Publications
Search

Publications :: Search

Show author

On this page you see the details of the selected author.

    Author information
    First name: Carroll
    Last name: Morgan
    DBLP: m/CarrollMorgan
    Rating: (not rated yet)
    Bookmark:

    Below you find the publications which have been written by this author.

    Show item 1 to 10 of 87  
    Select a publication
    Show Title Venue Rating Date
    Conference paper
    Carroll Morgan.
    A Demonic Lattice of Information.
    Concurrency, Security, and Puzzles - Essays Dedicated to Andrew William Roscoe on the Occasion of His 60th Birthday 2017 (0) 2017
    Journal article
    N. Bordenabe, Annabelle McIver, Carroll Morgan, Tahiry M. Rabehaja.
    Compositional security and collateral leakage.
    CoRR 2016, Volume 0 (0) 2016
    Conference paper
    June Andronick, Corey Lewis, Daniel Matichuk, Carroll Morgan, Christine Rizkallah.
    Proof of OS Scheduling Behavior in the Presence of Interrupt-Induced Concurrency.
    Interactive Theorem Proving - 7th International Conference, ITP 2016, Nancy, France, August 22-25, 2016, Proceedings 2016 (0) 2016
    Conference paper
    Mário S. Alvim, Konstantinos Chatzikokolakis 0001, Annabelle McIver, Carroll Morgan, Catuscia Palamidessi, Geoffrey Smith.
    Axioms for Information Leakage.
    IEEE 29th Computer Security Foundations Symposium, CSF 2016, Lisbon, Portugal, June 27 - July 1, 2016 2016 (0) 2016
    Journal article
    Annabelle McIver, Carroll Morgan.
    A new rule for almost-certain termination of probabilistic and demonic programs.
    CoRR 2016, Volume 0 (0) 2016
    Journal article
    Annabelle McIver, Larissa Meinicke, Carroll Morgan.
    Hidden-Markov program algebra with iteration.
    Mathematical Structures in Computer Science 2015, Volume 25 (0) 2015
    Conference paper
    Annabelle McIver, Carroll Morgan, Tahiry M. Rabehaja.
    Abstract Hidden Markov Models: A Monadic Account of Quantitative Information Flow.
    30th Annual ACM/IEEE Symposium on Logic in Computer Science, LICS 2015, Kyoto, Japan, July 6-10, 2015 2015 (0) 2015
    Journal article
    June Andronick, Corey Lewis, Carroll Morgan.
    Controlled Owicki-Gries Concurrency: Reasoning about the Preemptible eChronos Embedded Operating System.
    Proceedings Workshop on Models for Formal Analysis of Real Systems, MARS 2015, Suva, Fiji, November 23, 2015. 2015, Volume 196 (0) 2015
    Journal article
    Thai Son Hoang, Annabelle McIver, Larissa Meinicke, Carroll Morgan, A. Sloane, E. Susatyo.
    Abstractions of non-interference security: probabilistic versus possibilistic.
    Formal Asp. Comput. 2014, Volume 26 (0) 2014
    Conference paper
    Annabelle McIver, Carroll Morgan, Geoffrey Smith, Barbara Espinoza, Larissa Meinicke.
    Abstract Channels and Their Robust Information-Leakage Ordering.
    Principles of Security and Trust - Third International Conference, POST 2014, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2014, Grenoble, France, April 5-13, 2014, Proceedings 2014 (0) 2014
    Show item 1 to 10 of 87  

    Your query returned 87 matches in the database.