|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 262 occurrences of 150 keywords
|
|
|
Results
Found 394 publication records. Showing 394 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Martín Abadi |
On SDSI's Linked Local Name Spaces. |
CSFW |
1997 |
DBLP DOI BibTeX RDF |
|
1 | Steve A. Schneider |
Verifying authentication protocols with CSP. |
CSFW |
1997 |
DBLP DOI BibTeX RDF |
Needham-Schroeder protocol, verification, Authentication, formal methods, security protocols, CSP |
1 | J. Sinclair |
The Computer Security Foundations Workshop: Ten Years on and Ten Years Ahead. |
CSFW |
1997 |
DBLP DOI BibTeX RDF |
|
1 | Catherine Meadows 0001 |
Languages for Formal Specification of Security Protocols. |
CSFW |
1997 |
DBLP DOI BibTeX RDF |
|
1 | Dominique Bolignano |
Towards the Formal Verification of Electronic Commerce Protocols. |
CSFW |
1997 |
DBLP DOI BibTeX RDF |
|
1 | Gavin Lowe |
Casper: A Compiler for the Analysis of Security Protocols. |
CSFW |
1997 |
DBLP DOI BibTeX RDF |
|
1 | Richard T. Simon, Mary Ellen Zurko |
Separation of Duty in Role-based Environments. |
CSFW |
1997 |
DBLP DOI BibTeX RDF |
|
1 | Yun Bai 0001, Vijay Varadharajan |
A Logic For State Transformations in Authorization Policies. |
CSFW |
1997 |
DBLP DOI BibTeX RDF |
|
1 | Dennis M. Volpano, Geoffrey Smith 0001 |
Eliminating Covert Flows with Minimum Typings. |
CSFW |
1997 |
DBLP DOI BibTeX RDF |
|
1 | James W. Gray III, Kin Fai Epsilon Ip, King-Shan Lui |
Provable Security for Cryptographic Protocols: Exact Analysis and Engineering Applications. |
CSFW |
1997 |
DBLP DOI BibTeX RDF |
|
1 | Lawrence C. Paulson |
Proving Properties of Security Protocols by Induction. |
CSFW |
1997 |
DBLP DOI BibTeX RDF |
|
1 | |
10th Computer Security Foundations Workshop (CSFW '97), June 10-12, 1997, Rockport, Massachusetts, USA |
CSFW |
1997 |
DBLP BibTeX RDF |
|
1 | Dahlia Malkhi, Michael K. Reiter |
Unreliable Intrusion Detection in Distributed Computations. |
CSFW |
1997 |
DBLP DOI BibTeX RDF |
|
1 | Tuomas Aura |
Strategies against Replay Attacks. |
CSFW |
1997 |
DBLP DOI BibTeX RDF |
|
1 | Jianying Zhou 0001, Dieter Gollmann |
An Efficient Non-repudiation Protocol . |
CSFW |
1997 |
DBLP DOI BibTeX RDF |
network security, security protocols, non-repudiation |
1 | Ciarán Bryce |
Security Engineering of Lattice-Based Policies. |
CSFW |
1997 |
DBLP DOI BibTeX RDF |
lattice policy modeling, Security engineering, information flow security |
1 | Gavin Lowe |
A Hierarchy of Authentication Specification. |
CSFW |
1997 |
DBLP DOI BibTeX RDF |
|
1 | Lawrence C. Paulson |
Mechanized proofs for a recursive authentication protocol. |
CSFW |
1997 |
DBLP DOI BibTeX RDF |
mechanized proofs, recursive authentication protocol, inductive approach, message nesting, basic security theorem, adjacent pairs, honest agents, protocol complexity, agents, protocols, specification, symmetry, mutual authentication, Isabelle/HOL, session keys |
1 | Paul F. Syverson |
A Different Look at Secure Distributed Computation. |
CSFW |
1997 |
DBLP DOI BibTeX RDF |
Coordinated attack, Security, Distributed Computing, Game Theory, Byzantine failure |
1 | Riccardo Focardi |
Comparing Two Information Flow Security Properties. |
CSFW |
1996 |
DBLP DOI BibTeX RDF |
nondeducibility, security checker, software tool, automatic verification, noninterference, multilevel security |
1 | Patrik D'haeseleer |
An Immunological Approach to Change Detection: Theoretical Results. |
CSFW |
1996 |
DBLP DOI BibTeX RDF |
Immunology, distributed, entropy, change detection, negative selection, information loss, holes |
1 | Adrian Spalka |
The non-primitiveness of the simple-security property and its non-applicability to relational databases. |
CSFW |
1996 |
DBLP DOI BibTeX RDF |
simple-security property, secure environment, relational databases, relational databases, confidentiality, security of data |
1 | Jonathan K. Millen, Hai-Ping Ko |
Narrowing terminates for encryption. |
CSFW |
1996 |
DBLP DOI BibTeX RDF |
term replacement rules, reduction properties, symbolic encryption operations, narrowing steps, infinite sequence, popular abstract encryption operators, terminating algorithm, cryptography, encryption, access protocols, protocol analysis |
1 | Jane E. Sinclair |
Action Systems for Security Specification. |
CSFW |
1996 |
DBLP DOI BibTeX RDF |
security development, formal methods, noninterference, Action systems |
1 | Gavin Lowe |
Some new attacks upon security protocols. |
CSFW |
1996 |
DBLP DOI BibTeX RDF |
authentication, security protocols, public key cryptography, access protocols, cryptographic key |
1 | John P. McDermott, David M. Goldschlag |
Towards a model of storage jamming. |
CSFW |
1996 |
DBLP DOI BibTeX RDF |
storage jamming model, cryptographic techniques, detection mechanism, Unity logic, high-level operators, rate of jamming, persistent values, access control, access controls, cryptography, security of data, susceptibility |
1 | Stephen H. Brackin |
A HOL extension of GNY for automatically analyzing cryptographic protocols. |
CSFW |
1996 |
DBLP DOI BibTeX RDF |
HOL extension, automatically analyzing cryptographic protocols, higher order logic theory, authentication properties, protocol properties, hash operations, key-exchange algorithms, formal specification, cryptography, message authentication, access protocols, message authentication codes, multiple encryption, belief maintenance, belief logic |
1 | Yvo Desmedt |
Simmons' protocol is not free of subliminal channels. |
CSFW |
1996 |
DBLP DOI BibTeX RDF |
Simmons' protocol, Digital Signature Standard, security of data, access protocols, subliminal channels, subliminal channel |
1 | Aris Zakinthinos, E. Stewart Lee |
How and why feedback composition fails [secure systems]. |
CSFW |
1996 |
DBLP DOI BibTeX RDF |
feedback composition, generalized noninterference, secure components, n-forward correctability, system designer, security of data, composability, necessary and sufficient conditions, restrictiveness |
1 | Dalia Malki, Michael K. Reiter |
A High-Throughput Secure Reliable Multicast Protocol. |
CSFW |
1996 |
DBLP DOI BibTeX RDF |
fault tolerance, group communication, agreement, secure multicast |
1 | Stefek Zaba |
E-Commerce Payment Protocols: Requirements and Analysis. |
CSFW |
1996 |
DBLP DOI BibTeX RDF |
|
1 | Frédéric Cuppens, Claire Saurel |
Specifying a security policy: a case study. |
CSFW |
1996 |
DBLP DOI BibTeX RDF |
high risk environment, interoperability problems, logic-based approach, formal specification, consistency, completeness, security of data, formal logic, deontic logic, security policy specification |
1 | |
Ninth IEEE Computer Security Foundations Workshop, March 10 - 12, 1996, Dromquinna Manor, Kenmare, County Kerry, Ireland |
CSFW |
1996 |
DBLP BibTeX RDF |
|
1 | Paul F. Syverson |
What is an Attack on a Cryptographic Protocal? |
CSFW |
1996 |
DBLP DOI BibTeX RDF |
|
1 | Peter Ryan 0001 |
A Genealogy of Non-Interference. |
CSFW |
1996 |
DBLP DOI BibTeX RDF |
|
1 | Colin Boyd |
A Class of Flexible and Efficient Key Management Protocols. |
CSFW |
1996 |
DBLP DOI BibTeX RDF |
authentication, key management, secure protocols |
1 | Ramesh V. Peri, William A. Wulf, Darrell M. Kienzle |
A Logic of Composition for Information Flow Predicates. |
CSFW |
1996 |
DBLP DOI BibTeX RDF |
|
1 | Catherine Meadows 0001 |
Language generation and verification in the NRL protocol analyzer. |
CSFW |
1996 |
DBLP DOI BibTeX RDF |
language verification, NRL protocol analyzer, infinite classes of states, cryptography, formal verification, cryptographic protocols, formal languages, formal languages, access protocols, security properties, exhaustive search, language generation |
1 | A. W. Roscoe 0001 |
Intensional specifications of security protocols. |
CSFW |
1996 |
DBLP DOI BibTeX RDF |
intensional specifications, formal specification, cryptography, security protocols, cryptographic protocols, confidentiality, access protocols |
1 | Luigi Giuri, Pietro Iglio |
A Formal Model for Role-Based Access Control with Constraints. |
CSFW |
1996 |
DBLP DOI BibTeX RDF |
security constraints, role-based access control |
1 | Li Gong |
Optimal authentication protocols resistant to password guessing attacks. |
CSFW |
1995 |
DBLP DOI BibTeX RDF |
optimal authentification protocols, user passwords, protocols, message authentication, password guessing attacks |
1 | Colin Boyd |
Towards a classification of key agreement protocols. |
CSFW |
1995 |
DBLP DOI BibTeX RDF |
one-way junctions, classification, protocols, security of data, key agreement protocols |
1 | |
The Eighth IEEE Computer Security Foundations Workshop (CSFW '95), March 13-15, 1995, Kenmare, County Kerry, Ireland |
CSFW |
1995 |
DBLP BibTeX RDF |
|
1 | Alfred P. Maneki |
Algebraic properties of system composition in the LORAL, Ulysses and McLean trace models. |
CSFW |
1995 |
DBLP DOI BibTeX RDF |
trace models, associative laws, commutative laws, containment relationships, information systems, information systems, security of data, security properties, event systems, system composition, algebraic properties |
1 | John V. A. Janeri, Daylan B. Darby, Daniel D. Schnackenberg |
Building higher resolution synthetic clocks for signaling in covert timing channels. |
CSFW |
1995 |
DBLP DOI BibTeX RDF |
higher resolution synthetic clocks, timing channel countermeasure, Boeing multilevel secure local area network, secure network server, internal timing channels, time reference clock granularity, fine-grained signaling clock, timing channel throughput, timing channel capacities, local area networks, security of data, worst-case analysis, covert timing channels |
1 | Riccardo Focardi, Roberto Gorrieri, V. Panini |
The security checker: a semantics-based tool for the verification of security properties. |
CSFW |
1995 |
DBLP DOI BibTeX RDF |
security checker, semantics-based tool, security properties verification, security process algebra, concurrency workbench, formal specification, formal verification, specifications, process algebra, confidentiality, security of data, automatic verification |
1 | Simon N. Foley, Jeremy Jacob |
Specifying security for CSCW systems. |
CSFW |
1995 |
DBLP DOI BibTeX RDF |
confidentiality security, formal specification, formal specification, specification, groupware, safety, security of data, functionality, CSCW systems |
1 | Liqun Chen 0002, Dieter Gollmann, Chris J. Mitchell |
Key distribution without individual trusted authentification servers. |
CSFW |
1995 |
DBLP DOI BibTeX RDF |
key distribution systems, authentication servers, key distribution protocols, cross checksum scheme, cryptography, trust, protocols, data integrity, message authentication, symmetric encryption |
1 | A. W. Roscoe 0001, Lars Wulf |
Composing and decomposing systems under security properties. |
CSFW |
1995 |
DBLP DOI BibTeX RDF |
separability of processes, noninterference properties, disjoint components, security of data, separability, security properties |
1 | William R. Bevier, Richard M. Cohen, William D. Young |
Connection policies and controlled interference. |
CSFW |
1995 |
DBLP DOI BibTeX RDF |
communication policy, controlled interference, system agents, connection policy, state-based formulation, distributed processing, computer security, security of data |
1 | Paul F. Syverson, James W. Gray III |
The epistemic representation of information flow security in probabilistic systems. |
CSFW |
1995 |
DBLP DOI BibTeX RDF |
epistemic representation, security criterion, security, verification, formal specification, information theory, security of data, formal logic, multilevel security, probabilistic systems, information flow security |
1 | James W. Gray III, John McLean |
Using temporal logic to specify and verify cryptographic protocols. |
CSFW |
1995 |
DBLP DOI BibTeX RDF |
specify, system penetrator, correctness requirements, verification, formal specification, formal methods, cryptography, protocols, formal verification, temporal logic, temporal logic, cryptographic protocols, verify |
1 | A. W. Roscoe 0001 |
Modelling and verifying key-exchange protocols using CSP and FDR. |
CSFW |
1995 |
DBLP DOI BibTeX RDF |
model-checking, formal specification, protocols, formal verification, process algebra, CSP, communicating sequential processes, FDR, key-exchange protocols |
1 | Iwen E. Kang, Thomas F. Keefe |
Concurrency control for federated multilevel secure database systems. |
CSFW |
1995 |
DBLP DOI BibTeX RDF |
MLS database systems, federated MLS database, local database systems, global serializability, security, interoperation, distributed databases, concurrency control, concurrency control, transaction processing, transaction processing, open systems, security of data, federated, multilevel secure database systems |
1 | Trent Jaeger, Atul Prakash 0001 |
Implementation of a discretionary access control model for script-based systems. |
CSFW |
1995 |
DBLP DOI BibTeX RDF |
discretionary access control model, script-based systems, World-wide Web browsing tool, security of data, authorisation, Mosaic, prototype system, unauthorized access |
1 | Aris Zakinthinos, E. Stewart Lee |
The composability of non-interference [system security]. |
CSFW |
1995 |
DBLP DOI BibTeX RDF |
McCullough's conjecture, noninterference composability, feedback, security of data, system security |
1 | Wenbo Mao |
An augmentation of BAN-like logics. |
CSFW |
1995 |
DBLP DOI BibTeX RDF |
BAN-like logics augmentation, protocol idealization, rule-based technique, protocol syntax, protocols, formal logic, message authentication, authentication protocols, symbolic manipulation |
1 | Volker Kessler, Gabriele Wedel |
AUTLOG - An Advanced Logic of Authentication. |
CSFW |
1994 |
DBLP DOI BibTeX RDF |
|
1 | Ravi S. Sandhu, Roshan K. Thomas |
Conceptual Foundations for a Model of Task-based Authorizations. |
CSFW |
1994 |
DBLP DOI BibTeX RDF |
|
1 | Carol Muehrcke |
Formal Methods for the Informal World. |
CSFW |
1994 |
DBLP DOI BibTeX RDF |
|
1 | Ravi S. Sandhu, Paul Ammann |
One-Representative Safety Analysis in the Non-Monotonic Transform Model. |
CSFW |
1994 |
DBLP DOI BibTeX RDF |
|
1 | Daniel F. Sterne, Glenn S. Benson, Homayoon Tajalli |
Redrawing the Security Perimeter of a Trusted System. |
CSFW |
1994 |
DBLP DOI BibTeX RDF |
|
1 | Daniel F. Sterne |
Panel: Reconsidering the Role fo the Reference Monitor. |
CSFW |
1994 |
DBLP DOI BibTeX RDF |
|
1 | Aviel D. Rubin, Peter Honeyman |
Nonmonotonic Cryptographic Protocols. |
CSFW |
1994 |
DBLP DOI BibTeX RDF |
|
1 | Ramesh V. Peri, William A. Wulf |
Formal Specification of Information Flow Security Policies and Their Enforcement in Security Critical Systems. |
CSFW |
1994 |
DBLP DOI BibTeX RDF |
|
1 | George W. Dinolt, Lee A. Benzinger, Mark Yatabe |
Combining Components and Policies. |
CSFW |
1994 |
DBLP DOI BibTeX RDF |
|
1 | William D. Young, William R. Bevier |
A State-Based Approach to Non-Interference. |
CSFW |
1994 |
DBLP DOI BibTeX RDF |
|
1 | Adrian Spalka |
Formal Semantics of Rights and Confidentiality in Definite Deductive Databases |
CSFW |
1994 |
DBLP DOI BibTeX RDF |
|
1 | Ulf Carlsen |
Cryptographic Protocols Flaws. |
CSFW |
1994 |
DBLP DOI BibTeX RDF |
|
1 | Catherine Meadows 0001 |
A Model of Computation for the NRL Protocol Analyzer. |
CSFW |
1994 |
DBLP DOI BibTeX RDF |
|
1 | Jonathan K. Millen |
Unwinding Forward Correctability. |
CSFW |
1994 |
DBLP DOI BibTeX RDF |
|
1 | Wenbo Mao, Colin Boyd |
Development of Authentication Protocols: Some Misconceptions and a New Approach. |
CSFW |
1994 |
DBLP DOI BibTeX RDF |
|
1 | Simon N. Foley |
Reasoning about Confidentiality Requirements. |
CSFW |
1994 |
DBLP DOI BibTeX RDF |
|
1 | Oliver Costich, John McLean, John P. McDermott |
Confidentiality in a Replicated Architecture Trusted Database System: A Formal Model. |
CSFW |
1994 |
DBLP DOI BibTeX RDF |
|
1 | |
Seventh IEEE Computer Security Foundations Workshop - CSFW'94, Franconia, New Hampshire, USA, June 14-16, 1994, Proceedings |
CSFW |
1994 |
DBLP BibTeX RDF |
|
1 | Riccardo Focardi, Roberto Gorrieri |
A Taxonomy of Security Properties for CCS. |
CSFW |
1994 |
DBLP DOI BibTeX RDF |
|
1 | Paul F. Syverson |
A Taxonomy of Replay Attacks. |
CSFW |
1994 |
DBLP DOI BibTeX RDF |
|
1 | James G. Williams 0002, Leonard J. LaPadula |
Automated Support for External Consistency. |
CSFW |
1993 |
DBLP DOI BibTeX RDF |
|
1 | Wenbo Mao, Colin Boyd |
Towards Formal Analysis of Security Protocols. |
CSFW |
1993 |
DBLP DOI BibTeX RDF |
|
1 | Li Gong |
A Variation on the Themes of Message Freshness and Replay or, the Difficulty in Devising Formal Methods to Analyze Cryptographic Protocols. |
CSFW |
1993 |
DBLP DOI BibTeX RDF |
|
1 | Mary Ellen Zurko |
Panel: What are the Foundations of Computer Security? |
CSFW |
1993 |
DBLP BibTeX RDF |
|
1 | Amit G. Mathur, Thomas F. Keefe |
The Concurrency Control and Recovery Problem for Multilevel Update Transactions in MLS System. |
CSFW |
1993 |
DBLP DOI BibTeX RDF |
|
1 | Gustavus J. Simmons |
Invited talk: An Introductions to the Mathematics of Trust in Security Protocols. |
CSFW |
1993 |
DBLP DOI BibTeX RDF |
|
1 | |
6th IEEE Computer Security Foundations Workshop - CSFW'93, Franconia, New Hampshire, USA, June 15-17, 1993, Proceedings |
CSFW |
1993 |
DBLP BibTeX RDF |
|
1 | David Rosenthal |
Modeling Restrictive Processes that Involve Blocking Requests. |
CSFW |
1993 |
DBLP DOI BibTeX RDF |
|
1 | Pierre Bieber, Nora Boulahia-Cuppens, T. Lehmann, E. van Wickeren |
Abstract Machines for Communication Security. |
CSFW |
1993 |
DBLP DOI BibTeX RDF |
|
1 | Jaisook Landauer, Timothy Redmond |
A Lattice of Information. |
CSFW |
1993 |
DBLP DOI BibTeX RDF |
|
1 | James W. Gray III |
On Analyzing the Bus-Contention Channel Under Fuzzy Time. |
CSFW |
1993 |
DBLP DOI BibTeX RDF |
|
1 | Jean-Pierre Banâtre, Ciarán Bryce |
Information Flow Control in a Parallel Language Framework. |
CSFW |
1993 |
DBLP DOI BibTeX RDF |
|
1 | Ravi S. Sandhu, Srinivas Ganta |
On Testing for Absence of Rights in Access Control Models. |
CSFW |
1993 |
DBLP DOI BibTeX RDF |
|
1 | Paul F. Syverson |
Panel: Cryptographic Protocol Models and Requirements. |
CSFW |
1993 |
DBLP BibTeX RDF |
|
1 | Frédéric Cuppens |
A Logical Formalization of Secrecy. |
CSFW |
1993 |
DBLP DOI BibTeX RDF |
|
1 | Marc Dacier |
A Petri Net Representation of the Take-Grant Model. |
CSFW |
1993 |
DBLP DOI BibTeX RDF |
|
1 | Sylvan Pinsky |
An Algebraic Approach to Non-Interference. |
CSFW |
1992 |
DBLP DOI BibTeX RDF |
|
1 | |
5th IEEE Computer Security Foundations Workshop - CSFW'92, Franconia, New Hampshire, USA, June 16-18, 1992, Proceedings |
CSFW |
1992 |
DBLP BibTeX RDF |
|
1 | Jan Verschuren, René Govaerts, Joos Vandewalle |
Realization of the Bell-LaPadula Security Policy in an OSI-Distributed System using Asymmetric and Symmetric Cryptographic Algorithms. |
CSFW |
1992 |
DBLP DOI BibTeX RDF |
|
1 | Thomas D. Garvey |
Inference Working Group Kickoff: The Inference Problem for Computer Security. |
CSFW |
1992 |
DBLP DOI BibTeX RDF |
|
1 | Catherine Meadows 0001 |
Panel: Fundamental Questions about Formal Methods. |
CSFW |
1992 |
DBLP BibTeX RDF |
|
1 | Paul Helman, Gunar E. Liepins, Wynette Richards |
Foundations of Intrusion Detection. |
CSFW |
1992 |
DBLP DOI BibTeX RDF |
|
1 | Sandra Rawlings Murphy, Stephen D. Crocker, Timothy Redmond |
Unwinding and the LOCK Proof Referees Study. |
CSFW |
1992 |
DBLP DOI BibTeX RDF |
|
Displaying result #201 - #300 of 394 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ >>] |
|