|
Conferences in DBLP
- Daryl McCullough
Covert Channels and Degrees of Insecurity. [Citation Graph (0, 0)][DBLP] CSFW, 1988, pp:1-33 [Conf]
- Joshua D. Guttman, Mark E. Nadel
What Needs Securing. [Citation Graph (0, 0)][DBLP] CSFW, 1988, pp:34-57 [Conf]
- D. G. Weber
Quantitative Formal Security Analysis. [Citation Graph (0, 0)][DBLP] CSFW, 1988, pp:58-71 [Conf]
- Dale M. Johnson, F. Javier Thayer
Security and the Composition of Machines. [Citation Graph (0, 0)][DBLP] CSFW, 1988, pp:72-89 [Conf]
- David Rosenthal
An Approach to Increasing the Automation of the Verification of Security. [Citation Graph (0, 0)][DBLP] CSFW, 1988, pp:90-97 [Conf]
- Jeremy Jacob
A Security Framework. [Citation Graph (0, 0)][DBLP] CSFW, 1988, pp:98-111 [Conf]
- Ian Sutherland
Relating Bell-LaPadula-Style Security Models to Information Models. [Citation Graph (0, 0)][DBLP] CSFW, 1988, pp:112-123 [Conf]
- Leo Marcus, Timothy Redmond
A Model-Theoretic Approach to Specifying, Verifying and Hooking Up Security Policies. [Citation Graph (0, 0)][DBLP] CSFW, 1988, pp:127-138 [Conf]
- Janice I. Glasgow, Glenn H. MacEwen, Prakash Panangaden
Reasoning about Knowledge and Permission in Secure Distributed Systems. [Citation Graph (0, 0)][DBLP] CSFW, 1988, pp:139-146 [Conf]
- John McHugh
A Formal Definition for Information Flow in the Gypsy Expression Language. [Citation Graph (0, 0)][DBLP] CSFW, 1988, pp:147-165 [Conf]
- Bret Hartman
A General Approach to Tranquility in Information Flow Analysis. [Citation Graph (0, 0)][DBLP] CSFW, 1988, pp:166-181 [Conf]
- Benedetto L. DiVito
Derived Information Sensitivity as a Modelling Technique. [Citation Graph (0, 0)][DBLP] CSFW, 1988, pp:182-187 [Conf]
- Ravi S. Sandhu
Expressive Power of the Schematic Protection Model. [Citation Graph (0, 0)][DBLP] CSFW, 1988, pp:188-193 [Conf]
- Matt Bishop
Theft of Information in the Take-Grant Protection Model. [Citation Graph (0, 0)][DBLP] CSFW, 1988, pp:194-218 [Conf]
- Will Harkness, Paul A. Pittelli
Command Authorization as a Component of Information Integrity. [Citation Graph (0, 0)][DBLP] CSFW, 1988, pp:219-226 [Conf]
- Teresa F. Lunt
Access Control Policies: Some Unanswered Questions. [Citation Graph (0, 0)][DBLP] CSFW, 1988, pp:227-245 [Conf]
|