The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "CSFW"( http://dblp.L3S.de/Venues/CSFW )

URL (DBLP): http://dblp.uni-trier.de/db/conf/csfw

Publication years (Num. hits)
1988 (17) 1989 (16) 1990 (18) 1991 (31) 1992 (19) 1993 (16) 1994 (20) 1995 (17) 1996 (21) 1997 (20) 1998 (20) 1999 (20) 2000 (24) 2001 (23) 2002 (24) 2003 (18) 2004 (21) 2005 (23) 2006 (26)
Publication types (Num. hits)
inproceedings(375) proceedings(19)
Venues (Conferences, Journals, ...)
CSFW(394)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 262 occurrences of 150 keywords

Results
Found 394 publication records. Showing 394 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Jaisook Landauer, Timothy Redmond A Framework for Composition of Security Models. Search on Bibsonomy CSFW The full citation details ... 1992 DBLP  DOI  BibTeX  RDF
1Joshua D. Guttman Panel: Use of Formal Methods in the Analysis of Cryptographic Protocols. Search on Bibsonomy CSFW The full citation details ... 1992 DBLP  BibTeX  RDF
1John Graham-Cumming Some Laws of Non-Interference. Search on Bibsonomy CSFW The full citation details ... 1992 DBLP  DOI  BibTeX  RDF
1Mary Ellen Zurko Attribute Support for Inter-Domain Use. Search on Bibsonomy CSFW The full citation details ... 1992 DBLP  DOI  BibTeX  RDF
1Pierre Bieber, Frédéric Cuppens Secure Dependencies with Dynamic Level Assignments. Search on Bibsonomy CSFW The full citation details ... 1992 DBLP  DOI  BibTeX  RDF
1Claudio Calvelli, Vijay Varadharajan An Analysis of some Delegation Protocols for Distributed Systems. Search on Bibsonomy CSFW The full citation details ... 1992 DBLP  DOI  BibTeX  RDF
1E. A. Campbell, Reihaneh Safavi-Naini, P. A. Pleasants Partial Belief and Probabilistic Reasoning in the Analysis of Secure Protocols. Search on Bibsonomy CSFW The full citation details ... 1992 DBLP  DOI  BibTeX  RDF
1Ira S. Moskowitz, Oliver Costich A classical Automata Approach to Noninterference Type Problems. Search on Bibsonomy CSFW The full citation details ... 1992 DBLP  DOI  BibTeX  RDF
1Miranda Mowbray Causal Security. Search on Bibsonomy CSFW The full citation details ... 1992 DBLP  DOI  BibTeX  RDF
1Bhavani Thuraisingham A Non-monotonic Typed Multilevel Logic for Multilevel Secure Data/Knowledge - II. Search on Bibsonomy CSFW The full citation details ... 1992 DBLP  DOI  BibTeX  RDF
1Paul Ammann, Richard J. Lipton, Ravi S. Sandhu The Expressive Power of Multi-Parent Creation in a Monotonic Access Control Model. Search on Bibsonomy CSFW The full citation details ... 1992 DBLP  DOI  BibTeX  RDF
1Colin O'Halloran On Requirements and Security in a CCIS. Search on Bibsonomy CSFW The full citation details ... 1992 DBLP  DOI  BibTeX  RDF
1Virgil D. Gligor, Rajashekar Kailar, Stuart G. Stubblebine, Li Gong Logics for Cryptographic Protocols - Virtues and Limitations. Search on Bibsonomy CSFW The full citation details ... 1991 DBLP  DOI  BibTeX  RDF
1 4th IEEE Computer Security Foundations Workshop - CSFW'91, Franconia, New Hampshire, USA, June 18-20, 1991, Proceedings Search on Bibsonomy CSFW The full citation details ... 1991 DBLP  BibTeX  RDF
1Thomas D. Garvey, Teresa F. Lunt, Mark E. Stickel Abductive and Approximate Reasoning Models for Characterizing Inference Channels. Search on Bibsonomy CSFW The full citation details ... 1991 DBLP  DOI  BibTeX  RDF
1Glenn H. MacEwen, Janice I. Glasgow A Proof of Secrecy for a Network Security Model. Search on Bibsonomy CSFW The full citation details ... 1991 DBLP  DOI  BibTeX  RDF
1John Graham-Cumming, Jeff W. Sanders On the Refinement of Non-Interference. Search on Bibsonomy CSFW The full citation details ... 1991 DBLP  DOI  BibTeX  RDF
1Oliver Costich, Ira S. Moskowitz Analysis of a Storage Channel in the Two-Phase Commit Protocol. Search on Bibsonomy CSFW The full citation details ... 1991 DBLP  DOI  BibTeX  RDF
1James W. Gray III On Information Flow Security Models. Search on Bibsonomy CSFW The full citation details ... 1991 DBLP  DOI  BibTeX  RDF
1E. John Sebes, Richard J. Feiertag Implicit Discretionary Access Propagation: A new Interpretation of DAC. Search on Bibsonomy CSFW The full citation details ... 1991 DBLP  DOI  BibTeX  RDF
1Pierre Bieber, Frédéric Cuppens A Definition of Secure Dependencies Using the Logic of Security. Search on Bibsonomy CSFW The full citation details ... 1991 DBLP  DOI  BibTeX  RDF
1Catherine Meadows 0001 The NRL Protocol Analysis Tool: A Position Paper. Search on Bibsonomy CSFW The full citation details ... 1991 DBLP  DOI  BibTeX  RDF
1Paul F. Syverson The Value of Semantics for the Analysis of Cryptographic Protocols. Search on Bibsonomy CSFW The full citation details ... 1991 DBLP  DOI  BibTeX  RDF
1Jeremy Jacob The Basic Integrity Theorem. Search on Bibsonomy CSFW The full citation details ... 1991 DBLP  DOI  BibTeX  RDF
1Teresa F. Lunt Polyinstantiation: An Inevitable Part of a Multilevel World. Search on Bibsonomy CSFW The full citation details ... 1991 DBLP  DOI  BibTeX  RDF
1Gilles Trouessin Quantitative Evaluation of Confidentiality by Entropy Calculation. Search on Bibsonomy CSFW The full citation details ... 1991 DBLP  DOI  BibTeX  RDF
1Simon N. Foley Separation of Duty using High Water Marks. Search on Bibsonomy CSFW The full citation details ... 1991 DBLP  DOI  BibTeX  RDF
1P. G. Allen A Comparison of non-Interference and Non-Deducibility using CSP. Search on Bibsonomy CSFW The full citation details ... 1991 DBLP  DOI  BibTeX  RDF
1Catherine Meadows 0001 Panel Discussion on the Polyinstantiation Problem: An Introduction. Search on Bibsonomy CSFW The full citation details ... 1991 DBLP  BibTeX  RDF
1Rajashekar Kailar, Virgil D. Gligor On Belief Evolution in Authentication Protocols. Search on Bibsonomy CSFW The full citation details ... 1991 DBLP  DOI  BibTeX  RDF
1Sarbari Gupta, Virgil D. Gligor Towards a Theory of Penetration-Resistant Systems and its Applications. Search on Bibsonomy CSFW The full citation details ... 1991 DBLP  DOI  BibTeX  RDF
1Vijay Varadharajan Hook-Up Property of Information Flow Secure Nets. Search on Bibsonomy CSFW The full citation details ... 1991 DBLP  DOI  BibTeX  RDF
1Leonard J. LaPadula, James G. Williams 0002 Toward a Universal Integrity Model. Search on Bibsonomy CSFW The full citation details ... 1991 DBLP  DOI  BibTeX  RDF
1Dick O'Brien The LDV Approach to Polyinstantiation. Search on Bibsonomy CSFW The full citation details ... 1991 DBLP  DOI  BibTeX  RDF
1Li Gong Handling Infeasible Specifications fo Cryptographic Protocols. Search on Bibsonomy CSFW The full citation details ... 1991 DBLP  DOI  BibTeX  RDF
1Jonathan T. Trostle Multiple Trojan Horse Systems and Covert Channel Analysis. Search on Bibsonomy CSFW The full citation details ... 1991 DBLP  DOI  BibTeX  RDF
1Ravi S. Sandhu, Roshan K. Thomas, Sushil Jajodia A Secure Kernelized Architecture for Multiple Object-Oriented Databases. Search on Bibsonomy CSFW The full citation details ... 1991 DBLP  DOI  BibTeX  RDF
1Simon R. Wiseman The Conflict Between Confidentiality and Integrity. Search on Bibsonomy CSFW The full citation details ... 1991 DBLP  DOI  BibTeX  RDF
1Yacov Yacobi Complexity Theoretic Analysis of Crypto-Protcols - Overview. Search on Bibsonomy CSFW The full citation details ... 1991 DBLP  DOI  BibTeX  RDF
1John A. McDermid, Qi Shi 0001 A Formal Model of Security Dependency for Analysis and Testing of Secure Systems. Search on Bibsonomy CSFW The full citation details ... 1991 DBLP  DOI  BibTeX  RDF
1Sushil Jajodia Panel Discussion on the Polyinstantiation Problem: A Position Paper. Search on Bibsonomy CSFW The full citation details ... 1991 DBLP  BibTeX  RDF
1P. M. Melliar-Smith, Louise E. Moser Protection against Covert Storage and Timing Channels. Search on Bibsonomy CSFW The full citation details ... 1991 DBLP  DOI  BibTeX  RDF
1Bhavani Thuraisingham A Nonmonotonic Typed Multilevel Logic for Multilevel Secure Database/Knowledge-Based Management Systems. Search on Bibsonomy CSFW The full citation details ... 1991 DBLP  DOI  BibTeX  RDF
1Jonathan K. Millen Hookup Security for Synchronous Machines. Search on Bibsonomy CSFW The full citation details ... 1990 DBLP  DOI  BibTeX  RDF
1Ravi S. Sandhu, Sushil Jajodia, Teresa F. Lunt A New Polyinstantiation Integrity Constraint for Multilevel Relations. Search on Bibsonomy CSFW The full citation details ... 1990 DBLP  DOI  BibTeX  RDF
1Pierre Bieber A Logic of Communication in Hostile Environments. Search on Bibsonomy CSFW The full citation details ... 1990 DBLP  DOI  BibTeX  RDF
1Leonard J. LaPadula Formal Modeling in a Generalized Framework for Access Control. Search on Bibsonomy CSFW The full citation details ... 1990 DBLP  DOI  BibTeX  RDF
1Paul F. Syverson Formal Semantics for Logics of Cryptographic Protocols. Search on Bibsonomy CSFW The full citation details ... 1990 DBLP  DOI  BibTeX  RDF
1Sushil Jajodia, Ravi S. Sandhu A Formal Framework for Single Level Decomposition of Multilevel Relations. Search on Bibsonomy CSFW The full citation details ... 1990 DBLP  DOI  BibTeX  RDF
1Janice I. Glasgow, Glenn H. MacEwen, Prakash Panangaden A Logic for Reasoning about Security. Search on Bibsonomy CSFW The full citation details ... 1990 DBLP  DOI  BibTeX  RDF
1David Rosenthal Security Models for Priority Buffering and Interrupt Handling. Search on Bibsonomy CSFW The full citation details ... 1990 DBLP  DOI  BibTeX  RDF
1Simon N. Foley Secure Information Flow Using Security Groups. Search on Bibsonomy CSFW The full citation details ... 1990 DBLP  DOI  BibTeX  RDF
1Lee Badger Providing a Flexible Security Override for Trusted Systems. Search on Bibsonomy CSFW The full citation details ... 1990 DBLP  DOI  BibTeX  RDF
1Catherine Meadows 0001 Representing Partial Knowledge in an Algebraic Security Model. Search on Bibsonomy CSFW The full citation details ... 1990 DBLP  DOI  BibTeX  RDF
1Ira S. Moskowitz Quotient States and Probabilistic Channels. Search on Bibsonomy CSFW The full citation details ... 1990 DBLP  DOI  BibTeX  RDF
1 Third IEEE Computer Security Foundations Workshop - CSFW'90, Franconia, New Hampshire, USA, June 12-14, 1990, Proceedings Search on Bibsonomy CSFW The full citation details ... 1990 DBLP  BibTeX  RDF
1Edward Amoroso A Policy Model for Denial of Service. Search on Bibsonomy CSFW The full citation details ... 1990 DBLP  DOI  BibTeX  RDF
1James W. Gray III Information Sharing in Secure Systems. Search on Bibsonomy CSFW The full citation details ... 1990 DBLP  DOI  BibTeX  RDF
1Vijay Varadharajan Petri Net Based Modelling of Information Flow Security Requirements. Search on Bibsonomy CSFW The full citation details ... 1990 DBLP  DOI  BibTeX  RDF
1Jingsha He, Virgil D. Gligor Information-Flow Analysis for Covert-Channel Identification in Multilevel Secure Operating Systems. Search on Bibsonomy CSFW The full citation details ... 1990 DBLP  DOI  BibTeX  RDF
1Jeremy Jacob Categorizing non-interference. Search on Bibsonomy CSFW The full citation details ... 1990 DBLP  DOI  BibTeX  RDF
1Leo Marcus, Telis Menas Safety via State Transition Language Plus Invariants. Search on Bibsonomy CSFW The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
1Hai-Ping Ko Security Properties of Ring Brackets. Search on Bibsonomy CSFW The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
1Todd Fine, J. Thomas Haigh, Richard C. O'Brien, Dana L. Toups Noninterference and the Unwinding for LOCK. Search on Bibsonomy CSFW The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
1Jaisook Landauer, Timothy Redmond, Terry Benzel Formal Policies for Trusted Processes. Search on Bibsonomy CSFW The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
1Dale M. Johnson, F. Javier Thayer Security Properties Consistent with the Testing Semantics for Communicating Processes. Search on Bibsonomy CSFW The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
1R. Alan Whitehurst, Teresa F. Lunt The Sea View Verification. Search on Bibsonomy CSFW The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
1Janice I. Glasgow, Glenn H. MacEwen Obligation as the Basis of Integrity Specification. Search on Bibsonomy CSFW The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
1Ian Sutherland, Stanley Perlo, Rammohan Varadarajan Deducibility Security with Dynamic Level Assignment. Search on Bibsonomy CSFW The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
1John C. Wray An Optimization for Information Flow Analysis. Search on Bibsonomy CSFW The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
1David Rosenthal Implementing a Verification Methodology for McCullough Security. Search on Bibsonomy CSFW The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
1Jonathan K. Millen Finite-State Noiseless Covert Channels. Search on Bibsonomy CSFW The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
1Richard B. Neely, James W. Freeman, M. D. Krenzin Achieving Understandable Results in a Formal Design Verification. Search on Bibsonomy CSFW The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
1J. Todd Wittbold Controlled Signalling Systems and Covert Channels. Search on Bibsonomy CSFW The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
1Louise E. Moser A Logic of Knowledge and Belief for Reasoning about Computer Security. Search on Bibsonomy CSFW The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
1 Second IEEE Computer Security Foundations Workshop - CSFW'89, Franconia, New Hampshire, USA, June 11-14, 1989, Proceedings Search on Bibsonomy CSFW The full citation details ... 1989 DBLP  BibTeX  RDF
1Maurice Herlihy, Jeannette M. Wing Specifying Security Constraints with Relaxation Lattices. Search on Bibsonomy CSFW The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
1Ian Sutherland Relating Bell-LaPadula-Style Security Models to Information Models. Search on Bibsonomy CSFW The full citation details ... 1988 DBLP  BibTeX  RDF
1Jeremy Jacob A Security Framework. Search on Bibsonomy CSFW The full citation details ... 1988 DBLP  BibTeX  RDF
1David Rosenthal An Approach to Increasing the Automation of the Verification of Security. Search on Bibsonomy CSFW The full citation details ... 1988 DBLP  BibTeX  RDF
1Daryl McCullough Covert Channels and Degrees of Insecurity. Search on Bibsonomy CSFW The full citation details ... 1988 DBLP  BibTeX  RDF
1John McHugh A Formal Definition for Information Flow in the Gypsy Expression Language. Search on Bibsonomy CSFW The full citation details ... 1988 DBLP  BibTeX  RDF
1Bret Hartman A General Approach to Tranquility in Information Flow Analysis. Search on Bibsonomy CSFW The full citation details ... 1988 DBLP  BibTeX  RDF
1Benedetto L. DiVito Derived Information Sensitivity as a Modelling Technique. Search on Bibsonomy CSFW The full citation details ... 1988 DBLP  BibTeX  RDF
1Teresa F. Lunt Access Control Policies: Some Unanswered Questions. Search on Bibsonomy CSFW The full citation details ... 1988 DBLP  BibTeX  RDF
1Ravi S. Sandhu Expressive Power of the Schematic Protection Model. Search on Bibsonomy CSFW The full citation details ... 1988 DBLP  BibTeX  RDF
1 First IEEE Computer Security Foundations Workshop - CSFW'88, Franconia, New Hampshire, USA, June 12-15, 1988, Proceedings Search on Bibsonomy CSFW The full citation details ... 1988 DBLP  BibTeX  RDF
1Joshua D. Guttman, Mark E. Nadel What Needs Securing. Search on Bibsonomy CSFW The full citation details ... 1988 DBLP  BibTeX  RDF
1Janice I. Glasgow, Glenn H. MacEwen, Prakash Panangaden Reasoning about Knowledge and Permission in Secure Distributed Systems. Search on Bibsonomy CSFW The full citation details ... 1988 DBLP  BibTeX  RDF
1Leo Marcus, Timothy Redmond A Model-Theoretic Approach to Specifying, Verifying and Hooking Up Security Policies. Search on Bibsonomy CSFW The full citation details ... 1988 DBLP  BibTeX  RDF
1Will Harkness, Paul A. Pittelli Command Authorization as a Component of Information Integrity. Search on Bibsonomy CSFW The full citation details ... 1988 DBLP  BibTeX  RDF
1D. G. Weber Quantitative Formal Security Analysis. Search on Bibsonomy CSFW The full citation details ... 1988 DBLP  BibTeX  RDF
1Matt Bishop Theft of Information in the Take-Grant Protection Model. Search on Bibsonomy CSFW The full citation details ... 1988 DBLP  BibTeX  RDF
1Dale M. Johnson, F. Javier Thayer Security and the Composition of Machines. Search on Bibsonomy CSFW The full citation details ... 1988 DBLP  BibTeX  RDF
Displaying result #301 - #394 of 394 (100 per page; Change: )
Pages: [<<][1][2][3][4]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license