Search dblp for Publications

export results for "toc:db/conf/csfw/csfw1988.bht:"

 download as .bib file

@inproceedings{DBLP:conf/csfw/Bishop88,
  author       = {Matt Bishop},
  title        = {Theft of Information in the Take-Grant Protection Model},
  booktitle    = {First {IEEE} Computer Security Foundations Workshop - CSFW'88, Franconia,
                  New Hampshire, USA, June 12-15, 1988, Proceedings},
  pages        = {194--218},
  publisher    = {{MITRE} Corporation Press},
  year         = {1988},
  timestamp    = {Thu, 19 Sep 2013 16:43:13 +0200},
  biburl       = {https://dblp.org/rec/conf/csfw/Bishop88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/DiVito88,
  author       = {Benedetto L. DiVito},
  title        = {Derived Information Sensitivity as a Modelling Technique},
  booktitle    = {First {IEEE} Computer Security Foundations Workshop - CSFW'88, Franconia,
                  New Hampshire, USA, June 12-15, 1988, Proceedings},
  pages        = {182--187},
  publisher    = {{MITRE} Corporation Press},
  year         = {1988},
  timestamp    = {Thu, 19 Sep 2013 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csfw/DiVito88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/GlasgowMP88,
  author       = {Janice I. Glasgow and
                  Glenn H. MacEwen and
                  Prakash Panangaden},
  title        = {Reasoning about Knowledge and Permission in Secure Distributed Systems},
  booktitle    = {First {IEEE} Computer Security Foundations Workshop - CSFW'88, Franconia,
                  New Hampshire, USA, June 12-15, 1988, Proceedings},
  pages        = {139--146},
  publisher    = {{MITRE} Corporation Press},
  year         = {1988},
  timestamp    = {Thu, 19 Sep 2013 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csfw/GlasgowMP88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/GuttmanN88,
  author       = {Joshua D. Guttman and
                  Mark E. Nadel},
  title        = {What Needs Securing},
  booktitle    = {First {IEEE} Computer Security Foundations Workshop - CSFW'88, Franconia,
                  New Hampshire, USA, June 12-15, 1988, Proceedings},
  pages        = {34--57},
  publisher    = {{MITRE} Corporation Press},
  year         = {1988},
  timestamp    = {Thu, 19 Sep 2013 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csfw/GuttmanN88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/HarknessP88,
  author       = {Will Harkness and
                  Paul A. Pittelli},
  title        = {Command Authorization as a Component of Information Integrity},
  booktitle    = {First {IEEE} Computer Security Foundations Workshop - CSFW'88, Franconia,
                  New Hampshire, USA, June 12-15, 1988, Proceedings},
  pages        = {219--226},
  publisher    = {{MITRE} Corporation Press},
  year         = {1988},
  timestamp    = {Thu, 19 Sep 2013 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csfw/HarknessP88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/Hartman88,
  author       = {Bret Hartman},
  title        = {A General Approach to Tranquility in Information Flow Analysis},
  booktitle    = {First {IEEE} Computer Security Foundations Workshop - CSFW'88, Franconia,
                  New Hampshire, USA, June 12-15, 1988, Proceedings},
  pages        = {166--181},
  publisher    = {{MITRE} Corporation Press},
  year         = {1988},
  timestamp    = {Thu, 19 Sep 2013 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csfw/Hartman88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/Jacob88,
  author       = {Jeremy Jacob},
  title        = {A Security Framework},
  booktitle    = {First {IEEE} Computer Security Foundations Workshop - CSFW'88, Franconia,
                  New Hampshire, USA, June 12-15, 1988, Proceedings},
  pages        = {98--111},
  publisher    = {{MITRE} Corporation Press},
  year         = {1988},
  timestamp    = {Thu, 19 Sep 2013 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csfw/Jacob88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/JohnsonT88,
  author       = {Dale M. Johnson and
                  F. Javier Thayer},
  title        = {Security and the Composition of Machines},
  booktitle    = {First {IEEE} Computer Security Foundations Workshop - CSFW'88, Franconia,
                  New Hampshire, USA, June 12-15, 1988, Proceedings},
  pages        = {72--89},
  publisher    = {{MITRE} Corporation Press},
  year         = {1988},
  timestamp    = {Thu, 19 Sep 2013 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csfw/JohnsonT88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/Lunt88,
  author       = {Teresa F. Lunt},
  title        = {Access Control Policies: Some Unanswered Questions},
  booktitle    = {First {IEEE} Computer Security Foundations Workshop - CSFW'88, Franconia,
                  New Hampshire, USA, June 12-15, 1988, Proceedings},
  pages        = {227--245},
  publisher    = {{MITRE} Corporation Press},
  year         = {1988},
  timestamp    = {Thu, 19 Sep 2013 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csfw/Lunt88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/MarcusR88,
  author       = {Leo Marcus and
                  Timothy Redmond},
  title        = {A Model-Theoretic Approach to Specifying, Verifying and Hooking Up
                  Security Policies},
  booktitle    = {First {IEEE} Computer Security Foundations Workshop - CSFW'88, Franconia,
                  New Hampshire, USA, June 12-15, 1988, Proceedings},
  pages        = {127--138},
  publisher    = {{MITRE} Corporation Press},
  year         = {1988},
  timestamp    = {Thu, 19 Sep 2013 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csfw/MarcusR88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/McCullough88,
  author       = {Daryl McCullough},
  title        = {Covert Channels and Degrees of Insecurity},
  booktitle    = {First {IEEE} Computer Security Foundations Workshop - CSFW'88, Franconia,
                  New Hampshire, USA, June 12-15, 1988, Proceedings},
  pages        = {1--33},
  publisher    = {{MITRE} Corporation Press},
  year         = {1988},
  timestamp    = {Thu, 19 Sep 2013 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csfw/McCullough88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/McHugh88,
  author       = {John McHugh},
  title        = {A Formal Definition for Information Flow in the Gypsy Expression Language},
  booktitle    = {First {IEEE} Computer Security Foundations Workshop - CSFW'88, Franconia,
                  New Hampshire, USA, June 12-15, 1988, Proceedings},
  pages        = {147--165},
  publisher    = {{MITRE} Corporation Press},
  year         = {1988},
  timestamp    = {Thu, 19 Sep 2013 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csfw/McHugh88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/Rosenthal88,
  author       = {David Rosenthal},
  title        = {An Approach to Increasing the Automation of the Verification of Security},
  booktitle    = {First {IEEE} Computer Security Foundations Workshop - CSFW'88, Franconia,
                  New Hampshire, USA, June 12-15, 1988, Proceedings},
  pages        = {90--97},
  publisher    = {{MITRE} Corporation Press},
  year         = {1988},
  timestamp    = {Thu, 19 Sep 2013 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csfw/Rosenthal88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/Sandhu88,
  author       = {Ravi S. Sandhu},
  title        = {Expressive Power of the Schematic Protection Model},
  booktitle    = {First {IEEE} Computer Security Foundations Workshop - CSFW'88, Franconia,
                  New Hampshire, USA, June 12-15, 1988, Proceedings},
  pages        = {188--193},
  publisher    = {{MITRE} Corporation Press},
  year         = {1988},
  timestamp    = {Thu, 19 Sep 2013 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csfw/Sandhu88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/Sutherland88,
  author       = {Ian Sutherland},
  title        = {Relating Bell-LaPadula-Style Security Models to Information Models},
  booktitle    = {First {IEEE} Computer Security Foundations Workshop - CSFW'88, Franconia,
                  New Hampshire, USA, June 12-15, 1988, Proceedings},
  pages        = {112--123},
  publisher    = {{MITRE} Corporation Press},
  year         = {1988},
  timestamp    = {Thu, 19 Sep 2013 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csfw/Sutherland88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/Weber88,
  author       = {D. G. Weber},
  title        = {Quantitative Formal Security Analysis},
  booktitle    = {First {IEEE} Computer Security Foundations Workshop - CSFW'88, Franconia,
                  New Hampshire, USA, June 12-15, 1988, Proceedings},
  pages        = {58--71},
  publisher    = {{MITRE} Corporation Press},
  year         = {1988},
  timestamp    = {Thu, 19 Sep 2013 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csfw/Weber88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/csfw/1988,
  title        = {First {IEEE} Computer Security Foundations Workshop - CSFW'88, Franconia,
                  New Hampshire, USA, June 12-15, 1988, Proceedings},
  publisher    = {{MITRE} Corporation Press},
  year         = {1988},
  timestamp    = {Thu, 19 Sep 2013 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csfw/1988.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics