default search action
4th CSFW 1991: Franconia, New Hampshire, USA
- 4th IEEE Computer Security Foundations Workshop - CSFW'91, Franconia, New Hampshire, USA, June 18-20, 1991, Proceedings. IEEE Computer Society 1991, ISBN 0-8186-2215-6
- Pierre Bieber, Frédéric Cuppens:
A Definition of Secure Dependencies Using the Logic of Security. 2-11 - Gilles Trouessin:
Quantitative Evaluation of Confidentiality by Entropy Calculation. 12-21 - Jonathan T. Trostle:
Multiple Trojan Horse Systems and Covert Channel Analysis. 22-33 - John Graham-Cumming, Jeff W. Sanders:
On the Refinement of Non-Interference. 35-42 - P. G. Allen:
A Comparison of non-Interference and Non-Deducibility using CSP. 43-54 - James W. Gray III:
On Information Flow Security Models. 55-60 - Sarbari Gupta, Virgil D. Gligor:
Towards a Theory of Penetration-Resistant Systems and its Applications. 62-78 - Simon N. Foley:
Separation of Duty using High Water Marks. 79-88 - Jeremy Jacob:
The Basic Integrity Theorem. 89-97 - Li Gong:
Handling Infeasible Specifications fo Cryptographic Protocols. 99-102 - Rajashekar Kailar, Virgil D. Gligor:
On Belief Evolution in Authentication Protocols. 103-116 - Thomas D. Garvey, Teresa F. Lunt, Mark E. Stickel:
Abductive and Approximate Reasoning Models for Characterizing Inference Channels. 118-126 - Bhavani Thuraisingham:
A Nonmonotonic Typed Multilevel Logic for Multilevel Secure Database/Knowledge-Based Management Systems. 127-138 - Ravi S. Sandhu, Roshan K. Thomas, Sushil Jajodia:
A Secure Kernelized Architecture for Multiple Object-Oriented Databases. 139-152 - Vijay Varadharajan:
Hook-Up Property of Information Flow Secure Nets. 154-175 - Glenn H. MacEwen, Janice I. Glasgow:
A Proof of Secrecy for a Network Security Model. 176-181 - E. John Sebes, Richard J. Feiertag:
Implicit Discretionary Access Propagation: A new Interpretation of DAC. 183-187 - John A. McDermid, Qi Shi:
A Formal Model of Security Dependency for Analysis and Testing of Secure Systems. 188-200 - Oliver Costich, Ira S. Moskowitz:
Analysis of a Storage Channel in the Two-Phase Commit Protocol. 201-208 - P. M. Melliar-Smith, Louise E. Moser:
Protection against Covert Storage and Timing Channels. 209-214 - Leonard J. LaPadula, James G. Williams:
Toward a Universal Integrity Model. 216-218 - Virgil D. Gligor, Rajashekar Kailar, Stuart G. Stubblebine, Li Gong:
Logics for Cryptographic Protocols - Virtues and Limitations. 219-226 - Catherine Meadows:
The NRL Protocol Analysis Tool: A Position Paper. 227 - Paul F. Syverson:
The Value of Semantics for the Analysis of Cryptographic Protocols. 228-229 - Yacov Yacobi:
Complexity Theoretic Analysis of Crypto-Protcols - Overview. 230-233 - Catherine Meadows:
Panel Discussion on the Polyinstantiation Problem: An Introduction. CSFW 1991: 234 - Sushil Jajodia:
Panel Discussion on the Polyinstantiation Problem: A Position Paper. CSFW 1991: 235 - Teresa F. Lunt:
Polyinstantiation: An Inevitable Part of a Multilevel World. 236-238 - Dick O'Brien:
The LDV Approach to Polyinstantiation. 239-240 - Simon R. Wiseman:
The Conflict Between Confidentiality and Integrity. 241-242
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.