The SCEAS System
Navigation Menu

Conferences in DBLP

IEEE Computer Security Foundations Workshop (CSFW) (csfw)
1995 (conf/csfw/1995)

  1. Aris Zakinthinos, E. Stewart Lee
    The composability of non-interference [system security]. [Citation Graph (0, 0)][DBLP]
    CSFW, 1995, pp:2-8 [Conf]
  2. A. W. Roscoe, L. Wulf
    Composing and decomposing systems under security properties. [Citation Graph (0, 0)][DBLP]
    CSFW, 1995, pp:9-15 [Conf]
  3. Alfred P. Maneki
    Algebraic properties of system composition in the LORAL, Ulysses and McLean trace models. [Citation Graph (0, 0)][DBLP]
    CSFW, 1995, pp:16-0 [Conf]
  4. Li Gong
    Optimal authentication protocols resistant to password guessing attacks. [Citation Graph (0, 0)][DBLP]
    CSFW, 1995, pp:24-29 [Conf]
  5. Liqun Chen, Dieter Gollmann, Chris J. Mitchell
    Key distribution without individual trusted authentification servers. [Citation Graph (0, 0)][DBLP]
    CSFW, 1995, pp:30-0 [Conf]
  6. Colin Boyd
    Towards a classification of key agreement protocols. [Citation Graph (0, 0)][DBLP]
    CSFW, 1995, pp:38-43 [Conf]
  7. Wenbo Mao
    An augmentation of BAN-like logics. [Citation Graph (0, 0)][DBLP]
    CSFW, 1995, pp:44-0 [Conf]
  8. Riccardo Focardi, Roberto Gorrieri, V. Panini
    The security checker: a semantics-based tool for the verification of security properties. [Citation Graph (0, 0)][DBLP]
    CSFW, 1995, pp:60-69 [Conf]
  9. Trent Jaeger, Atul Prakash
    Implementation of a discretionary access control model for script-based systems. [Citation Graph (0, 0)][DBLP]
    CSFW, 1995, pp:70-84 [Conf]
  10. John V. A. Janeri, Daylan B. Darby, Daniel D. Schnackenberg
    Building higher resolution synthetic clocks for signaling in covert timing channels. [Citation Graph (0, 0)][DBLP]
    CSFW, 1995, pp:85-0 [Conf]
  11. A. W. Roscoe
    Modelling and verifying key-exchange protocols using CSP and FDR. [Citation Graph (0, 0)][DBLP]
    CSFW, 1995, pp:98-107 [Conf]
  12. James W. Gray III, John McLean
    Using temporal logic to specify and verify cryptographic protocols. [Citation Graph (0, 0)][DBLP]
    CSFW, 1995, pp:108-0 [Conf]
  13. Iwen E. Kang, Thomas F. Keefe
    Concurrency control for federated multilevel secure database systems. [Citation Graph (0, 0)][DBLP]
    CSFW, 1995, pp:118-135 [Conf]
  14. Simon N. Foley, Jeremy Jacob
    Specifying security for CSCW systems. [Citation Graph (0, 0)][DBLP]
    CSFW, 1995, pp:136-0 [Conf]
  15. Paul F. Syverson, James W. Gray III
    The epistemic representation of information flow security in probabilistic systems. [Citation Graph (0, 0)][DBLP]
    CSFW, 1995, pp:152-166 [Conf]
  16. William R. Bevier, Richard M. Cohen, William D. Young
    Connection policies and controlled interference. [Citation Graph (0, 0)][DBLP]
    CSFW, 1995, pp:167-176 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002