- (A shorter version has been published in: 238--264, Papers on General Topology and Applications ---Eleventh Summer Conference at the University of Southern Maine, Annals of the New York Academy of Sciences, Volume
- INFINITY 2004 Preliminary Version Polymorphic Systems with Arrays,
- LAWS OF PROGRAMMING A complete set of algebraic laws is given for Dijkstra's nondeterministic
- The Timed Failures-Stability Model for CSP G.M. Reed and A.W. Roscoe1
- Proving security protocols with model checkers by data independence techniques
- Authentication for Pervasive Computing Sadie Creese 1 , Michael Goldsmith 3;4 , Bill Roscoe 2;3 , and Irfan Zakiuddin 1
- An Operational Semantics for CSP S.D. Brookes 1 , A.W. Roscoe 2 and D.J. Walker 3
- Formal Verification of Arbitrary Network Topologies \Lambda S. J. Creese and A. W. Roscoe
- Web Services Security: a preliminary study using Casper E. Kleiner and A.W. Roscoe #
- Analysing TM FS : a Study of Nondeterminism in RealTime Concurrency
- Under consideration for publication in Formal Aspects of Computing Responsiveness of Interoperating
- Intensional specifications of security protocols A.W. Roscoe
- DENOTATIONAL SEl'1ANTICS occam2. i -.
- Confluence thanks to extensional determinism A.W. Roscoe 1,2
- Theoretical Computer Science 58 (1988) 249-261 North-Holland
- COMPUTERVISION,GRAPHICS,AND IMAGEPROCESSING32, 221-243 (1985) A Theory of Binary Digital Pictures
- Capturing parallel attacks within the data independence framework P. J. Broadfoot and A. W. Roscoe
- DOI 10.1007/s00165-007-0032-9 Formal Aspects of Computing (2007) 19: 303319
- CSP and determinism in security modelling A.W. Roscoe
- Hierarchical compression for modelchecking CSP or How to check 10 20 dining philosophers for
- Unbounded nondeterminism in CSP by A.W. Roscoe 1 and Geo# Barrett
- Relating Data Independent Trace Checks in CSP with UNITY Reachability under a
- Metric spaces as models for real-time concurrency G.M. Reed and A.W. Roscoe1
- An alternative order for the failures by A.W. Roscoe 1
- Embedding agents within the intruder to detect parallel attacks
- Verifying Determinism of Concurrent Systems Which Use Unbounded Arrays
- Extending noninterference properties to the timed world Oxford University, Computing Laboratory
- The successes and failures of behavioural models A.W. Roscoe, G.M. Reed and R. Forster
- ModelChecking CSP A.W. Roscoe \Lambda
- DOI 10.1007/s00165-004-0050-9 Formal Aspects of Computing (2004) 16: 394411
- The pursuit of bu#er tolerance A.W. Roscoe #
- Nets with Tokens Which Carry Data Ranko Lazic1,
- On the relationship between Web Services Security and traditional protocols
- Web Services Security: a preliminary study using Casper E. Kleiner and A.W. Roscoe
- Verifying an in nite family of inductions simultaneously using data independence and
- The successes and failures of behavioural models A.W. Roscoe, G.M. Reed and R. Forster #
- Revivals, stuckness and the hierarchy of CSP models A.W. Roscoe
- On model checking data-independent systems with arrays with whole-array operations
- Data Independence with Generalised Predicate Symbols Ranko Lazi c and Bill Roscoe y
- Under consideration for publication in Formal Aspects of Computing On the expressive power of CSP
- Topology, computer science and the mathematics of convergence
- The Pursuit of Deadlock Freedom by A.W. Roscoe and Naiem Dathi
- INFINITY 2004 Preliminary Version Polymorphic Systems with Arrays,
- Proving security protocols with model checkers by data independence techniques
- On the relationship between Web Services Security and traditional protocols
- Under consideration for publication in Theory and Practice of Logic Programming 1 On model checking data-independent
- Proving security protocols with model checkers by data independence A.W. Roscoe
- Efficient group authentication protocols based on human interaction
- I wrote these notes between about 1984 and 1989. Not too long before I had been lucky enough to attend Joe Stoy's lectures on domain theory and
- Security and trust for ubiquitous communication Systems Assurance Group,
- Distributed Computing (1991) 4:209-230 9 Springer-Verlag 1991
- COMPUTER VISION, GRAPHICS, AND IMAGE PROCESSING 3,60-86 (1985) Continuous Analogs of Axiomatized Digital Surfaces
- The Perfect ``Spy'' for Model-Checking Cryptoprotocols
- COLLOQUIA MATHEMATlCA SOCIETATIS JANOS BOLYAI 41. TOPOLOGY AND APPLICATIONS, EGER (HUNGARY), 1983.
- Proving security protocols with model checkers by data independence A.W. Roscoe
- RESEARCH DIRECTIONS FOR TRUST AND SECURITY IN HUMAN-CENTRIC COMPUTING
- Bootstrapping Multi-Party Ad-Hoc Security S.J. Creese
- Compiling Statemate Statecharts into CSP and verifying them using FDR --abstract
- Seeing beyond divergence A.W. Roscoe #
- Topology and its Applications 39 (1991) 71-103 North-Holland
- Data Independent Induction over structured networks S. J. Creese and A. W. Roscoe
- Internalising agents in CSP protocol models P.J. Broadfoot and A.W. Roscoe
- A Theoryof CommunicatingSequentialProcesses S. D. BROOKES
- A Theory of <0 1981 by CAR Hoare. S.D. Brookes. A.W. Roscoe.
- A MATHEMATICALTHEORYOF COMMUNICATINGPROCESSES by A.W. ROSCOE,
- AN IMPROVED FAILURES MODEL FOR COMMUNICATING PROCESSES S. D. Brookcs
- DENOTAPIONAL SEMANTICS FOR OCCAN A.W. Roscoe
- SPECIFYING PROBLEMONE[USINGTHE 'FAILURE~ SETSMODELFOR CSP AND DERIVINGCSP PROCESSESWHICHMEETTHIS SPECIFICATION
- A CSP solution to the "trains" problem A.W. Roscoe
- A Timed Model for Communicating Sequential Processes G. M. Reed and A. W. Roscoe L
- TheoreticalComputer Science 60 (1988) 177-229 North-Holland
- Unbounded Nondeterminism in CSP by A.W. Roscoe 1 and Geoff Barrett2
- Open Problems in Topology J. van Mill and G.M. Reed (Editors)
- Topology and its Applications 47 (1992) 53-67 North-Holland
- Hierarchical compression for model-checking CSP or How to check 1020
- (A shorter version has been published in: 238{264, Papers on General Topology and Applications | Eleventh Summer Conference at the University of Southern Maine, Annals of the New York Academy of Sciences, Volume
- Formal Veri cation of Arbitrary Network Topologies S. J. Creese and A. W. Roscoe
- "symbolic" means that Casper will produce its own values to represent the results of the function applications.
- Embedding agents within the intruder to detect parallel attacks
- Under consideration for publication in Formal Aspects of Computing On the expressive power of CSP
- Seeing beyond divergence A.W. Roscoe
- Exploiting Empirical Engagement in Authentication Protocol Design
- The pursuit of buffer tolerance A.W. Roscoe
- Human-centred computer security A.W. Roscoe
- Modelling unbounded parallel sessions of security protocols in CSP
- Verifying Statemate Statecharts Using CSP and FDR
- What is intransitive noninterference? A.W. Roscoe
- Occam in the specification and verification of microprocessors
- Routing messages through networks: an exercise in deadlock by A.W. Roscoe
- Unbounded nondeterminism in CSP by A.W. Roscoe 1
- The Timed FailuresStability Model for CSP G.M. Reed and A.W. Roscoe 1
- Consistency in Distributed Databases A Grouplike Algebra and its Applications
- SVA, a tool for analysing shared-variable David Hopkins and A.W. Roscoe1
- gommuniting roess erhitetures PHHR teremy wrtin et l @idsFA
- Modelling and verifying keyexchange protocols using CSP and FDR A.W. Roscoe
- Composing and Decomposing Systems under Security Properties
- High Assurance Software Lecture Notes in Computer Science
- Polymorphic Systems with Arrays: Decidability and Undecidability
- Non-interference through determinism* A.W. Roscoe, J.C.P. Woodcock and L. Wulf