The SCEAS System
Navigation Menu

Conferences in DBLP

IEEE Computer Security Foundations Workshop (CSFW) (csfw)
1988 (conf/csfw/1988)

  1. Daryl McCullough
    Covert Channels and Degrees of Insecurity. [Citation Graph (0, 0)][DBLP]
    CSFW, 1988, pp:1-33 [Conf]
  2. Joshua D. Guttman, Mark E. Nadel
    What Needs Securing. [Citation Graph (0, 0)][DBLP]
    CSFW, 1988, pp:34-57 [Conf]
  3. D. G. Weber
    Quantitative Formal Security Analysis. [Citation Graph (0, 0)][DBLP]
    CSFW, 1988, pp:58-71 [Conf]
  4. Dale M. Johnson, F. Javier Thayer
    Security and the Composition of Machines. [Citation Graph (0, 0)][DBLP]
    CSFW, 1988, pp:72-89 [Conf]
  5. David Rosenthal
    An Approach to Increasing the Automation of the Verification of Security. [Citation Graph (0, 0)][DBLP]
    CSFW, 1988, pp:90-97 [Conf]
  6. Jeremy Jacob
    A Security Framework. [Citation Graph (0, 0)][DBLP]
    CSFW, 1988, pp:98-111 [Conf]
  7. Ian Sutherland
    Relating Bell-LaPadula-Style Security Models to Information Models. [Citation Graph (0, 0)][DBLP]
    CSFW, 1988, pp:112-123 [Conf]
  8. Leo Marcus, Timothy Redmond
    A Model-Theoretic Approach to Specifying, Verifying and Hooking Up Security Policies. [Citation Graph (0, 0)][DBLP]
    CSFW, 1988, pp:127-138 [Conf]
  9. Janice I. Glasgow, Glenn H. MacEwen, Prakash Panangaden
    Reasoning about Knowledge and Permission in Secure Distributed Systems. [Citation Graph (0, 0)][DBLP]
    CSFW, 1988, pp:139-146 [Conf]
  10. John McHugh
    A Formal Definition for Information Flow in the Gypsy Expression Language. [Citation Graph (0, 0)][DBLP]
    CSFW, 1988, pp:147-165 [Conf]
  11. Bret Hartman
    A General Approach to Tranquility in Information Flow Analysis. [Citation Graph (0, 0)][DBLP]
    CSFW, 1988, pp:166-181 [Conf]
  12. Benedetto L. DiVito
    Derived Information Sensitivity as a Modelling Technique. [Citation Graph (0, 0)][DBLP]
    CSFW, 1988, pp:182-187 [Conf]
  13. Ravi S. Sandhu
    Expressive Power of the Schematic Protection Model. [Citation Graph (0, 0)][DBLP]
    CSFW, 1988, pp:188-193 [Conf]
  14. Matt Bishop
    Theft of Information in the Take-Grant Protection Model. [Citation Graph (0, 0)][DBLP]
    CSFW, 1988, pp:194-218 [Conf]
  15. Will Harkness, Paul A. Pittelli
    Command Authorization as a Component of Information Integrity. [Citation Graph (0, 0)][DBLP]
    CSFW, 1988, pp:219-226 [Conf]
  16. Teresa F. Lunt
    Access Control Policies: Some Unanswered Questions. [Citation Graph (0, 0)][DBLP]
    CSFW, 1988, pp:227-245 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002