , L. Wulf Non-interference through Determinism. [Citation Graph (0, 0)][DBLP ] Journal of Computer Security, 1996, v:4, n:1, pp:27-54 [Journal ] A. W. Roscoe An Alternative Order for the Failures Model. [Citation Graph (0, 0)][DBLP ] J. Log. Comput., 1992, v:2, n:5, pp:557-577 [Journal ] A. W. Roscoe Unbounded Non-Determinism in CSP. [Citation Graph (0, 0)][DBLP ] J. Log. Comput., 1993, v:3, n:2, pp:131-172 [Journal ] T. Yung Kong , David M. Mount , A. W. Roscoe The Decomposition of a Rectangle into Rectangles of Minimal Perimeter. [Citation Graph (0, 0)][DBLP ] SIAM J. Comput., 1988, v:17, n:6, pp:1215-1231 [Journal ] Michael W. Mislove , A. W. Roscoe , Steve Schneider Fixed Points Without Completeness. [Citation Graph (0, 0)][DBLP ] Theor. Comput. Sci., 1995, v:138, n:2, pp:273-314 [Journal ] George M. Reed , A. W. Roscoe A Timed Model for Communicating Sequential Processes. [Citation Graph (0, 0)][DBLP ] Theor. Comput. Sci., 1988, v:58, n:, pp:249-261 [Journal ] George M. Reed , A. W. Roscoe The Timed Failures-Stability Model for CSP. [Citation Graph (0, 0)][DBLP ] Theor. Comput. Sci., 1999, v:211, n:1-2, pp:85-127 [Journal ] A. W. Roscoe , C. A. R. Hoare The Laws of Occam Programming. [Citation Graph (0, 0)][DBLP ] Theor. Comput. Sci., 1988, v:60, n:, pp:177-229 [Journal ] Ranko Lazic , Thomas Christopher Newcomb , A. W. Roscoe On model checking data-independent systems with arrays without reset. [Citation Graph (0, 0)][DBLP ] TPLP, 2004, v:4, n:5-6, pp:659-693 [Journal ] Gavin Lowe , A. W. Roscoe Using CSP to Detect Errors in the TMN Protocol. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Software Eng., 1997, v:23, n:10, pp:659-669 [Journal ] Ranko Lazic , Thomas Christopher Newcomb , Joël Ouaknine , A. W. Roscoe , James Worrell Nets with Tokens Which Carry Data. [Citation Graph (0, 0)][DBLP ] ICATPN, 2007, pp:301-320 [Conf ] Joy N. Reed , A. W. Roscoe , J. E. Sinclair Responsiveness and stable revivals. [Citation Graph (0, 0)][DBLP ] Formal Asp. Comput., 2007, v:19, n:3, pp:303-319 [Journal ] Security and Usability: Analysis and Evaluation. [Citation Graph (, )][DBLP ] Local Search in Model Checking. [Citation Graph (, )][DBLP ] The Three Platonic Models of Divergence-Strict CSP. [Citation Graph (, )][DBLP ] Secure and Usable Out-Of-Band Channels for Ad Hoc Mobile Device Interactions. [Citation Graph (, )][DBLP ] Two heads are better than one: security and usability of device associations in group scenarios. [Citation Graph (, )][DBLP ] Usability and security of out-of-band channels in secure device pairing protocols. [Citation Graph (, )][DBLP ] Search in 0.008secs, Finished in 0.011secs