Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/csfw/csfw1988.bht:"
@inproceedings{DBLP:conf/csfw/Bishop88, author = {Matt Bishop}, title = {Theft of Information in the Take-Grant Protection Model}, booktitle = {First {IEEE} Computer Security Foundations Workshop - CSFW'88, Franconia, New Hampshire, USA, June 12-15, 1988, Proceedings}, pages = {194--218}, publisher = {{MITRE} Corporation Press}, year = {1988}, timestamp = {Thu, 19 Sep 2013 16:43:13 +0200}, biburl = {https://dblp.org/rec/conf/csfw/Bishop88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/DiVito88, author = {Benedetto L. DiVito}, title = {Derived Information Sensitivity as a Modelling Technique}, booktitle = {First {IEEE} Computer Security Foundations Workshop - CSFW'88, Franconia, New Hampshire, USA, June 12-15, 1988, Proceedings}, pages = {182--187}, publisher = {{MITRE} Corporation Press}, year = {1988}, timestamp = {Thu, 19 Sep 2013 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csfw/DiVito88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/GlasgowMP88, author = {Janice I. Glasgow and Glenn H. MacEwen and Prakash Panangaden}, title = {Reasoning about Knowledge and Permission in Secure Distributed Systems}, booktitle = {First {IEEE} Computer Security Foundations Workshop - CSFW'88, Franconia, New Hampshire, USA, June 12-15, 1988, Proceedings}, pages = {139--146}, publisher = {{MITRE} Corporation Press}, year = {1988}, timestamp = {Thu, 19 Sep 2013 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csfw/GlasgowMP88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/GuttmanN88, author = {Joshua D. Guttman and Mark E. Nadel}, title = {What Needs Securing}, booktitle = {First {IEEE} Computer Security Foundations Workshop - CSFW'88, Franconia, New Hampshire, USA, June 12-15, 1988, Proceedings}, pages = {34--57}, publisher = {{MITRE} Corporation Press}, year = {1988}, timestamp = {Thu, 19 Sep 2013 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csfw/GuttmanN88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/HarknessP88, author = {Will Harkness and Paul A. Pittelli}, title = {Command Authorization as a Component of Information Integrity}, booktitle = {First {IEEE} Computer Security Foundations Workshop - CSFW'88, Franconia, New Hampshire, USA, June 12-15, 1988, Proceedings}, pages = {219--226}, publisher = {{MITRE} Corporation Press}, year = {1988}, timestamp = {Thu, 19 Sep 2013 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csfw/HarknessP88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/Hartman88, author = {Bret Hartman}, title = {A General Approach to Tranquility in Information Flow Analysis}, booktitle = {First {IEEE} Computer Security Foundations Workshop - CSFW'88, Franconia, New Hampshire, USA, June 12-15, 1988, Proceedings}, pages = {166--181}, publisher = {{MITRE} Corporation Press}, year = {1988}, timestamp = {Thu, 19 Sep 2013 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csfw/Hartman88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/Jacob88, author = {Jeremy Jacob}, title = {A Security Framework}, booktitle = {First {IEEE} Computer Security Foundations Workshop - CSFW'88, Franconia, New Hampshire, USA, June 12-15, 1988, Proceedings}, pages = {98--111}, publisher = {{MITRE} Corporation Press}, year = {1988}, timestamp = {Thu, 19 Sep 2013 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csfw/Jacob88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/JohnsonT88, author = {Dale M. Johnson and F. Javier Thayer}, title = {Security and the Composition of Machines}, booktitle = {First {IEEE} Computer Security Foundations Workshop - CSFW'88, Franconia, New Hampshire, USA, June 12-15, 1988, Proceedings}, pages = {72--89}, publisher = {{MITRE} Corporation Press}, year = {1988}, timestamp = {Thu, 19 Sep 2013 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csfw/JohnsonT88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/Lunt88, author = {Teresa F. Lunt}, title = {Access Control Policies: Some Unanswered Questions}, booktitle = {First {IEEE} Computer Security Foundations Workshop - CSFW'88, Franconia, New Hampshire, USA, June 12-15, 1988, Proceedings}, pages = {227--245}, publisher = {{MITRE} Corporation Press}, year = {1988}, timestamp = {Thu, 19 Sep 2013 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csfw/Lunt88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/MarcusR88, author = {Leo Marcus and Timothy Redmond}, title = {A Model-Theoretic Approach to Specifying, Verifying and Hooking Up Security Policies}, booktitle = {First {IEEE} Computer Security Foundations Workshop - CSFW'88, Franconia, New Hampshire, USA, June 12-15, 1988, Proceedings}, pages = {127--138}, publisher = {{MITRE} Corporation Press}, year = {1988}, timestamp = {Thu, 19 Sep 2013 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csfw/MarcusR88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/McCullough88, author = {Daryl McCullough}, title = {Covert Channels and Degrees of Insecurity}, booktitle = {First {IEEE} Computer Security Foundations Workshop - CSFW'88, Franconia, New Hampshire, USA, June 12-15, 1988, Proceedings}, pages = {1--33}, publisher = {{MITRE} Corporation Press}, year = {1988}, timestamp = {Thu, 19 Sep 2013 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csfw/McCullough88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/McHugh88, author = {John McHugh}, title = {A Formal Definition for Information Flow in the Gypsy Expression Language}, booktitle = {First {IEEE} Computer Security Foundations Workshop - CSFW'88, Franconia, New Hampshire, USA, June 12-15, 1988, Proceedings}, pages = {147--165}, publisher = {{MITRE} Corporation Press}, year = {1988}, timestamp = {Thu, 19 Sep 2013 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csfw/McHugh88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/Rosenthal88, author = {David Rosenthal}, title = {An Approach to Increasing the Automation of the Verification of Security}, booktitle = {First {IEEE} Computer Security Foundations Workshop - CSFW'88, Franconia, New Hampshire, USA, June 12-15, 1988, Proceedings}, pages = {90--97}, publisher = {{MITRE} Corporation Press}, year = {1988}, timestamp = {Thu, 19 Sep 2013 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csfw/Rosenthal88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/Sandhu88, author = {Ravi S. Sandhu}, title = {Expressive Power of the Schematic Protection Model}, booktitle = {First {IEEE} Computer Security Foundations Workshop - CSFW'88, Franconia, New Hampshire, USA, June 12-15, 1988, Proceedings}, pages = {188--193}, publisher = {{MITRE} Corporation Press}, year = {1988}, timestamp = {Thu, 19 Sep 2013 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csfw/Sandhu88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/Sutherland88, author = {Ian Sutherland}, title = {Relating Bell-LaPadula-Style Security Models to Information Models}, booktitle = {First {IEEE} Computer Security Foundations Workshop - CSFW'88, Franconia, New Hampshire, USA, June 12-15, 1988, Proceedings}, pages = {112--123}, publisher = {{MITRE} Corporation Press}, year = {1988}, timestamp = {Thu, 19 Sep 2013 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csfw/Sutherland88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/Weber88, author = {D. G. Weber}, title = {Quantitative Formal Security Analysis}, booktitle = {First {IEEE} Computer Security Foundations Workshop - CSFW'88, Franconia, New Hampshire, USA, June 12-15, 1988, Proceedings}, pages = {58--71}, publisher = {{MITRE} Corporation Press}, year = {1988}, timestamp = {Thu, 19 Sep 2013 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csfw/Weber88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/csfw/1988, title = {First {IEEE} Computer Security Foundations Workshop - CSFW'88, Franconia, New Hampshire, USA, June 12-15, 1988, Proceedings}, publisher = {{MITRE} Corporation Press}, year = {1988}, timestamp = {Thu, 19 Sep 2013 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csfw/1988.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.