


default search action
4th CSFW 1991: Franconia, New Hampshire, USA
- 4th IEEE Computer Security Foundations Workshop - CSFW'91, Franconia, New Hampshire, USA, June 18-20, 1991, Proceedings. IEEE Computer Society 1991, ISBN 0-8186-2215-6

- Pierre Bieber, Frédéric Cuppens:

A Definition of Secure Dependencies Using the Logic of Security. 2-11 - Gilles Trouessin:

Quantitative Evaluation of Confidentiality by Entropy Calculation. 12-21 - Jonathan T. Trostle:

Multiple Trojan Horse Systems and Covert Channel Analysis. 22-33 - John Graham-Cumming, Jeff W. Sanders:

On the Refinement of Non-Interference. 35-42 - P. G. Allen:

A Comparison of non-Interference and Non-Deducibility using CSP. 43-54 - James W. Gray III:

On Information Flow Security Models. 55-60 - Sarbari Gupta, Virgil D. Gligor:

Towards a Theory of Penetration-Resistant Systems and its Applications. 62-78 - Simon N. Foley:

Separation of Duty using High Water Marks. 79-88 - Jeremy Jacob:

The Basic Integrity Theorem. 89-97 - Li Gong:

Handling Infeasible Specifications fo Cryptographic Protocols. 99-102 - Rajashekar Kailar, Virgil D. Gligor:

On Belief Evolution in Authentication Protocols. 103-116 - Thomas D. Garvey, Teresa F. Lunt, Mark E. Stickel:

Abductive and Approximate Reasoning Models for Characterizing Inference Channels. 118-126 - Bhavani Thuraisingham:

A Nonmonotonic Typed Multilevel Logic for Multilevel Secure Database/Knowledge-Based Management Systems. 127-138 - Ravi S. Sandhu, Roshan K. Thomas, Sushil Jajodia:

A Secure Kernelized Architecture for Multiple Object-Oriented Databases. 139-152 - Vijay Varadharajan:

Hook-Up Property of Information Flow Secure Nets. 154-175 - Glenn H. MacEwen, Janice I. Glasgow:

A Proof of Secrecy for a Network Security Model. 176-181 - E. John Sebes, Richard J. Feiertag:

Implicit Discretionary Access Propagation: A new Interpretation of DAC. 183-187 - John A. McDermid, Qi Shi

:
A Formal Model of Security Dependency for Analysis and Testing of Secure Systems. 188-200 - Oliver Costich, Ira S. Moskowitz:

Analysis of a Storage Channel in the Two-Phase Commit Protocol. 201-208 - P. M. Melliar-Smith, Louise E. Moser:

Protection against Covert Storage and Timing Channels. 209-214 - Leonard J. LaPadula, James G. Williams:

Toward a Universal Integrity Model. 216-218 - Virgil D. Gligor, Rajashekar Kailar, Stuart G. Stubblebine, Li Gong:

Logics for Cryptographic Protocols - Virtues and Limitations. 219-226 - Catherine Meadows:

The NRL Protocol Analysis Tool: A Position Paper. 227 - Paul F. Syverson:

The Value of Semantics for the Analysis of Cryptographic Protocols. 228-229 - Yacov Yacobi:

Complexity Theoretic Analysis of Crypto-Protcols - Overview. 230-233 - Catherine Meadows:

Panel Discussion on the Polyinstantiation Problem: An Introduction. CSFW 1991: 234 - Sushil Jajodia:

Panel Discussion on the Polyinstantiation Problem: A Position Paper. CSFW 1991: 235 - Teresa F. Lunt:

Polyinstantiation: An Inevitable Part of a Multilevel World. 236-238 - Dick O'Brien:

The LDV Approach to Polyinstantiation. 239-240 - Simon R. Wiseman:

The Conflict Between Confidentiality and Integrity. 241-242

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














