Select Publications

Books

Alvim MS; Chatzikokolakis K; McIver A; Morgan C; Palamidessi C; Smith G, 2020, The Science of Quantitative Information Flow, Springer International Publishing, http://dx.doi.org/10.1007/978-3-319-96131-6

Leucker M; Morgan C, 2009, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics): Preface

Morgan CC; McIver A, 2005, Abstraction, refinement and proof for probabilistic systems, 1, Springer Verlag, New York, http://portal.acm.org/citation.cfm?id=1036296

2003, Programming Methodology, Morgan CC; McIver A, (ed.), Springer Publishing Company, New York, http://www.springer.com/computer/swe/book/978-0-387-95349-6

Book Chapters

Bird R; Gibbons J; Hinze R; Höfner P; Jeuring J; Meertens L; Möller B; Morgan C; Schrijvers T; Swierstra W; Wu N, 2021, 'Algorithmics', in IFIP Advances in Information and Communication Technology, Springer International Publishing, pp. 59 - 98, http://dx.doi.org/10.1007/978-3-030-81701-5_3

Alvim MS; Chatzikokolakis K; McIver A; Morgan C; Palamidessi C; Smith G, 2020, 'A demonic lattice of information', in Information Security and Cryptography, pp. 325 - 350, http://dx.doi.org/10.1007/978-3-319-96131-6_17

Alvim MS; Chatzikokolakis K; McIver A; Morgan C; Palamidessi C; Smith G, 2020, 'Axiomatics', in Information Security and Cryptography, pp. 183 - 204, http://dx.doi.org/10.1007/978-3-319-96131-6_11

Alvim MS; Chatzikokolakis K; McIver A; Morgan C; Palamidessi C; Smith G, 2020, 'Capacity', in Information Security and Cryptography, pp. 107 - 130, http://dx.doi.org/10.1007/978-3-319-96131-6_7

Alvim MS; Chatzikokolakis K; McIver A; Morgan C; Palamidessi C; Smith G, 2020, 'Channels', in Information Security and Cryptography, pp. 49 - 70, http://dx.doi.org/10.1007/978-3-319-96131-6_4

Alvim MS; Chatzikokolakis K; McIver A; Morgan C; Palamidessi C; Smith G, 2020, 'Composition of channels', in Information Security and Cryptography, pp. 131 - 145, http://dx.doi.org/10.1007/978-3-319-96131-6_8

Alvim MS; Chatzikokolakis K; McIver A; Morgan C; Palamidessi C; Smith G, 2020, 'Defense against side channels', in Information Security and Cryptography, pp. 389 - 397, http://dx.doi.org/10.1007/978-3-319-96131-6_20

Alvim MS; Chatzikokolakis K; McIver A; Morgan C; Palamidessi C; Smith G, 2020, 'Differential privacy', in Information Security and Cryptography, pp. 433 - 444, http://dx.doi.org/10.1007/978-3-319-96131-6_23

Alvim MS; Chatzikokolakis K; McIver A; Morgan C; Palamidessi C; Smith G, 2020, 'Hidden-Markov modeling of QIF in sequential programs', in Information Security and Cryptography, pp. 255 - 282, http://dx.doi.org/10.1007/978-3-319-96131-6_14

Alvim MS; Chatzikokolakis K; McIver A; Morgan C; Palamidessi C; Smith G, 2020, 'Introduction', in Information Security and Cryptography, pp. 3 - 13, http://dx.doi.org/10.1007/978-3-319-96131-6_1

Alvim MS; Chatzikokolakis K; McIver A; Morgan C; Palamidessi C; Smith G, 2020, 'Iteration and nontermination', in Information Security and Cryptography, pp. 307 - 323, http://dx.doi.org/10.1007/978-3-319-96131-6_16

Alvim MS; Chatzikokolakis K; McIver A; Morgan C; Palamidessi C; Smith G, 2020, 'Modeling secrets', in Information Security and Cryptography, pp. 17 - 23, http://dx.doi.org/10.1007/978-3-319-96131-6_2

Alvim MS; Chatzikokolakis K; McIver A; Morgan C; Palamidessi C; Smith G, 2020, 'Multi-party computation: The Three Judges protocol', in Information Security and Cryptography, pp. 399 - 411, http://dx.doi.org/10.1007/978-3-319-96131-6_21

Alvim MS; Chatzikokolakis K; McIver A; Morgan C; Palamidessi C; Smith G, 2020, 'On $$ \mathit {g} $$ -vulnerability', in Information Security and Cryptography, pp. 25 - 46, http://dx.doi.org/10.1007/978-3-319-96131-6_3

Alvim MS; Chatzikokolakis K; McIver A; Morgan C; Palamidessi C; Smith G, 2020, 'Posterior vulnerability and leakage', in Information Security and Cryptography, pp. 71 - 100, http://dx.doi.org/10.1007/978-3-319-96131-6_5

Alvim MS; Chatzikokolakis K; McIver A; Morgan C; Palamidessi C; Smith G, 2020, 'Program algebra for QIF', in Information Security and Cryptography, pp. 283 - 305, http://dx.doi.org/10.1007/978-3-319-96131-6_15

Alvim MS; Chatzikokolakis K; McIver A; Morgan C; Palamidessi C; Smith G, 2020, 'Quantitative information flow in sequential computer programs', in Information Security and Cryptography, pp. 225 - 253, http://dx.doi.org/10.1007/978-3-319-96131-6_13

Alvim MS; Chatzikokolakis K; McIver A; Morgan C; Palamidessi C; Smith G, 2020, 'Refinement', in Information Security and Cryptography, pp. 147 - 170, http://dx.doi.org/10.1007/978-3-319-96131-6_9

Alvim MS; Chatzikokolakis K; McIver A; Morgan C; Palamidessi C; Smith G, 2020, 'Robustness', in Information Security and Cryptography, pp. 101 - 105, http://dx.doi.org/10.1007/978-3-319-96131-6_6

Alvim MS; Chatzikokolakis K; McIver A; Morgan C; Palamidessi C; Smith G, 2020, 'The Crowds protocol', in Information Security and Cryptography, pp. 353 - 367, http://dx.doi.org/10.1007/978-3-319-96131-6_18

Alvim MS; Chatzikokolakis K; McIver A; Morgan C; Palamidessi C; Smith G, 2020, 'The Dalenius perspective', in Information Security and Cryptography, pp. 171 - 181, http://dx.doi.org/10.1007/978-3-319-96131-6_10

Alvim MS; Chatzikokolakis K; McIver A; Morgan C; Palamidessi C; Smith G, 2020, 'The geometry of hypers, gains and losses', in Information Security and Cryptography, pp. 205 - 221, http://dx.doi.org/10.1007/978-3-319-96131-6_12

Alvim MS; Chatzikokolakis K; McIver A; Morgan C; Palamidessi C; Smith G, 2020, 'Timing attacks on blinded and bucketed cryptography', in Information Security and Cryptography, pp. 369 - 388, http://dx.doi.org/10.1007/978-3-319-96131-6_19

Alvim MS; Chatzikokolakis K; McIver A; Morgan C; Palamidessi C; Smith G, 2020, 'Voting systems', in Information Security and Cryptography, pp. 413 - 431, http://dx.doi.org/10.1007/978-3-319-96131-6_22

Rabehaja T; McIver A; Morgan C; Struth G, 2019, 'Categorical Information Flow', in The Art of Modelling Computational Systems: A Journey from Logic and Concurrency to Security and Privacy, pp. 329 - 343, http://dx.doi.org/10.1007/978-3-030-31175-9_19

Morgan C, 2017, 'A demonic lattice of information', in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Springer, Cham, pp. 203 - 222, http://dx.doi.org/10.1007/978-3-319-51046-0_11

McIver A; Morgan CC, 2010, 'The thousand-and-one cryptographers', in Wood K; Roscoe AW; Jones CB (ed.), Reflections on the work of C.A.R. Hoare, Springer, New York, pp. 255 - 282, http://dx.doi.org/10.1007/978-1-84882-912-1_12

Morgan CC; McIver A, 2006, 'Developing and Reasoning about probabilistic programs in pGCL', in Cavalcanti ; Sampaio ; Woodcock (ed.), Refinement Techniques in Software Engineering, Springer Publishing Company, Germany, pp. 123 - 155

Morgan CC; McIver A, 2006, 'Programming-Logic Analysis of Fault Tolerance', in Butler ; Jones ; Romanovsky ; Troubitsyna (ed.), Rigorous Development of Complex Fault-Tolerant Systems, edn. First, Springer Publishing Company, Germany, pp. 288 - 305

Hoang TS; Jin Z; Robinson K; McIver A; Morgan C, 2005, 'Development via Refinement in Probabilistic B — Foundation and Case Study', in ZB 2005: Formal Specification and Development in Z and B, Springer Berlin Heidelberg, pp. 355 - 373, http://dx.doi.org/10.1007/11415787_21

Morgan CC, 2005, 'Of probabilistic wp and CSP - and compositionality', in Abdallah ; Jones ; Roscoe ; Sanders (ed.), Proceedings of the First International Conference on Advances in Natural Computation (ICNC 2005), Part III, Lecture Notes in Computer Science 3612/2005, Springer, Berlin, Germany, pp. 220 - 241

Morgan CC; McIver A, 2003, 'A probabilistic approach to information hiding', in Morgan C; McIver A (ed.), Programming Methodology, edn. 1, Springer Publishing Company, New York, pp. 441 - 460, http://portal.acm.org/citation.cfm?id=766972

Morgan C, 1993, 'The refinement calculus, and literate development', in Formal Program Development, Springer Berlin Heidelberg, pp. 161 - 182, http://dx.doi.org/10.1007/3-540-57499-9_20

Hoare CAR; Hayes IJ; Jifeng H; Morgan CC; Roscoe AW; Sanders JW; Sorenson IH; Spivey JM; Sufrin BA, 1992, 'Laws of Programming', in Programming and Mathematical Method, Springer Berlin Heidelberg, pp. 95 - 122, http://dx.doi.org/10.1007/978-3-642-77572-7_7

Morgan C, 1990, 'Of wp and CSP', in Beauty Is Our Business, Springer New York, pp. 319 - 326, http://dx.doi.org/10.1007/978-1-4612-4476-9_37

Journal articles

Fernandes N; McIver A; Morgan C, 2021, 'The Laplace Mechanism has optimal utility for differential privacy over continuous queries', Proceedings - Symposium on Logic in Computer Science, vol. 2021-June, http://dx.doi.org/10.1109/LICS52264.2021.9470718

Höfner P; Morgan C; Pratt V, 2020, 'Preface', Acta Informatica, vol. 57, pp. 305 - 311, http://dx.doi.org/10.1007/s00236-020-00382-7

McIver AK; Morgan CC; Rabehaja T, 2019, 'Program algebra for quantitative information flow', Journal of Logical and Algebraic Methods in Programming, vol. 106, pp. 55 - 77, http://dx.doi.org/10.1016/j.jlamp.2019.04.002

Alvim MS; Chatzikokolakis K; McIver A; Morgan C; Palamidessi C; Smith G, 2019, 'An axiomatization of information flow measures', Theoretical Computer Science, vol. 777, pp. 32 - 54, http://dx.doi.org/10.1016/j.tcs.2018.10.016

Mc Iver A; Morgan C; Rabehaja T, 2019, 'Abstract hidden markov models: A monadic account of quantitative information flow', Logical Methods in Computer Science, vol. 15, pp. 36:1-36:50, http://dx.doi.org/10.23638/LMCS-15(1:36)2019

McIver A; Morgan C; Kaminski BL; Katoen J-P, 2018, 'A new proof rule for almost-sure termination', Proceedings of the ACM on Programming Languages, vol. 2, pp. 1 - 28, http://dx.doi.org/10.1145/3158121

McIver A; Rabehaja T; Wen R; Morgan C, 2017, 'Privacy in elections: How small is “small”?', Journal of Information Security and Applications, vol. 36, pp. 112 - 126, http://dx.doi.org/10.1016/j.jisa.2017.08.003

Simao A; Morgan C, 2014, 'Selected papers from the Brazilian Symposium on Formal Methods (SBMF 2011)', Science of Computer Programming, vol. 92, pp. 85, http://dx.doi.org/10.1016/j.scico.2014.02.004

Hoang TS; McIver AK; Meinicke L; Morgan CC; Sloane A; Susatyo E, 2014, 'Abstractions of non-interference security: Probabilistic versus possibilistic', Formal Aspects of Computing, vol. 26, pp. 169 - 194, http://dx.doi.org/10.1007/s00165-012-0237-4

Morgan C, 2014, 'An old new notation for elementary probability theory', Science of Computer Programming, vol. 85, pp. 115 - 136, http://dx.doi.org/10.1016/j.scico.2013.09.003

Mciver A; Meinicke L; Morgan C, 2014, 'Hidden-Markov program algebra with iteration', Mathematical Structures in Computer Science, vol. 29, http://dx.doi.org/10.1017/S0960129513000625


Back to profile page