-
Vivek Nigam, A framework for linear authorization logics, 2014
-
Bernardo Toninho, Lu'{\i}s Caires, Frank Pfenning, Dependent Session Types via Intuitionistic Linear Type Theory, 2011
-
Frank Pfenning, Luis Caires, Bernardo Toninho, Proof-Carrying Code in a Session-Typed Process Calculus, 2011
-
Xia Zhao, Enjie Liu, Gordon J. Clapworthy, (Paywall) A Two-Stage RESTful Web Service Composition Method Based on Linear Logic, 2011
-
Iliano Cervesato, Andre Scedrov, Relating state-based and process-based concurrency through linear logic (full-version), 2009
-
Henry DeYoung, Frank Pfenning, Reasoning about the Consequences of Authorization Policies in a Linear Epistemic Logic, 2009
-
Anders Schack-Nielsen, Carsten Sch¨urmann, Celf – A Logical Framework for Deductive and Concurrent Systems (System Description), 2009
-
Alexandru Baltag, Bob Coecke, Mehrnoosh Sadrzadeh, Epistemic actions as resources, 2007
-
Kevin D. Bowers, Lujo Bauer, Deepak Garg, Frank Pfenning, Michael K. Reiter, Consumable Credentials in Logic-Based Access-Control Systems, 2007
-
J. G. Cederquist, R. Corin, M. A. C. Dekker, S. Etalle, J. I. den Hartog, G. Lenzini, Audit-based compliance control, 2007
-
Michel dos Santos Soares, Jos Vrancken, Road Traffic Signals Modeling and Analysis with Petri nets and Linear Logic, 2007
-
Deepak GargLujo BauerKevin D. BowersFrank PfenningMichael K. Reiter, A Linear Logic of Authorization and Knowledge, 2006
-
Bruno Blanchet, Security protocols: from linear to classical logic by abstract interpretation, 2005
-
Iliano Cervesato, The Logical Meeting Point of Multiset Rewriting and Process Algebra: Progress Report, 2004
-
Malika. Medjoudj, Sarhane. Khalfaoui, Hamid. Demmou, Robert. Valette, A method for deriving feared scenarios in hybrid systems, 2004
-
Durgin Nancya, Lincoln Patrickb, Mitchell Johnc, Scedrov Andred, Multiset rewriting and the complexity of bounded security protocols, 2004
-
Stefano Bistarelli, Iliano Cervesato, Gabriele Lenzini, Fabio Martinelli, Relating Process Algebras and Multiset Rewriting for Security Protocol Analysis, 2003
-
Marco Bozzano, Giorgio Delzanno, Maurizio Martelli, Model Checking Linear Logic Specifications, 2003
-
I. Cervesato, N. Durgin, P. Lincoln, J. Mitchell, A. Scedrov, A Comparison between Strand Spaces and Multiset Rewriting for Security Protocol Analysis, 2003
-
Koji Hasebe, Mitsuhiro Okada, (Paywall) A Logical Verification Method for Security Protocols Based on Linear Logic and BAN Logic, 2003
-
Dale Miller, Encryption as an abstract data-type: An extended abstract, 2003
-
Marco Bozzano, Giorgio Delzanno, Automated protocol verification in linear logic, 2002
-
I. Cervesato, N.A. Durgin, P.D. Lincoln, J.C. Mitchell, A. Scedrov, A meta-notation for protocol analysis, 2002
-
Hamid Demmou, Sarhane Khalfaoui1, Nicolas Rivière1, Edwige Guilhem, Extracting critical scenarios from a Petri net model using linear logic, 2002
-
JC Mitchell, Multiset Rewriting and Security Protocol Analysis, 2002
-
Nobuko Yoshida, Kohei Honda, Martin Berger, Linearity and Bisimulation, 2002
-
Steve Zdancewic, Andrew C. Myers, Secure Information Flow via Linear Continuations, 2002
-
Iliano Cervesato, Typed Multiset Rewriting Specifications of Security Protocols, 2001
-
R. Chadha, M. Kanovich, A. Scedrov, Inductive Methods and Contract-Signing Protocols, 2001
-
Steve Zdancewic, Andrew C. Myers, Secure Information Flow and CPS, 2001
-
Kamel AdiMourad, Debbabi, Mohamed Mejri, (Paywall) A New Logic for Electronic Commerce Protocols, 2000
-
Iliano Cervesato, N. Durgin, J. Mitchell, P. Lincoln, A. Scedrov, Relating Strands and Multiset Rewriting for Security Protocol Analysis, 2000
-
Iliano Cervesato, N. Durgin, M. Kanovich, A. Scedrov, Interpreting Strands in Linear Logic, 2000
-
Kohei Honda, Vasco Vasconcelos, Nobuko Yoshida, Secure Information Flow as Typed Process Behaviour, 2000
-
P. Malacaria, C. Hankin, Non-deterministic games and program analysis: An application to security, 1999
-
Max I. Kanovich, Mitsuhiro Okada, Andre Scedrov, Specifying Real-Time Finite-State Systems in Linear Logic Extended Abstract, 1998
-
Andrew Barber, Philippa Gardner, Masahito Hasegawa, Gordon Plotkin, From action calculi to linear logic, 1997
-
Clifford Sheung-Ching Tse, The Design and Implementation of an Actor Language Based on Linear Logic, 1993
-
Michele Bugliesi, Stefano Calzavara, Fabienne Eigner, and Matteo Maffei, Logical Foundations of Secure Resource Management in Protocol Implementations, 2013
-
Michele Bugliesi, Stefano Calzavara, Fabienne Eigner, Matteo Maffei, Resource-aware Authorization Policies for Statically Typed Cryptographic Protocols, 2011
-
Marco Bozzanoa, Giorgio Delzannob, Automatic verification of secrecy properties for linear logic specifications of cryptographic protocols, 2004