Extending the creation operation in the Schematic Protection Model, [1990] Proceedings of the Sixth Annual Computer Security Applications Conference, pp.304-348, 1990. ,
DOI : 10.1109/CSAC.1990.143796
Algebraic Specification of Concurrent Systems, IFIP WG 1.3 Book on Algebraic Foundations of System Specification, 1999. ,
DOI : 10.1007/978-3-642-59851-7_13
Refining Approximations in Software Predicate Abstraction, TACAS, pp.388-403, 2004. ,
DOI : 10.1007/978-3-540-24730-2_30
Boolean and cartesian abstraction for model checking C programs, Margaria and Yi [71], pp.268-283 ,
A Useful Four-Valued Logic, Modern Uses of Multiple-Valued Logic, pp.30-56, 1977. ,
DOI : 10.1007/978-94-010-1161-7_2
Algebraic Abstractions, Lecture Notes in Computer Science, vol.2267, pp.21-47, 2001. ,
DOI : 10.1007/3-540-45645-7_2
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.130.2313
Many-valued Logics, 1992. ,
DOI : 10.1007/978-3-662-08494-6
Model Checking Partial State Spaces with 3-Valued Temporal Logics, Halbwachs and Peled [52], pp.274-287 ,
DOI : 10.1007/3-540-48683-6_25
Temporal logic query checking, Proceedings 16th Annual IEEE Symposium on Logic in Computer Science, pp.409-417, 2001. ,
DOI : 10.1109/LICS.2001.932516
Model Checking with Multi-valued Logics, Lecture Notes in Computer Science, vol.3142, pp.281-293, 2004. ,
DOI : 10.1007/978-3-540-27836-8_26
Graph-Based Algorithms for Boolean Function Manipulation, IEEE Transactions on Computers, vol.35, issue.8, pp.677-691, 1986. ,
DOI : 10.1109/TC.1986.1676819
A unified framework for race analysis of asynchronous networks, Journal of the ACM, vol.36, issue.1, pp.20-45, 1989. ,
DOI : 10.1145/58562.59301
Symbolic model checking: 10/sup 20/ states and beyond, [1990] Proceedings. Fifth Annual IEEE Symposium on Logic in Computer Science, pp.142-170, 1992. ,
DOI : 10.1109/LICS.1990.113767
Analysis of pointers and structures, PLDI, pp.296-310, 1990. ,
Implementing a multivalued symbolic model checker, Margaria and Yi [71], pp.404-419 ,
Multi-valued symbolic model-checking, ACM Transactions on Software Engineering and Methodology, vol.12, issue.4, pp.371-408, 2003. ,
DOI : 10.1145/990010.990011
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.15.7144
?-check: A multi-valued model-checker, Lecture Notes in Computer Science, pp.505-509, 2002. ,
CTL model-checking over logics with non-classical negations, 33rd International Symposium on Multiple-Valued Logic, 2003. Proceedings., p.293, 2003. ,
DOI : 10.1109/ISMVL.2003.1201420
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.8.9160
Design and synthesis of synchronization skeletons using branching time temporal logic, Logic of Programs, pp.52-71, 1981. ,
DOI : 10.1007/BFb0025774
Exploiting symmetry in temporal logic model checking, Courcoubetis [28], pp.450-462 ,
Verification of the Futurebus+ cache coherence protocol, CHDL, volume A-32 of IFIP Transactions, pp.15-30, 1993. ,
DOI : 10.1007/BF01383968
Counterexample-guided abstraction refinement for symbolic model checking, Journal of the ACM, vol.50, issue.5, pp.752-794, 2003. ,
DOI : 10.1145/876638.876643
Model checking and abstraction, ACM Transactions on Programming Languages and Systems, vol.16, issue.5, pp.1512-1542, 1994. ,
DOI : 10.1145/186025.186051
Peled. Model Checking, 2000. ,
Compositional model checking, [1989] Proceedings. Fourth Annual Symposium on Logic in Computer Science, pp.353-362, 1989. ,
DOI : 10.1109/LICS.1989.39190
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.111.7245
Maude: specification and programming in rewriting logic, Theoretical Computer Science, vol.285, issue.2, pp.187-243, 2002. ,
DOI : 10.1016/S0304-3975(01)00359-0
Memory efficient algorithms for the verification of temporal properties, Clarke and Kurshan [25], pp.233-242 ,
Abstract interpretation, Proceedings of the 4th ACM SIGACT-SIGPLAN symposium on Principles of programming languages , POPL '77, pp.238-252, 1977. ,
DOI : 10.1145/512950.512973
URL : https://hal.archives-ouvertes.fr/inria-00528590
Abstract Interpretation and Partial Refinement for Model Checking, 1996. ,
Abstract interpretation of reactive systems, ACM Transactions on Programming Languages and Systems, vol.19, issue.2, pp.253-291, 1997. ,
DOI : 10.1145/244795.244800
Experience with Predicate Abstraction, Halbwachs and Peled [52], pp.160-171 ,
DOI : 10.1007/3-540-48683-6_16
A Comparative Study of Various Model-Theoretic Treatments of Negation: A History of Formal Negation, What is Negation, 1999. ,
DOI : 10.1007/978-94-015-9309-0_2
A framework for multi-valued reasoning over inconsistent viewpoints, Proceedings of the 23rd International Conference on Software Engineering. ICSE 2001, pp.411-420, 2001. ,
DOI : 10.1109/ICSE.2001.919114
Symmetry and model checking, Courcoubetis [28], pp.463-478 ,
Unifying Decidability Results on Protection Systems Using Simulations, Formal Aspects in Security and Trust, pp.96-111, 2005. ,
DOI : 10.1007/11679219_8
Abstractions of Multi-agent Systems, CEEMAS, pp.11-21, 2007. ,
DOI : 10.1007/978-3-540-75254-7_2
Abstractions of dynamic data types, Acta Informatica ,
Multi-valued abstractions, Acta Informatica ,
Reasoning about Knowledge, 1995. ,
Using on-the-fly verification techniques for the generation of test suites, Lecture Notes in Computer Science, vol.1102, pp.348-359, 1996. ,
DOI : 10.1007/3-540-61474-5_82
URL : https://hal.archives-ouvertes.fr/inria-00073711
Many-valued modal logics I. Fundamenta Informaticae, pp.235-254, 1991. ,
Many-valued modal logics II, Fundamenta Informaticae, vol.17, issue.12, pp.55-73, 1992. ,
Logical foundations for database systems, International Journal of Man-Machine Studies, vol.11, issue.4, pp.481-500, 1979. ,
DOI : 10.1016/S0020-7373(79)80039-5
Multivalued logics: a uniform approach to reasoning in artificial intelligence, Computational Intelligence, vol.3, issue.3, pp.265-316, 1988. ,
DOI : 10.1007/BF00485052
Refining dependencies improves partialorder verification methods (extended abstract), Courcoubetis [28], pp.438-449 ,
DOI : 10.1007/3-540-56922-7_36
Construction of abstract state graphs with PVS, Lecture Notes in Computer Science, vol.1254, pp.72-83, 1997. ,
DOI : 10.1007/3-540-63166-6_10
Compositional minimization of finite state systems, pp.186-196 ,
DOI : 10.1007/BFb0023732
Model checking and modular verification, ACM Transactions on Programming Languages and Systems, vol.16, issue.3, pp.843-871, 1994. ,
DOI : 10.1145/177492.177725
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.29.6959
Multi-valued Model Checking via Classical Model Checking, Lecture Notes in Computer Science, vol.2761, pp.263-277, 2003. ,
DOI : 10.1007/978-3-540-45187-7_18
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.8.704
Monotonic protection systems, Foundations of Secure Computation, 1978. ,
Protection in operating systems, Communications of the ACM, vol.19, issue.8, pp.461-471, 1976. ,
DOI : 10.1145/360303.360333
Compositional Model Checking of Partially Ordered State Spaces, 1996. ,
Lazy abstraction, POPL, pp.58-70, 2002. ,
DOI : 10.1145/565816.503279
Dependence analysis for pointer variables, PLDI, pp.28-40, 1989. ,
Better verification through symmetry, Formal Methods in System Design, vol.9, issue.12, pp.41-75, 1996. ,
Flow analysis and optimization of LISPlike structures, Program Flow Analysis: Theory and Applications, pp.102-131, 1981. ,
A flexible approach to interprocedural data flow analysis and programs with recursive data structures, Proceedings of the 9th ACM SIGPLAN-SIGACT symposium on Principles of programming languages , POPL '82, pp.66-74, 1982. ,
DOI : 10.1145/582153.582161
Introduction to Metamathematics, 1952. ,
Reducing model checking from multivalued CTL * to CTL *, Proceedings of the 13th International Conference on Concurrency Theory (CONCUR2002), volume LNCS 2421, pp.226-239, 2002. ,
On designated values in multi-valued CTL * model checking, Fundamenta Informaticae, vol.60, issue.1-4, pp.211-224, 2004. ,
Model checking for multivalued logic of knowledge and time, Proceedings of the fifth international joint conference on Autonomous agents and multiagent systems , AAMAS '06, pp.169-176, 2006. ,
DOI : 10.1145/1160633.1160661
Detecting conflicts between structure accesses, PLDI, pp.21-34, 1988. ,
DOI : 10.1145/960116.53993
A Linear Time Algorithm for Deciding Subject Security, Journal of the ACM, vol.24, issue.3, pp.455-464, 1977. ,
DOI : 10.1145/322017.322025
Abstraction Refinement via Inductive Learning, Proceedings of the 17th International Conference on Computer Aided Verification (CAV'05), pp.519-533, 2005. ,
DOI : 10.1007/11513988_50
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.74.7881
Fuzzy sets, Information and Control, vol.8, pp.338-353, 1965. ,
The Temporal Logic of Reactive and Concurrent Systems. Specification, 1992. ,
Tools and Algorithms for the Construction and Analysis of Systems, 7th International Conference, TACAS 2001 Held as Part of the Joint European Conferences on Theory and Practice of Software Proceedings , volume 2031 of Lecture Notes in Computer Science, 2001. ,
Symbolic Model Checking, Kluwer Academic, 1993. ,
Verification of Infinite State Systems by Compositional Model Checking, Lecture Notes in Computer Science, vol.1703, pp.219-234, 1999. ,
DOI : 10.1007/3-540-48153-2_17
Automatic Abstraction without Counterexamples, Proceedings of the 9th International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TA- CAS'03), pp.2-17, 2003. ,
DOI : 10.1007/3-540-36577-X_2
Formal verification of the Gigamax cache consistency protocol, Shared Memory Multiprocessing, 1992. ,
Universal algebra, Handbook of Logic in Computer Science, pp.189-411, 1993. ,
Membership algebra as a logical framework for equational specification, Proceedings of WADT 97, volume LNCS 1376, pp.18-61, 1998. ,
DOI : 10.1007/3-540-64299-4_26
Equational abstractions, Proceedings of CADE 03, volume LNCS 1376, pp.2-16, 2003. ,
DOI : 10.1007/978-3-540-45085-6_2
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.183.9812
Principles of Program Analysis, 1999. ,
DOI : 10.1007/978-3-662-03811-6
Combining partial order reductions with on-the-fly model-checking, Lecture Notes in Computer Science, vol.818, pp.377-390, 1994. ,
DOI : 10.1007/3-540-58179-0_69
Analysis of dynamic structures for efficient parallel execution, Lecture Notes in Computer Science, vol.768, pp.37-56, 1993. ,
DOI : 10.1007/3-540-57659-2_3
Specification and verification of concurrent systems in CESAR, Symposium on Programming, pp.337-351, 1982. ,
DOI : 10.1007/3-540-11494-7_22
An Algebraic Approach to Non-Classical Logics. Studies in Logic and the Foundations of Mathematics, 1978. ,
Solving shape-analysis problems in languages with destructive updating, ACM Transactions on Programming Languages and Systems, vol.20, issue.1, pp.1-50, 1998. ,
DOI : 10.1145/271510.271517
Parametric shape analysis via 3-valued logic, ACM Transactions on Programming Languages and Systems, vol.24, issue.3, pp.217-298, 2002. ,
DOI : 10.1145/514188.514190
Abstract and Model Check while You Prove, Proceedings of the 11th International Conference on Computer-Aided Verification (CAV'99), pp.443-454, 1999. ,
DOI : 10.1007/3-540-48683-6_38
The typed access matrix model, Proceedings 1992 IEEE Computer Society Symposium on Research in Security and Privacy, pp.122-136, 1992. ,
DOI : 10.1109/RISP.1992.213266
The schematic protection model: its definition and analysis for acyclic attenuating schemes, Journal of the ACM, vol.35, issue.2, pp.404-432, 1988. ,
DOI : 10.1145/42282.42286
A lattice for abstract interpretation of dynamic (LISP-like) structures, Information and Computation, vol.101, issue.1, pp.70-102, 1992. ,
DOI : 10.1016/0890-5401(92)90076-R
Abstractions of data types, Acta Informatica, vol.101, issue.1, pp.639-671, 2006. ,
DOI : 10.1007/s00236-006-0010-3
A stubborn attack on state explosion, pp.156-165 ,
Using predicate abstraction to reduce object-oriented programs for model checking, Proceedings of the third workshop on Formal methods in software practice , FMSP '00, pp.3-182, 2000. ,
DOI : 10.1145/349360.351125
Analysis of Recursive Types in an Imperative Language, 1994. ,