[1] Alur, R., and D.L. Dill, A Theory of Timed Automata, Theoretical Computer Science 126 (1994), 183-235.
[2] ter Beek, M.H., “Team Automata-A Formal Approach to the Modeling of Collaboration Between System Components”, Ph.D. thesis, Leiden Institute of Advanced Computer Science, Leiden University, 2003.
[3] ter Beek, M.H., and R.P. Bloem, Model Checking Team Automata for Access Control, unpublished manuscript, 2003.
[4] ter Beek, M.H., C.A. Ellis, J. Kleijn, and G. Rozenberg, Team Automata for Spatial Access Control, Proc. ECSCW'01, Kluwer, 2001, 59-77.
[5] ter Beek, M.H., C.A. Ellis, J. Kleijn, and G. Rozenberg, Synchronizations in team automata for groupware systems, Computer Supported Cooperative Work-The Journal of Collaborative Computing 12, 1 (2003), 21-69.
[6] ter Beek, M.H., G. Lenzini, and M. Petrocchi, Team Automata for Security Analysis of Multicast/Broadcast Communication, Tech. Rep. 2003-TR-13, Istituto di Scienza e Tecnologie dell'Informazione, Consiglio Nazionale delle Ricerche, 2003. Presented at WISP'03, 2003 (no formal proceedings).
[7] ter Beek, M.H., G. Lenzini, and M. Petrocchi, Team Automata for Security Analysis, Tech. Rep. TR-CTIT-04-13, Centre for Telematics and Information Technology, University of Twente, 2004. Presented at the DIMACS Workshop on Security Analysis of Protocols, 2004 (no formal proceedings).
[8] Bell, D.E., and L.J. La Padula, Secure Computer Systems-Unified Exposition and Multics Interpretation, Tech. Rep. ESD-TR-75-306, MITRE MTR-2997, 1976.
[9] Bullock, A., and S. Benford, Access Control in Virtual Environments, Proc. VRST'97, ACM Press, 1997, 29-35.
[10] Bullock, A., and S. Benford, An access control framework for multi-user collaborative environments, Proc. GROUP'99, ACM Press, 1999, 140-149.
[11] Chen, H., and D. Wagner, MOPS: an Infrastructure for Examining Security Properties of Software, Proc. CCS'02, ACM Press, 2002, 235-244.
[12] Chen, H., D. Wagner, and D. Dean, Setuid Demystified, Proc. Security'02, USENIX, 2002, 171-190.
[13] Dewan, P., and H. Shen, Flexible Meta Access-Control for Collaborative Applications, Proc. CSCW'98, ACM Press, 1998, 247-256.
[14] Diffie, W., and M. Hellman, New Directions in Cryptography, IEEE Transactions on Information Theory 22, 6 (1976), 644-656.
[15] Dolev, D., and A. Yao, On the security of public-key protocols, IEEE Transactions on Information Theory 2, 29 (1983), 198-208.
[16] Egidi, L., and M. Petrocchi, Modelling a Secure Agent with Team Automata, Tech. Rep. TRINF-2004-07-08-UNIPMN, Dipartimento di Informatica, Universit`a degli Studi del Piemonte Orientale Amedeo Avogadro, July 2004.
[17] Ellis, C.A., and K.-H. Kim, A Framework and Taxonomy for Workflow Architectures, Designing Cooperative Systems: The Use of Theories and Models-Proc. COOP'00, IOS Press, 2000, 99- 112.
[18] Ellis, C.A., Team Automata for Groupware Systems, Proc. GROUP'97, ACM Press, 1997, 415-424.
[19] Engels, G., and L.P.J. Groenewegen, Towards Team-Automata-Driven Object-Oriented Collaborative Work, Formal and Natural Computing, LNCS 2300, Springer, 2002, 257-276.
[20] Focardi, R., and R. Gorrieri, A Classification of Security Properties for Process Algebras, Journal of Computer Security 3, 1 (1994), 5-33.
[21] Focardi, R., and R. Gorrieri, The Compositional Security Checker-a Tool for the Verification of Information Flow Security Properties, IEEE Transactions on Software Engineering 23, 9 (1997), 550-571.
[22] Focardi, R., and R. Gorrieri, Classification of Security Properties-Part II: Information Flow, Proc. FOSAD 2001-Tutorial Lectures, LNCS 2171, Springer, 2001, 331-396.
[23] Focardi, R., R. Gorrieri, and F. Martinelli, Non Interference for the Analysis of Cryptographic Protocols, Proc. ICALP'00, LNCS 1853, Springer, 2000, 354-372.
[24] Focardi, R., R. Gorrieri, and F. Martinelli, Secrecy in Security Protocols as Non Interference, ENTCS 32, 2000.
[25] Focardi, R., R. Gorrieri, and F. Martinelli, Classification of Security Properties-Part II: Network Security, Proc. FOSAD 2001/2002 Tutorial Lectures, LNCS 2946, Springer, 2004, 139-185.
[26] Focardi, R., and F. Martinelli, A Uniform Approach for the Definition of Security Properties, Proc. FM'99, LNCS 1708, Springer, 1999, 794-813.
[27] Garland, S.J., and N.A. Lynch, The IOA Language and Toolset-Support for Designing, Analyzing, and Building Distributed Systems, Tech. Rep. MIT/LCS/TR-762, MIT, 1998.
[28] Goguen, J.A., and J. Meseguer, Security Policy and Security Models, Proc. S&P'82, IEEE Press, 1982, 11-20.
[29] Gu¨rgens, S., P. Ochsenschl¨ager, and C. Rudolph, Role Based Specification and Security Analysis of Cryptographic Protocols Using Asynchronous Product Automata, Proc. DEXA'02, IEEE Press, 2002, 473-482.
[30] 't Hoen, P.J., “Towards Distributed Development of Large Object-Oriented Models-Views of Packages as Classes”, Ph.D. thesis, Leiden Institute of Advanced Computer Science, Leiden University, 2001.
[31] 't Hoen, P.J., and M.H. ter Beek, A Conflict-Free Strategy for Team-Based Model Development, Proc. PDTSD'00, 2000, 720-725.
[32] Holzmann, G.J., “The SPIN Model Checker-Primer and Reference Manual”, Addison Wesley, 2003.
[33] Kleijn, J., Team Automata for CSCW - A Survey -, Petri Net Technology for CommunicationBased Systems-Advances in Petri Nets, LNCS 2472, Springer, 2003, 295-320.
[34] Kurshan, R.P., “Computer-Aided Verification of Coordinating Processes-The AutomataTheoretic Approach”, Princeton Univ. Press, 1994.
[35] Lanotte, R., A. Maggiolo-Schettini, and A. Troina, Weak Bisimulation for Probabilistic Timed Automata and Applications to Security, Proc. SEFM'03, IEEE Press, 2003, 34-43.
[36] Lavana, H., “A Universally Configurable Architecture for Taskflow-Oriented Design of a Distributed Collaborative Computing Environment”, Ph.D. thesis, Department of Electrical and Computer Engineering, North Carolina State University, 2000.
[37] Lowe, G., Breaking and Fixing the Needham-Schroeder Public-Key Protocol Using FDR, Proc. TACAS'96, LNCS 1055, Springer, 1996, 147-166.
[38] Lynch, N.A., I/O Automaton Models and Proofs for Shared-Key Communi- cation Systems, Proc. CSFW'99, IEEE Press, 1999, 14-31.
[39] Lynch, N.A., Input/Output Automata: Basic, Timed, Hybrid, Probabilistic, Dynamic,..., Proc. CONCUR'03, LNCS 2761, Springer, 1996, 191-192.
[40] Lynch, N.A., and M.R. Tuttle, An Introduction to Input/Output Automata, CWI Quarterly 2, 3 (1989), 219-246. Tech. Memo MIT/LCS/TM-373, 1988.
[41] Martinelli, F., M. Petrocchi, and A. Vaccarelli, Compositional Verification of Secure Streamed Data: a Case Study with EMSS, Proc. ICTCS'03, LNCS 2841, Springer, 2003, 383-396.
[42] Nipkow, T., L.C. Paulson, and M. Wenzel, “Isabelle/HOL-A Proof Assistant for Higher-Order Logic”, LNCS 2283, Springer, 2002. For an up-to-date description, see http://isabelle.in.tum.de/.
[43] Moskowitz, I.S., and O.L. Costich, A Classical Automata Approach to Noninterference Type Problems, Proc. CSFW'92, IEEE Press, 1992, 2-8.
[44] von Oheimb, D., Interacting State Machines-A Stateful Approach to Proving Security, Proc. FASec'02, LNCS 2629, Springer, 2003, 15-32.
[45] von Oheimb, D., and V. Lotz, Formal Security Analysis with Interacting State Machines, Proc. ESORICS'02, LNCS 2502, Springer, 2002, 212-228.
[46] Perrig, A., R. Canetti, J.D. Tygar, and D.X. Song, Efficient Authentication and Signing of Multicast Streams over Lossy Channels, Proc. S&P'00, IEEE Press, 2000, 56-73.
[47] Schneider, F.B., Enforceable Security Policies, ACM Transactions on Information and System Security 3, 1 (2000), 30-50.
[48] Segala, R., A Compositional Trace-Based Semantics for Proc. CONCUR'95, LNCS 962, Springer, 1995, 234-248.
[49] Tuttle, M.R., “Hierarchical Correctness Proofs for Distributed Algorithms”, Master's thesis, Dept. of Electrical Engineering and Computer Science, MIT, 1987. Tech. Rep. MIT/LCS/TR387, 1987.
[50] The TA webpage: http://fmt.isti.cnr.it/ mtbeek/TA.html. The TA bibliography: http://liinwww.ira.uka.de/bibliography/Theory/TA.html.