Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Jaisook Landauer, Timothy Redmond |
A Framework for Composition of Security Models. |
CSFW |
1992 |
DBLP DOI BibTeX RDF |
|
1 | Joshua D. Guttman |
Panel: Use of Formal Methods in the Analysis of Cryptographic Protocols. |
CSFW |
1992 |
DBLP BibTeX RDF |
|
1 | John Graham-Cumming |
Some Laws of Non-Interference. |
CSFW |
1992 |
DBLP DOI BibTeX RDF |
|
1 | Mary Ellen Zurko |
Attribute Support for Inter-Domain Use. |
CSFW |
1992 |
DBLP DOI BibTeX RDF |
|
1 | Pierre Bieber, Frédéric Cuppens |
Secure Dependencies with Dynamic Level Assignments. |
CSFW |
1992 |
DBLP DOI BibTeX RDF |
|
1 | Claudio Calvelli, Vijay Varadharajan |
An Analysis of some Delegation Protocols for Distributed Systems. |
CSFW |
1992 |
DBLP DOI BibTeX RDF |
|
1 | E. A. Campbell, Reihaneh Safavi-Naini, P. A. Pleasants |
Partial Belief and Probabilistic Reasoning in the Analysis of Secure Protocols. |
CSFW |
1992 |
DBLP DOI BibTeX RDF |
|
1 | Ira S. Moskowitz, Oliver Costich |
A classical Automata Approach to Noninterference Type Problems. |
CSFW |
1992 |
DBLP DOI BibTeX RDF |
|
1 | Miranda Mowbray |
Causal Security. |
CSFW |
1992 |
DBLP DOI BibTeX RDF |
|
1 | Bhavani Thuraisingham |
A Non-monotonic Typed Multilevel Logic for Multilevel Secure Data/Knowledge - II. |
CSFW |
1992 |
DBLP DOI BibTeX RDF |
|
1 | Paul Ammann, Richard J. Lipton, Ravi S. Sandhu |
The Expressive Power of Multi-Parent Creation in a Monotonic Access Control Model. |
CSFW |
1992 |
DBLP DOI BibTeX RDF |
|
1 | Colin O'Halloran |
On Requirements and Security in a CCIS. |
CSFW |
1992 |
DBLP DOI BibTeX RDF |
|
1 | Virgil D. Gligor, Rajashekar Kailar, Stuart G. Stubblebine, Li Gong |
Logics for Cryptographic Protocols - Virtues and Limitations. |
CSFW |
1991 |
DBLP DOI BibTeX RDF |
|
1 | |
4th IEEE Computer Security Foundations Workshop - CSFW'91, Franconia, New Hampshire, USA, June 18-20, 1991, Proceedings |
CSFW |
1991 |
DBLP BibTeX RDF |
|
1 | Thomas D. Garvey, Teresa F. Lunt, Mark E. Stickel |
Abductive and Approximate Reasoning Models for Characterizing Inference Channels. |
CSFW |
1991 |
DBLP DOI BibTeX RDF |
|
1 | Glenn H. MacEwen, Janice I. Glasgow |
A Proof of Secrecy for a Network Security Model. |
CSFW |
1991 |
DBLP DOI BibTeX RDF |
|
1 | John Graham-Cumming, Jeff W. Sanders |
On the Refinement of Non-Interference. |
CSFW |
1991 |
DBLP DOI BibTeX RDF |
|
1 | Oliver Costich, Ira S. Moskowitz |
Analysis of a Storage Channel in the Two-Phase Commit Protocol. |
CSFW |
1991 |
DBLP DOI BibTeX RDF |
|
1 | James W. Gray III |
On Information Flow Security Models. |
CSFW |
1991 |
DBLP DOI BibTeX RDF |
|
1 | E. John Sebes, Richard J. Feiertag |
Implicit Discretionary Access Propagation: A new Interpretation of DAC. |
CSFW |
1991 |
DBLP DOI BibTeX RDF |
|
1 | Pierre Bieber, Frédéric Cuppens |
A Definition of Secure Dependencies Using the Logic of Security. |
CSFW |
1991 |
DBLP DOI BibTeX RDF |
|
1 | Catherine Meadows 0001 |
The NRL Protocol Analysis Tool: A Position Paper. |
CSFW |
1991 |
DBLP DOI BibTeX RDF |
|
1 | Paul F. Syverson |
The Value of Semantics for the Analysis of Cryptographic Protocols. |
CSFW |
1991 |
DBLP DOI BibTeX RDF |
|
1 | Jeremy Jacob |
The Basic Integrity Theorem. |
CSFW |
1991 |
DBLP DOI BibTeX RDF |
|
1 | Teresa F. Lunt |
Polyinstantiation: An Inevitable Part of a Multilevel World. |
CSFW |
1991 |
DBLP DOI BibTeX RDF |
|
1 | Gilles Trouessin |
Quantitative Evaluation of Confidentiality by Entropy Calculation. |
CSFW |
1991 |
DBLP DOI BibTeX RDF |
|
1 | Simon N. Foley |
Separation of Duty using High Water Marks. |
CSFW |
1991 |
DBLP DOI BibTeX RDF |
|
1 | P. G. Allen |
A Comparison of non-Interference and Non-Deducibility using CSP. |
CSFW |
1991 |
DBLP DOI BibTeX RDF |
|
1 | Catherine Meadows 0001 |
Panel Discussion on the Polyinstantiation Problem: An Introduction. |
CSFW |
1991 |
DBLP BibTeX RDF |
|
1 | Rajashekar Kailar, Virgil D. Gligor |
On Belief Evolution in Authentication Protocols. |
CSFW |
1991 |
DBLP DOI BibTeX RDF |
|
1 | Sarbari Gupta, Virgil D. Gligor |
Towards a Theory of Penetration-Resistant Systems and its Applications. |
CSFW |
1991 |
DBLP DOI BibTeX RDF |
|
1 | Vijay Varadharajan |
Hook-Up Property of Information Flow Secure Nets. |
CSFW |
1991 |
DBLP DOI BibTeX RDF |
|
1 | Leonard J. LaPadula, James G. Williams 0002 |
Toward a Universal Integrity Model. |
CSFW |
1991 |
DBLP DOI BibTeX RDF |
|
1 | Dick O'Brien |
The LDV Approach to Polyinstantiation. |
CSFW |
1991 |
DBLP DOI BibTeX RDF |
|
1 | Li Gong |
Handling Infeasible Specifications fo Cryptographic Protocols. |
CSFW |
1991 |
DBLP DOI BibTeX RDF |
|
1 | Jonathan T. Trostle |
Multiple Trojan Horse Systems and Covert Channel Analysis. |
CSFW |
1991 |
DBLP DOI BibTeX RDF |
|
1 | Ravi S. Sandhu, Roshan K. Thomas, Sushil Jajodia |
A Secure Kernelized Architecture for Multiple Object-Oriented Databases. |
CSFW |
1991 |
DBLP DOI BibTeX RDF |
|
1 | Simon R. Wiseman |
The Conflict Between Confidentiality and Integrity. |
CSFW |
1991 |
DBLP DOI BibTeX RDF |
|
1 | Yacov Yacobi |
Complexity Theoretic Analysis of Crypto-Protcols - Overview. |
CSFW |
1991 |
DBLP DOI BibTeX RDF |
|
1 | John A. McDermid, Qi Shi 0001 |
A Formal Model of Security Dependency for Analysis and Testing of Secure Systems. |
CSFW |
1991 |
DBLP DOI BibTeX RDF |
|
1 | Sushil Jajodia |
Panel Discussion on the Polyinstantiation Problem: A Position Paper. |
CSFW |
1991 |
DBLP BibTeX RDF |
|
1 | P. M. Melliar-Smith, Louise E. Moser |
Protection against Covert Storage and Timing Channels. |
CSFW |
1991 |
DBLP DOI BibTeX RDF |
|
1 | Bhavani Thuraisingham |
A Nonmonotonic Typed Multilevel Logic for Multilevel Secure Database/Knowledge-Based Management Systems. |
CSFW |
1991 |
DBLP DOI BibTeX RDF |
|
1 | Jonathan K. Millen |
Hookup Security for Synchronous Machines. |
CSFW |
1990 |
DBLP DOI BibTeX RDF |
|
1 | Ravi S. Sandhu, Sushil Jajodia, Teresa F. Lunt |
A New Polyinstantiation Integrity Constraint for Multilevel Relations. |
CSFW |
1990 |
DBLP DOI BibTeX RDF |
|
1 | Pierre Bieber |
A Logic of Communication in Hostile Environments. |
CSFW |
1990 |
DBLP DOI BibTeX RDF |
|
1 | Leonard J. LaPadula |
Formal Modeling in a Generalized Framework for Access Control. |
CSFW |
1990 |
DBLP DOI BibTeX RDF |
|
1 | Paul F. Syverson |
Formal Semantics for Logics of Cryptographic Protocols. |
CSFW |
1990 |
DBLP DOI BibTeX RDF |
|
1 | Sushil Jajodia, Ravi S. Sandhu |
A Formal Framework for Single Level Decomposition of Multilevel Relations. |
CSFW |
1990 |
DBLP DOI BibTeX RDF |
|
1 | Janice I. Glasgow, Glenn H. MacEwen, Prakash Panangaden |
A Logic for Reasoning about Security. |
CSFW |
1990 |
DBLP DOI BibTeX RDF |
|
1 | David Rosenthal |
Security Models for Priority Buffering and Interrupt Handling. |
CSFW |
1990 |
DBLP DOI BibTeX RDF |
|
1 | Simon N. Foley |
Secure Information Flow Using Security Groups. |
CSFW |
1990 |
DBLP DOI BibTeX RDF |
|
1 | Lee Badger |
Providing a Flexible Security Override for Trusted Systems. |
CSFW |
1990 |
DBLP DOI BibTeX RDF |
|
1 | Catherine Meadows 0001 |
Representing Partial Knowledge in an Algebraic Security Model. |
CSFW |
1990 |
DBLP DOI BibTeX RDF |
|
1 | Ira S. Moskowitz |
Quotient States and Probabilistic Channels. |
CSFW |
1990 |
DBLP DOI BibTeX RDF |
|
1 | |
Third IEEE Computer Security Foundations Workshop - CSFW'90, Franconia, New Hampshire, USA, June 12-14, 1990, Proceedings |
CSFW |
1990 |
DBLP BibTeX RDF |
|
1 | Edward Amoroso |
A Policy Model for Denial of Service. |
CSFW |
1990 |
DBLP DOI BibTeX RDF |
|
1 | James W. Gray III |
Information Sharing in Secure Systems. |
CSFW |
1990 |
DBLP DOI BibTeX RDF |
|
1 | Vijay Varadharajan |
Petri Net Based Modelling of Information Flow Security Requirements. |
CSFW |
1990 |
DBLP DOI BibTeX RDF |
|
1 | Jingsha He, Virgil D. Gligor |
Information-Flow Analysis for Covert-Channel Identification in Multilevel Secure Operating Systems. |
CSFW |
1990 |
DBLP DOI BibTeX RDF |
|
1 | Jeremy Jacob |
Categorizing non-interference. |
CSFW |
1990 |
DBLP DOI BibTeX RDF |
|
1 | Leo Marcus, Telis Menas |
Safety via State Transition Language Plus Invariants. |
CSFW |
1989 |
DBLP DOI BibTeX RDF |
|
1 | Hai-Ping Ko |
Security Properties of Ring Brackets. |
CSFW |
1989 |
DBLP DOI BibTeX RDF |
|
1 | Todd Fine, J. Thomas Haigh, Richard C. O'Brien, Dana L. Toups |
Noninterference and the Unwinding for LOCK. |
CSFW |
1989 |
DBLP DOI BibTeX RDF |
|
1 | Jaisook Landauer, Timothy Redmond, Terry Benzel |
Formal Policies for Trusted Processes. |
CSFW |
1989 |
DBLP DOI BibTeX RDF |
|
1 | Dale M. Johnson, F. Javier Thayer |
Security Properties Consistent with the Testing Semantics for Communicating Processes. |
CSFW |
1989 |
DBLP DOI BibTeX RDF |
|
1 | R. Alan Whitehurst, Teresa F. Lunt |
The Sea View Verification. |
CSFW |
1989 |
DBLP DOI BibTeX RDF |
|
1 | Janice I. Glasgow, Glenn H. MacEwen |
Obligation as the Basis of Integrity Specification. |
CSFW |
1989 |
DBLP DOI BibTeX RDF |
|
1 | Ian Sutherland, Stanley Perlo, Rammohan Varadarajan |
Deducibility Security with Dynamic Level Assignment. |
CSFW |
1989 |
DBLP DOI BibTeX RDF |
|
1 | John C. Wray |
An Optimization for Information Flow Analysis. |
CSFW |
1989 |
DBLP DOI BibTeX RDF |
|
1 | David Rosenthal |
Implementing a Verification Methodology for McCullough Security. |
CSFW |
1989 |
DBLP DOI BibTeX RDF |
|
1 | Jonathan K. Millen |
Finite-State Noiseless Covert Channels. |
CSFW |
1989 |
DBLP DOI BibTeX RDF |
|
1 | Richard B. Neely, James W. Freeman, M. D. Krenzin |
Achieving Understandable Results in a Formal Design Verification. |
CSFW |
1989 |
DBLP DOI BibTeX RDF |
|
1 | J. Todd Wittbold |
Controlled Signalling Systems and Covert Channels. |
CSFW |
1989 |
DBLP DOI BibTeX RDF |
|
1 | Louise E. Moser |
A Logic of Knowledge and Belief for Reasoning about Computer Security. |
CSFW |
1989 |
DBLP DOI BibTeX RDF |
|
1 | |
Second IEEE Computer Security Foundations Workshop - CSFW'89, Franconia, New Hampshire, USA, June 11-14, 1989, Proceedings |
CSFW |
1989 |
DBLP BibTeX RDF |
|
1 | Maurice Herlihy, Jeannette M. Wing |
Specifying Security Constraints with Relaxation Lattices. |
CSFW |
1989 |
DBLP DOI BibTeX RDF |
|
1 | Ian Sutherland |
Relating Bell-LaPadula-Style Security Models to Information Models. |
CSFW |
1988 |
DBLP BibTeX RDF |
|
1 | Jeremy Jacob |
A Security Framework. |
CSFW |
1988 |
DBLP BibTeX RDF |
|
1 | David Rosenthal |
An Approach to Increasing the Automation of the Verification of Security. |
CSFW |
1988 |
DBLP BibTeX RDF |
|
1 | Daryl McCullough |
Covert Channels and Degrees of Insecurity. |
CSFW |
1988 |
DBLP BibTeX RDF |
|
1 | John McHugh |
A Formal Definition for Information Flow in the Gypsy Expression Language. |
CSFW |
1988 |
DBLP BibTeX RDF |
|
1 | Bret Hartman |
A General Approach to Tranquility in Information Flow Analysis. |
CSFW |
1988 |
DBLP BibTeX RDF |
|
1 | Benedetto L. DiVito |
Derived Information Sensitivity as a Modelling Technique. |
CSFW |
1988 |
DBLP BibTeX RDF |
|
1 | Teresa F. Lunt |
Access Control Policies: Some Unanswered Questions. |
CSFW |
1988 |
DBLP BibTeX RDF |
|
1 | Ravi S. Sandhu |
Expressive Power of the Schematic Protection Model. |
CSFW |
1988 |
DBLP BibTeX RDF |
|
1 | |
First IEEE Computer Security Foundations Workshop - CSFW'88, Franconia, New Hampshire, USA, June 12-15, 1988, Proceedings |
CSFW |
1988 |
DBLP BibTeX RDF |
|
1 | Joshua D. Guttman, Mark E. Nadel |
What Needs Securing. |
CSFW |
1988 |
DBLP BibTeX RDF |
|
1 | Janice I. Glasgow, Glenn H. MacEwen, Prakash Panangaden |
Reasoning about Knowledge and Permission in Secure Distributed Systems. |
CSFW |
1988 |
DBLP BibTeX RDF |
|
1 | Leo Marcus, Timothy Redmond |
A Model-Theoretic Approach to Specifying, Verifying and Hooking Up Security Policies. |
CSFW |
1988 |
DBLP BibTeX RDF |
|
1 | Will Harkness, Paul A. Pittelli |
Command Authorization as a Component of Information Integrity. |
CSFW |
1988 |
DBLP BibTeX RDF |
|
1 | D. G. Weber |
Quantitative Formal Security Analysis. |
CSFW |
1988 |
DBLP BibTeX RDF |
|
1 | Matt Bishop |
Theft of Information in the Take-Grant Protection Model. |
CSFW |
1988 |
DBLP BibTeX RDF |
|
1 | Dale M. Johnson, F. Javier Thayer |
Security and the Composition of Machines. |
CSFW |
1988 |
DBLP BibTeX RDF |
|