Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Jaisook Landauer, Timothy Redmond |
A Framework for Composition of Security Models. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSFW ![In: 5th IEEE Computer Security Foundations Workshop - CSFW'92, Franconia, New Hampshire, USA, June 16-18, 1992, Proceedings, pp. 157-166, 1992, IEEE Computer Society, 0-8186-2850-2. The full citation details ...](Pics/full.jpeg) |
1992 |
DBLP DOI BibTeX RDF |
|
1 | Joshua D. Guttman |
Panel: Use of Formal Methods in the Analysis of Cryptographic Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSFW ![In: 5th IEEE Computer Security Foundations Workshop - CSFW'92, Franconia, New Hampshire, USA, June 16-18, 1992, Proceedings, pp. 112, 1992, IEEE Computer Society, 0-8186-2850-2. The full citation details ...](Pics/full.jpeg) |
1992 |
DBLP BibTeX RDF |
|
1 | John Graham-Cumming |
Some Laws of Non-Interference. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSFW ![In: 5th IEEE Computer Security Foundations Workshop - CSFW'92, Franconia, New Hampshire, USA, June 16-18, 1992, Proceedings, pp. 22-33, 1992, IEEE Computer Society, 0-8186-2850-2. The full citation details ...](Pics/full.jpeg) |
1992 |
DBLP DOI BibTeX RDF |
|
1 | Mary Ellen Zurko |
Attribute Support for Inter-Domain Use. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSFW ![In: 5th IEEE Computer Security Foundations Workshop - CSFW'92, Franconia, New Hampshire, USA, June 16-18, 1992, Proceedings, pp. 179-188, 1992, IEEE Computer Society, 0-8186-2850-2. The full citation details ...](Pics/full.jpeg) |
1992 |
DBLP DOI BibTeX RDF |
|
1 | Pierre Bieber, Frédéric Cuppens |
Secure Dependencies with Dynamic Level Assignments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSFW ![In: 5th IEEE Computer Security Foundations Workshop - CSFW'92, Franconia, New Hampshire, USA, June 16-18, 1992, Proceedings, pp. 63-75, 1992, IEEE Computer Society, 0-8186-2850-2. The full citation details ...](Pics/full.jpeg) |
1992 |
DBLP DOI BibTeX RDF |
|
1 | Claudio Calvelli, Vijay Varadharajan |
An Analysis of some Delegation Protocols for Distributed Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSFW ![In: 5th IEEE Computer Security Foundations Workshop - CSFW'92, Franconia, New Hampshire, USA, June 16-18, 1992, Proceedings, pp. 92-110, 1992, IEEE Computer Society, 0-8186-2850-2. The full citation details ...](Pics/full.jpeg) |
1992 |
DBLP DOI BibTeX RDF |
|
1 | E. A. Campbell, Reihaneh Safavi-Naini, P. A. Pleasants |
Partial Belief and Probabilistic Reasoning in the Analysis of Secure Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSFW ![In: 5th IEEE Computer Security Foundations Workshop - CSFW'92, Franconia, New Hampshire, USA, June 16-18, 1992, Proceedings, pp. 84-91, 1992, IEEE Computer Society, 0-8186-2850-2. The full citation details ...](Pics/full.jpeg) |
1992 |
DBLP DOI BibTeX RDF |
|
1 | Ira S. Moskowitz, Oliver Costich |
A classical Automata Approach to Noninterference Type Problems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSFW ![In: 5th IEEE Computer Security Foundations Workshop - CSFW'92, Franconia, New Hampshire, USA, June 16-18, 1992, Proceedings, pp. 2-8, 1992, IEEE Computer Society, 0-8186-2850-2. The full citation details ...](Pics/full.jpeg) |
1992 |
DBLP DOI BibTeX RDF |
|
1 | Miranda Mowbray |
Causal Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSFW ![In: 5th IEEE Computer Security Foundations Workshop - CSFW'92, Franconia, New Hampshire, USA, June 16-18, 1992, Proceedings, pp. 54-62, 1992, IEEE Computer Society, 0-8186-2850-2. The full citation details ...](Pics/full.jpeg) |
1992 |
DBLP DOI BibTeX RDF |
|
1 | Bhavani Thuraisingham |
A Non-monotonic Typed Multilevel Logic for Multilevel Secure Data/Knowledge - II. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSFW ![In: 5th IEEE Computer Security Foundations Workshop - CSFW'92, Franconia, New Hampshire, USA, June 16-18, 1992, Proceedings, pp. 135-146, 1992, IEEE Computer Society, 0-8186-2850-2. The full citation details ...](Pics/full.jpeg) |
1992 |
DBLP DOI BibTeX RDF |
|
1 | Paul Ammann, Richard J. Lipton, Ravi S. Sandhu |
The Expressive Power of Multi-Parent Creation in a Monotonic Access Control Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSFW ![In: 5th IEEE Computer Security Foundations Workshop - CSFW'92, Franconia, New Hampshire, USA, June 16-18, 1992, Proceedings, pp. 148-156, 1992, IEEE Computer Society, 0-8186-2850-2. The full citation details ...](Pics/full.jpeg) |
1992 |
DBLP DOI BibTeX RDF |
|
1 | Colin O'Halloran |
On Requirements and Security in a CCIS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSFW ![In: 5th IEEE Computer Security Foundations Workshop - CSFW'92, Franconia, New Hampshire, USA, June 16-18, 1992, Proceedings, pp. 121-134, 1992, IEEE Computer Society, 0-8186-2850-2. The full citation details ...](Pics/full.jpeg) |
1992 |
DBLP DOI BibTeX RDF |
|
1 | Virgil D. Gligor, Rajashekar Kailar, Stuart G. Stubblebine, Li Gong |
Logics for Cryptographic Protocols - Virtues and Limitations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSFW ![In: 4th IEEE Computer Security Foundations Workshop - CSFW'91, Franconia, New Hampshire, USA, June 18-20, 1991, Proceedings, pp. 219-226, 1991, IEEE Computer Society, 0-8186-2215-6. The full citation details ...](Pics/full.jpeg) |
1991 |
DBLP DOI BibTeX RDF |
|
1 | |
4th IEEE Computer Security Foundations Workshop - CSFW'91, Franconia, New Hampshire, USA, June 18-20, 1991, Proceedings ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSFW ![IEEE Computer Society, 0-8186-2215-6 The full citation details ...](Pics/full.jpeg) |
1991 |
DBLP BibTeX RDF |
|
1 | Thomas D. Garvey, Teresa F. Lunt, Mark E. Stickel |
Abductive and Approximate Reasoning Models for Characterizing Inference Channels. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSFW ![In: 4th IEEE Computer Security Foundations Workshop - CSFW'91, Franconia, New Hampshire, USA, June 18-20, 1991, Proceedings, pp. 118-126, 1991, IEEE Computer Society, 0-8186-2215-6. The full citation details ...](Pics/full.jpeg) |
1991 |
DBLP DOI BibTeX RDF |
|
1 | Glenn H. MacEwen, Janice I. Glasgow |
A Proof of Secrecy for a Network Security Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSFW ![In: 4th IEEE Computer Security Foundations Workshop - CSFW'91, Franconia, New Hampshire, USA, June 18-20, 1991, Proceedings, pp. 176-181, 1991, IEEE Computer Society, 0-8186-2215-6. The full citation details ...](Pics/full.jpeg) |
1991 |
DBLP DOI BibTeX RDF |
|
1 | John Graham-Cumming, Jeff W. Sanders |
On the Refinement of Non-Interference. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSFW ![In: 4th IEEE Computer Security Foundations Workshop - CSFW'91, Franconia, New Hampshire, USA, June 18-20, 1991, Proceedings, pp. 35-42, 1991, IEEE Computer Society, 0-8186-2215-6. The full citation details ...](Pics/full.jpeg) |
1991 |
DBLP DOI BibTeX RDF |
|
1 | Oliver Costich, Ira S. Moskowitz |
Analysis of a Storage Channel in the Two-Phase Commit Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSFW ![In: 4th IEEE Computer Security Foundations Workshop - CSFW'91, Franconia, New Hampshire, USA, June 18-20, 1991, Proceedings, pp. 201-208, 1991, IEEE Computer Society, 0-8186-2215-6. The full citation details ...](Pics/full.jpeg) |
1991 |
DBLP DOI BibTeX RDF |
|
1 | James W. Gray III |
On Information Flow Security Models. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSFW ![In: 4th IEEE Computer Security Foundations Workshop - CSFW'91, Franconia, New Hampshire, USA, June 18-20, 1991, Proceedings, pp. 55-60, 1991, IEEE Computer Society, 0-8186-2215-6. The full citation details ...](Pics/full.jpeg) |
1991 |
DBLP DOI BibTeX RDF |
|
1 | E. John Sebes, Richard J. Feiertag |
Implicit Discretionary Access Propagation: A new Interpretation of DAC. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSFW ![In: 4th IEEE Computer Security Foundations Workshop - CSFW'91, Franconia, New Hampshire, USA, June 18-20, 1991, Proceedings, pp. 183-187, 1991, IEEE Computer Society, 0-8186-2215-6. The full citation details ...](Pics/full.jpeg) |
1991 |
DBLP DOI BibTeX RDF |
|
1 | Pierre Bieber, Frédéric Cuppens |
A Definition of Secure Dependencies Using the Logic of Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSFW ![In: 4th IEEE Computer Security Foundations Workshop - CSFW'91, Franconia, New Hampshire, USA, June 18-20, 1991, Proceedings, pp. 2-11, 1991, IEEE Computer Society, 0-8186-2215-6. The full citation details ...](Pics/full.jpeg) |
1991 |
DBLP DOI BibTeX RDF |
|
1 | Catherine Meadows 0001 |
The NRL Protocol Analysis Tool: A Position Paper. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSFW ![In: 4th IEEE Computer Security Foundations Workshop - CSFW'91, Franconia, New Hampshire, USA, June 18-20, 1991, Proceedings, pp. 227, 1991, IEEE Computer Society, 0-8186-2215-6. The full citation details ...](Pics/full.jpeg) |
1991 |
DBLP DOI BibTeX RDF |
|
1 | Paul F. Syverson |
The Value of Semantics for the Analysis of Cryptographic Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSFW ![In: 4th IEEE Computer Security Foundations Workshop - CSFW'91, Franconia, New Hampshire, USA, June 18-20, 1991, Proceedings, pp. 228-229, 1991, IEEE Computer Society, 0-8186-2215-6. The full citation details ...](Pics/full.jpeg) |
1991 |
DBLP DOI BibTeX RDF |
|
1 | Jeremy Jacob |
The Basic Integrity Theorem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSFW ![In: 4th IEEE Computer Security Foundations Workshop - CSFW'91, Franconia, New Hampshire, USA, June 18-20, 1991, Proceedings, pp. 89-97, 1991, IEEE Computer Society, 0-8186-2215-6. The full citation details ...](Pics/full.jpeg) |
1991 |
DBLP DOI BibTeX RDF |
|
1 | Teresa F. Lunt |
Polyinstantiation: An Inevitable Part of a Multilevel World. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSFW ![In: 4th IEEE Computer Security Foundations Workshop - CSFW'91, Franconia, New Hampshire, USA, June 18-20, 1991, Proceedings, pp. 236-238, 1991, IEEE Computer Society, 0-8186-2215-6. The full citation details ...](Pics/full.jpeg) |
1991 |
DBLP DOI BibTeX RDF |
|
1 | Gilles Trouessin |
Quantitative Evaluation of Confidentiality by Entropy Calculation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSFW ![In: 4th IEEE Computer Security Foundations Workshop - CSFW'91, Franconia, New Hampshire, USA, June 18-20, 1991, Proceedings, pp. 12-21, 1991, IEEE Computer Society, 0-8186-2215-6. The full citation details ...](Pics/full.jpeg) |
1991 |
DBLP DOI BibTeX RDF |
|
1 | Simon N. Foley |
Separation of Duty using High Water Marks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSFW ![In: 4th IEEE Computer Security Foundations Workshop - CSFW'91, Franconia, New Hampshire, USA, June 18-20, 1991, Proceedings, pp. 79-88, 1991, IEEE Computer Society, 0-8186-2215-6. The full citation details ...](Pics/full.jpeg) |
1991 |
DBLP DOI BibTeX RDF |
|
1 | P. G. Allen |
A Comparison of non-Interference and Non-Deducibility using CSP. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSFW ![In: 4th IEEE Computer Security Foundations Workshop - CSFW'91, Franconia, New Hampshire, USA, June 18-20, 1991, Proceedings, pp. 43-54, 1991, IEEE Computer Society, 0-8186-2215-6. The full citation details ...](Pics/full.jpeg) |
1991 |
DBLP DOI BibTeX RDF |
|
1 | Catherine Meadows 0001 |
Panel Discussion on the Polyinstantiation Problem: An Introduction. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSFW ![In: 4th IEEE Computer Security Foundations Workshop - CSFW'91, Franconia, New Hampshire, USA, June 18-20, 1991, Proceedings, pp. 234, 1991, IEEE Computer Society, 0-8186-2215-6. The full citation details ...](Pics/full.jpeg) |
1991 |
DBLP BibTeX RDF |
|
1 | Rajashekar Kailar, Virgil D. Gligor |
On Belief Evolution in Authentication Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSFW ![In: 4th IEEE Computer Security Foundations Workshop - CSFW'91, Franconia, New Hampshire, USA, June 18-20, 1991, Proceedings, pp. 103-116, 1991, IEEE Computer Society, 0-8186-2215-6. The full citation details ...](Pics/full.jpeg) |
1991 |
DBLP DOI BibTeX RDF |
|
1 | Sarbari Gupta, Virgil D. Gligor |
Towards a Theory of Penetration-Resistant Systems and its Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSFW ![In: 4th IEEE Computer Security Foundations Workshop - CSFW'91, Franconia, New Hampshire, USA, June 18-20, 1991, Proceedings, pp. 62-78, 1991, IEEE Computer Society, 0-8186-2215-6. The full citation details ...](Pics/full.jpeg) |
1991 |
DBLP DOI BibTeX RDF |
|
1 | Vijay Varadharajan |
Hook-Up Property of Information Flow Secure Nets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSFW ![In: 4th IEEE Computer Security Foundations Workshop - CSFW'91, Franconia, New Hampshire, USA, June 18-20, 1991, Proceedings, pp. 154-175, 1991, IEEE Computer Society, 0-8186-2215-6. The full citation details ...](Pics/full.jpeg) |
1991 |
DBLP DOI BibTeX RDF |
|
1 | Leonard J. LaPadula, James G. Williams 0002 |
Toward a Universal Integrity Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSFW ![In: 4th IEEE Computer Security Foundations Workshop - CSFW'91, Franconia, New Hampshire, USA, June 18-20, 1991, Proceedings, pp. 216-218, 1991, IEEE Computer Society, 0-8186-2215-6. The full citation details ...](Pics/full.jpeg) |
1991 |
DBLP DOI BibTeX RDF |
|
1 | Dick O'Brien |
The LDV Approach to Polyinstantiation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSFW ![In: 4th IEEE Computer Security Foundations Workshop - CSFW'91, Franconia, New Hampshire, USA, June 18-20, 1991, Proceedings, pp. 239-240, 1991, IEEE Computer Society, 0-8186-2215-6. The full citation details ...](Pics/full.jpeg) |
1991 |
DBLP DOI BibTeX RDF |
|
1 | Li Gong |
Handling Infeasible Specifications fo Cryptographic Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSFW ![In: 4th IEEE Computer Security Foundations Workshop - CSFW'91, Franconia, New Hampshire, USA, June 18-20, 1991, Proceedings, pp. 99-102, 1991, IEEE Computer Society, 0-8186-2215-6. The full citation details ...](Pics/full.jpeg) |
1991 |
DBLP DOI BibTeX RDF |
|
1 | Jonathan T. Trostle |
Multiple Trojan Horse Systems and Covert Channel Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSFW ![In: 4th IEEE Computer Security Foundations Workshop - CSFW'91, Franconia, New Hampshire, USA, June 18-20, 1991, Proceedings, pp. 22-33, 1991, IEEE Computer Society, 0-8186-2215-6. The full citation details ...](Pics/full.jpeg) |
1991 |
DBLP DOI BibTeX RDF |
|
1 | Ravi S. Sandhu, Roshan K. Thomas, Sushil Jajodia |
A Secure Kernelized Architecture for Multiple Object-Oriented Databases. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSFW ![In: 4th IEEE Computer Security Foundations Workshop - CSFW'91, Franconia, New Hampshire, USA, June 18-20, 1991, Proceedings, pp. 139-152, 1991, IEEE Computer Society, 0-8186-2215-6. The full citation details ...](Pics/full.jpeg) |
1991 |
DBLP DOI BibTeX RDF |
|
1 | Simon R. Wiseman |
The Conflict Between Confidentiality and Integrity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSFW ![In: 4th IEEE Computer Security Foundations Workshop - CSFW'91, Franconia, New Hampshire, USA, June 18-20, 1991, Proceedings, pp. 241-242, 1991, IEEE Computer Society, 0-8186-2215-6. The full citation details ...](Pics/full.jpeg) |
1991 |
DBLP DOI BibTeX RDF |
|
1 | Yacov Yacobi |
Complexity Theoretic Analysis of Crypto-Protcols - Overview. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSFW ![In: 4th IEEE Computer Security Foundations Workshop - CSFW'91, Franconia, New Hampshire, USA, June 18-20, 1991, Proceedings, pp. 230-233, 1991, IEEE Computer Society, 0-8186-2215-6. The full citation details ...](Pics/full.jpeg) |
1991 |
DBLP DOI BibTeX RDF |
|
1 | John A. McDermid, Qi Shi 0001 |
A Formal Model of Security Dependency for Analysis and Testing of Secure Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSFW ![In: 4th IEEE Computer Security Foundations Workshop - CSFW'91, Franconia, New Hampshire, USA, June 18-20, 1991, Proceedings, pp. 188-200, 1991, IEEE Computer Society, 0-8186-2215-6. The full citation details ...](Pics/full.jpeg) |
1991 |
DBLP DOI BibTeX RDF |
|
1 | Sushil Jajodia |
Panel Discussion on the Polyinstantiation Problem: A Position Paper. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSFW ![In: 4th IEEE Computer Security Foundations Workshop - CSFW'91, Franconia, New Hampshire, USA, June 18-20, 1991, Proceedings, pp. 235, 1991, IEEE Computer Society, 0-8186-2215-6. The full citation details ...](Pics/full.jpeg) |
1991 |
DBLP BibTeX RDF |
|
1 | P. M. Melliar-Smith, Louise E. Moser |
Protection against Covert Storage and Timing Channels. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSFW ![In: 4th IEEE Computer Security Foundations Workshop - CSFW'91, Franconia, New Hampshire, USA, June 18-20, 1991, Proceedings, pp. 209-214, 1991, IEEE Computer Society, 0-8186-2215-6. The full citation details ...](Pics/full.jpeg) |
1991 |
DBLP DOI BibTeX RDF |
|
1 | Bhavani Thuraisingham |
A Nonmonotonic Typed Multilevel Logic for Multilevel Secure Database/Knowledge-Based Management Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSFW ![In: 4th IEEE Computer Security Foundations Workshop - CSFW'91, Franconia, New Hampshire, USA, June 18-20, 1991, Proceedings, pp. 127-138, 1991, IEEE Computer Society, 0-8186-2215-6. The full citation details ...](Pics/full.jpeg) |
1991 |
DBLP DOI BibTeX RDF |
|
1 | Jonathan K. Millen |
Hookup Security for Synchronous Machines. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSFW ![In: Third IEEE Computer Security Foundations Workshop - CSFW'90, Franconia, New Hampshire, USA, June 12-14, 1990, Proceedings, pp. 84-90, 1990, IEEE Computer Society, 0-8186-2071-4. The full citation details ...](Pics/full.jpeg) |
1990 |
DBLP DOI BibTeX RDF |
|
1 | Ravi S. Sandhu, Sushil Jajodia, Teresa F. Lunt |
A New Polyinstantiation Integrity Constraint for Multilevel Relations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSFW ![In: Third IEEE Computer Security Foundations Workshop - CSFW'90, Franconia, New Hampshire, USA, June 12-14, 1990, Proceedings, pp. 159-165, 1990, IEEE Computer Society, 0-8186-2071-4. The full citation details ...](Pics/full.jpeg) |
1990 |
DBLP DOI BibTeX RDF |
|
1 | Pierre Bieber |
A Logic of Communication in Hostile Environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSFW ![In: Third IEEE Computer Security Foundations Workshop - CSFW'90, Franconia, New Hampshire, USA, June 12-14, 1990, Proceedings, pp. 14-22, 1990, IEEE Computer Society, 0-8186-2071-4. The full citation details ...](Pics/full.jpeg) |
1990 |
DBLP DOI BibTeX RDF |
|
1 | Leonard J. LaPadula |
Formal Modeling in a Generalized Framework for Access Control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSFW ![In: Third IEEE Computer Security Foundations Workshop - CSFW'90, Franconia, New Hampshire, USA, June 12-14, 1990, Proceedings, pp. 100-109, 1990, IEEE Computer Society, 0-8186-2071-4. The full citation details ...](Pics/full.jpeg) |
1990 |
DBLP DOI BibTeX RDF |
|
1 | Paul F. Syverson |
Formal Semantics for Logics of Cryptographic Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSFW ![In: Third IEEE Computer Security Foundations Workshop - CSFW'90, Franconia, New Hampshire, USA, June 12-14, 1990, Proceedings, pp. 32-41, 1990, IEEE Computer Society, 0-8186-2071-4. The full citation details ...](Pics/full.jpeg) |
1990 |
DBLP DOI BibTeX RDF |
|
1 | Sushil Jajodia, Ravi S. Sandhu |
A Formal Framework for Single Level Decomposition of Multilevel Relations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSFW ![In: Third IEEE Computer Security Foundations Workshop - CSFW'90, Franconia, New Hampshire, USA, June 12-14, 1990, Proceedings, pp. 152-158, 1990, IEEE Computer Society, 0-8186-2071-4. The full citation details ...](Pics/full.jpeg) |
1990 |
DBLP DOI BibTeX RDF |
|
1 | Janice I. Glasgow, Glenn H. MacEwen, Prakash Panangaden |
A Logic for Reasoning about Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSFW ![In: Third IEEE Computer Security Foundations Workshop - CSFW'90, Franconia, New Hampshire, USA, June 12-14, 1990, Proceedings, pp. 2-13, 1990, IEEE Computer Society, 0-8186-2071-4. The full citation details ...](Pics/full.jpeg) |
1990 |
DBLP DOI BibTeX RDF |
|
1 | David Rosenthal |
Security Models for Priority Buffering and Interrupt Handling. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSFW ![In: Third IEEE Computer Security Foundations Workshop - CSFW'90, Franconia, New Hampshire, USA, June 12-14, 1990, Proceedings, pp. 91-97, 1990, IEEE Computer Society, 0-8186-2071-4. The full citation details ...](Pics/full.jpeg) |
1990 |
DBLP DOI BibTeX RDF |
|
1 | Simon N. Foley |
Secure Information Flow Using Security Groups. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSFW ![In: Third IEEE Computer Security Foundations Workshop - CSFW'90, Franconia, New Hampshire, USA, June 12-14, 1990, Proceedings, pp. 62-72, 1990, IEEE Computer Society, 0-8186-2071-4. The full citation details ...](Pics/full.jpeg) |
1990 |
DBLP DOI BibTeX RDF |
|
1 | Lee Badger |
Providing a Flexible Security Override for Trusted Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSFW ![In: Third IEEE Computer Security Foundations Workshop - CSFW'90, Franconia, New Hampshire, USA, June 12-14, 1990, Proceedings, pp. 115-121, 1990, IEEE Computer Society, 0-8186-2071-4. The full citation details ...](Pics/full.jpeg) |
1990 |
DBLP DOI BibTeX RDF |
|
1 | Catherine Meadows 0001 |
Representing Partial Knowledge in an Algebraic Security Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSFW ![In: Third IEEE Computer Security Foundations Workshop - CSFW'90, Franconia, New Hampshire, USA, June 12-14, 1990, Proceedings, pp. 23-31, 1990, IEEE Computer Society, 0-8186-2071-4. The full citation details ...](Pics/full.jpeg) |
1990 |
DBLP DOI BibTeX RDF |
|
1 | Ira S. Moskowitz |
Quotient States and Probabilistic Channels. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSFW ![In: Third IEEE Computer Security Foundations Workshop - CSFW'90, Franconia, New Hampshire, USA, June 12-14, 1990, Proceedings, pp. 74-83, 1990, IEEE Computer Society, 0-8186-2071-4. The full citation details ...](Pics/full.jpeg) |
1990 |
DBLP DOI BibTeX RDF |
|
1 | |
Third IEEE Computer Security Foundations Workshop - CSFW'90, Franconia, New Hampshire, USA, June 12-14, 1990, Proceedings ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSFW ![IEEE Computer Society, 0-8186-2071-4 The full citation details ...](Pics/full.jpeg) |
1990 |
DBLP BibTeX RDF |
|
1 | Edward Amoroso |
A Policy Model for Denial of Service. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSFW ![In: Third IEEE Computer Security Foundations Workshop - CSFW'90, Franconia, New Hampshire, USA, June 12-14, 1990, Proceedings, pp. 110-114, 1990, IEEE Computer Society, 0-8186-2071-4. The full citation details ...](Pics/full.jpeg) |
1990 |
DBLP DOI BibTeX RDF |
|
1 | James W. Gray III |
Information Sharing in Secure Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSFW ![In: Third IEEE Computer Security Foundations Workshop - CSFW'90, Franconia, New Hampshire, USA, June 12-14, 1990, Proceedings, pp. 128-138, 1990, IEEE Computer Society, 0-8186-2071-4. The full citation details ...](Pics/full.jpeg) |
1990 |
DBLP DOI BibTeX RDF |
|
1 | Vijay Varadharajan |
Petri Net Based Modelling of Information Flow Security Requirements. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSFW ![In: Third IEEE Computer Security Foundations Workshop - CSFW'90, Franconia, New Hampshire, USA, June 12-14, 1990, Proceedings, pp. 51-61, 1990, IEEE Computer Society, 0-8186-2071-4. The full citation details ...](Pics/full.jpeg) |
1990 |
DBLP DOI BibTeX RDF |
|
1 | Jingsha He, Virgil D. Gligor |
Information-Flow Analysis for Covert-Channel Identification in Multilevel Secure Operating Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSFW ![In: Third IEEE Computer Security Foundations Workshop - CSFW'90, Franconia, New Hampshire, USA, June 12-14, 1990, Proceedings, pp. 139-149, 1990, IEEE Computer Society, 0-8186-2071-4. The full citation details ...](Pics/full.jpeg) |
1990 |
DBLP DOI BibTeX RDF |
|
1 | Jeremy Jacob |
Categorizing non-interference. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSFW ![In: Third IEEE Computer Security Foundations Workshop - CSFW'90, Franconia, New Hampshire, USA, June 12-14, 1990, Proceedings, pp. 44-50, 1990, IEEE Computer Society, 0-8186-2071-4. The full citation details ...](Pics/full.jpeg) |
1990 |
DBLP DOI BibTeX RDF |
|
1 | Leo Marcus, Telis Menas |
Safety via State Transition Language Plus Invariants. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSFW ![In: Second IEEE Computer Security Foundations Workshop - CSFW'89, Franconia, New Hampshire, USA, June 11-14, 1989, Proceedings, pp. 71-77, 1989, IEEE Computer Society, 0-8186-1955-4. The full citation details ...](Pics/full.jpeg) |
1989 |
DBLP DOI BibTeX RDF |
|
1 | Hai-Ping Ko |
Security Properties of Ring Brackets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSFW ![In: Second IEEE Computer Security Foundations Workshop - CSFW'89, Franconia, New Hampshire, USA, June 11-14, 1989, Proceedings, pp. 41-46, 1989, IEEE Computer Society, 0-8186-1955-4. The full citation details ...](Pics/full.jpeg) |
1989 |
DBLP DOI BibTeX RDF |
|
1 | Todd Fine, J. Thomas Haigh, Richard C. O'Brien, Dana L. Toups |
Noninterference and the Unwinding for LOCK. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSFW ![In: Second IEEE Computer Security Foundations Workshop - CSFW'89, Franconia, New Hampshire, USA, June 11-14, 1989, Proceedings, pp. 22-28, 1989, IEEE Computer Society, 0-8186-1955-4. The full citation details ...](Pics/full.jpeg) |
1989 |
DBLP DOI BibTeX RDF |
|
1 | Jaisook Landauer, Timothy Redmond, Terry Benzel |
Formal Policies for Trusted Processes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSFW ![In: Second IEEE Computer Security Foundations Workshop - CSFW'89, Franconia, New Hampshire, USA, June 11-14, 1989, Proceedings, pp. 31-40, 1989, IEEE Computer Society, 0-8186-1955-4. The full citation details ...](Pics/full.jpeg) |
1989 |
DBLP DOI BibTeX RDF |
|
1 | Dale M. Johnson, F. Javier Thayer |
Security Properties Consistent with the Testing Semantics for Communicating Processes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSFW ![In: Second IEEE Computer Security Foundations Workshop - CSFW'89, Franconia, New Hampshire, USA, June 11-14, 1989, Proceedings, pp. 9-21, 1989, IEEE Computer Society, 0-8186-1955-4. The full citation details ...](Pics/full.jpeg) |
1989 |
DBLP DOI BibTeX RDF |
|
1 | R. Alan Whitehurst, Teresa F. Lunt |
The Sea View Verification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSFW ![In: Second IEEE Computer Security Foundations Workshop - CSFW'89, Franconia, New Hampshire, USA, June 11-14, 1989, Proceedings, pp. 125-132, 1989, IEEE Computer Society, 0-8186-1955-4. The full citation details ...](Pics/full.jpeg) |
1989 |
DBLP DOI BibTeX RDF |
|
1 | Janice I. Glasgow, Glenn H. MacEwen |
Obligation as the Basis of Integrity Specification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSFW ![In: Second IEEE Computer Security Foundations Workshop - CSFW'89, Franconia, New Hampshire, USA, June 11-14, 1989, Proceedings, pp. 64-70, 1989, IEEE Computer Society, 0-8186-1955-4. The full citation details ...](Pics/full.jpeg) |
1989 |
DBLP DOI BibTeX RDF |
|
1 | Ian Sutherland, Stanley Perlo, Rammohan Varadarajan |
Deducibility Security with Dynamic Level Assignment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSFW ![In: Second IEEE Computer Security Foundations Workshop - CSFW'89, Franconia, New Hampshire, USA, June 11-14, 1989, Proceedings, pp. 3-8, 1989, IEEE Computer Society, 0-8186-1955-4. The full citation details ...](Pics/full.jpeg) |
1989 |
DBLP DOI BibTeX RDF |
|
1 | John C. Wray |
An Optimization for Information Flow Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSFW ![In: Second IEEE Computer Security Foundations Workshop - CSFW'89, Franconia, New Hampshire, USA, June 11-14, 1989, Proceedings, pp. 105-110, 1989, IEEE Computer Society, 0-8186-1955-4. The full citation details ...](Pics/full.jpeg) |
1989 |
DBLP DOI BibTeX RDF |
|
1 | David Rosenthal |
Implementing a Verification Methodology for McCullough Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSFW ![In: Second IEEE Computer Security Foundations Workshop - CSFW'89, Franconia, New Hampshire, USA, June 11-14, 1989, Proceedings, pp. 133-140, 1989, IEEE Computer Society, 0-8186-1955-4. The full citation details ...](Pics/full.jpeg) |
1989 |
DBLP DOI BibTeX RDF |
|
1 | Jonathan K. Millen |
Finite-State Noiseless Covert Channels. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSFW ![In: Second IEEE Computer Security Foundations Workshop - CSFW'89, Franconia, New Hampshire, USA, June 11-14, 1989, Proceedings, pp. 81-86, 1989, IEEE Computer Society, 0-8186-1955-4. The full citation details ...](Pics/full.jpeg) |
1989 |
DBLP DOI BibTeX RDF |
|
1 | Richard B. Neely, James W. Freeman, M. D. Krenzin |
Achieving Understandable Results in a Formal Design Verification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSFW ![In: Second IEEE Computer Security Foundations Workshop - CSFW'89, Franconia, New Hampshire, USA, June 11-14, 1989, Proceedings, pp. 115-124, 1989, IEEE Computer Society, 0-8186-1955-4. The full citation details ...](Pics/full.jpeg) |
1989 |
DBLP DOI BibTeX RDF |
|
1 | J. Todd Wittbold |
Controlled Signalling Systems and Covert Channels. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSFW ![In: Second IEEE Computer Security Foundations Workshop - CSFW'89, Franconia, New Hampshire, USA, June 11-14, 1989, Proceedings, pp. 87-104, 1989, IEEE Computer Society, 0-8186-1955-4. The full citation details ...](Pics/full.jpeg) |
1989 |
DBLP DOI BibTeX RDF |
|
1 | Louise E. Moser |
A Logic of Knowledge and Belief for Reasoning about Computer Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSFW ![In: Second IEEE Computer Security Foundations Workshop - CSFW'89, Franconia, New Hampshire, USA, June 11-14, 1989, Proceedings, pp. 47-63, 1989, IEEE Computer Society, 0-8186-1955-4. The full citation details ...](Pics/full.jpeg) |
1989 |
DBLP DOI BibTeX RDF |
|
1 | |
Second IEEE Computer Security Foundations Workshop - CSFW'89, Franconia, New Hampshire, USA, June 11-14, 1989, Proceedings ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSFW ![IEEE Computer Society, 0-8186-1955-4 The full citation details ...](Pics/full.jpeg) |
1989 |
DBLP BibTeX RDF |
|
1 | Maurice Herlihy, Jeannette M. Wing |
Specifying Security Constraints with Relaxation Lattices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSFW ![In: Second IEEE Computer Security Foundations Workshop - CSFW'89, Franconia, New Hampshire, USA, June 11-14, 1989, Proceedings, pp. 47-53, 1989, IEEE Computer Society, 0-8186-1955-4. The full citation details ...](Pics/full.jpeg) |
1989 |
DBLP DOI BibTeX RDF |
|
1 | Ian Sutherland |
Relating Bell-LaPadula-Style Security Models to Information Models. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSFW ![In: First IEEE Computer Security Foundations Workshop - CSFW'88, Franconia, New Hampshire, USA, June 12-15, 1988, Proceedings, pp. 112-123, 1988, MITRE Corporation Press. The full citation details ...](Pics/full.jpeg) |
1988 |
DBLP BibTeX RDF |
|
1 | Jeremy Jacob |
A Security Framework. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSFW ![In: First IEEE Computer Security Foundations Workshop - CSFW'88, Franconia, New Hampshire, USA, June 12-15, 1988, Proceedings, pp. 98-111, 1988, MITRE Corporation Press. The full citation details ...](Pics/full.jpeg) |
1988 |
DBLP BibTeX RDF |
|
1 | David Rosenthal |
An Approach to Increasing the Automation of the Verification of Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSFW ![In: First IEEE Computer Security Foundations Workshop - CSFW'88, Franconia, New Hampshire, USA, June 12-15, 1988, Proceedings, pp. 90-97, 1988, MITRE Corporation Press. The full citation details ...](Pics/full.jpeg) |
1988 |
DBLP BibTeX RDF |
|
1 | Daryl McCullough |
Covert Channels and Degrees of Insecurity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSFW ![In: First IEEE Computer Security Foundations Workshop - CSFW'88, Franconia, New Hampshire, USA, June 12-15, 1988, Proceedings, pp. 1-33, 1988, MITRE Corporation Press. The full citation details ...](Pics/full.jpeg) |
1988 |
DBLP BibTeX RDF |
|
1 | John McHugh |
A Formal Definition for Information Flow in the Gypsy Expression Language. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSFW ![In: First IEEE Computer Security Foundations Workshop - CSFW'88, Franconia, New Hampshire, USA, June 12-15, 1988, Proceedings, pp. 147-165, 1988, MITRE Corporation Press. The full citation details ...](Pics/full.jpeg) |
1988 |
DBLP BibTeX RDF |
|
1 | Bret Hartman |
A General Approach to Tranquility in Information Flow Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSFW ![In: First IEEE Computer Security Foundations Workshop - CSFW'88, Franconia, New Hampshire, USA, June 12-15, 1988, Proceedings, pp. 166-181, 1988, MITRE Corporation Press. The full citation details ...](Pics/full.jpeg) |
1988 |
DBLP BibTeX RDF |
|
1 | Benedetto L. DiVito |
Derived Information Sensitivity as a Modelling Technique. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSFW ![In: First IEEE Computer Security Foundations Workshop - CSFW'88, Franconia, New Hampshire, USA, June 12-15, 1988, Proceedings, pp. 182-187, 1988, MITRE Corporation Press. The full citation details ...](Pics/full.jpeg) |
1988 |
DBLP BibTeX RDF |
|
1 | Teresa F. Lunt |
Access Control Policies: Some Unanswered Questions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSFW ![In: First IEEE Computer Security Foundations Workshop - CSFW'88, Franconia, New Hampshire, USA, June 12-15, 1988, Proceedings, pp. 227-245, 1988, MITRE Corporation Press. The full citation details ...](Pics/full.jpeg) |
1988 |
DBLP BibTeX RDF |
|
1 | Ravi S. Sandhu |
Expressive Power of the Schematic Protection Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSFW ![In: First IEEE Computer Security Foundations Workshop - CSFW'88, Franconia, New Hampshire, USA, June 12-15, 1988, Proceedings, pp. 188-193, 1988, MITRE Corporation Press. The full citation details ...](Pics/full.jpeg) |
1988 |
DBLP BibTeX RDF |
|
1 | |
First IEEE Computer Security Foundations Workshop - CSFW'88, Franconia, New Hampshire, USA, June 12-15, 1988, Proceedings ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSFW ![MITRE Corporation Press The full citation details ...](Pics/full.jpeg) |
1988 |
DBLP BibTeX RDF |
|
1 | Joshua D. Guttman, Mark E. Nadel |
What Needs Securing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSFW ![In: First IEEE Computer Security Foundations Workshop - CSFW'88, Franconia, New Hampshire, USA, June 12-15, 1988, Proceedings, pp. 34-57, 1988, MITRE Corporation Press. The full citation details ...](Pics/full.jpeg) |
1988 |
DBLP BibTeX RDF |
|
1 | Janice I. Glasgow, Glenn H. MacEwen, Prakash Panangaden |
Reasoning about Knowledge and Permission in Secure Distributed Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSFW ![In: First IEEE Computer Security Foundations Workshop - CSFW'88, Franconia, New Hampshire, USA, June 12-15, 1988, Proceedings, pp. 139-146, 1988, MITRE Corporation Press. The full citation details ...](Pics/full.jpeg) |
1988 |
DBLP BibTeX RDF |
|
1 | Leo Marcus, Timothy Redmond |
A Model-Theoretic Approach to Specifying, Verifying and Hooking Up Security Policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSFW ![In: First IEEE Computer Security Foundations Workshop - CSFW'88, Franconia, New Hampshire, USA, June 12-15, 1988, Proceedings, pp. 127-138, 1988, MITRE Corporation Press. The full citation details ...](Pics/full.jpeg) |
1988 |
DBLP BibTeX RDF |
|
1 | Will Harkness, Paul A. Pittelli |
Command Authorization as a Component of Information Integrity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSFW ![In: First IEEE Computer Security Foundations Workshop - CSFW'88, Franconia, New Hampshire, USA, June 12-15, 1988, Proceedings, pp. 219-226, 1988, MITRE Corporation Press. The full citation details ...](Pics/full.jpeg) |
1988 |
DBLP BibTeX RDF |
|
1 | D. G. Weber |
Quantitative Formal Security Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSFW ![In: First IEEE Computer Security Foundations Workshop - CSFW'88, Franconia, New Hampshire, USA, June 12-15, 1988, Proceedings, pp. 58-71, 1988, MITRE Corporation Press. The full citation details ...](Pics/full.jpeg) |
1988 |
DBLP BibTeX RDF |
|
1 | Matt Bishop |
Theft of Information in the Take-Grant Protection Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSFW ![In: First IEEE Computer Security Foundations Workshop - CSFW'88, Franconia, New Hampshire, USA, June 12-15, 1988, Proceedings, pp. 194-218, 1988, MITRE Corporation Press. The full citation details ...](Pics/full.jpeg) |
1988 |
DBLP BibTeX RDF |
|
1 | Dale M. Johnson, F. Javier Thayer |
Security and the Composition of Machines. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSFW ![In: First IEEE Computer Security Foundations Workshop - CSFW'88, Franconia, New Hampshire, USA, June 12-15, 1988, Proceedings, pp. 72-89, 1988, MITRE Corporation Press. The full citation details ...](Pics/full.jpeg) |
1988 |
DBLP BibTeX RDF |
|