The SCEAS System
Navigation Menu

Conferences in DBLP

IEEE Computer Security Foundations Workshop (CSFW) (csfw)
1993 (conf/csfw/1993)

  1. James W. Gray III
    On Analyzing the Bus-Contention Channel Under Fuzzy Time. [Citation Graph (0, 0)][DBLP]
    CSFW, 1993, pp:3-9 [Conf]
  2. Amit G. Mathur, Thomas F. Keefe
    The Concurrency Control and Recovery Problem for Multilevel Update Transactions in MLS System. [Citation Graph (0, 0)][DBLP]
    CSFW, 1993, pp:10-23 [Conf]
  3. David Rosenthal
    Modeling Restrictive Processes that Involve Blocking Requests. [Citation Graph (0, 0)][DBLP]
    CSFW, 1993, pp:27-38 [Conf]
  4. Jean-Pierre Banâtre, Ciarán Bryce
    Information Flow Control in a Parallel Language Framework. [Citation Graph (0, 0)][DBLP]
    CSFW, 1993, pp:39-52 [Conf]
  5. Frédéric Cuppens
    A Logical Formalization of Secrecy. [Citation Graph (0, 0)][DBLP]
    CSFW, 1993, pp:53-62 [Conf]
  6. Jaisook Landauer, Timothy Redmond
    A Lattice of Information. [Citation Graph (0, 0)][DBLP]
    CSFW, 1993, pp:65-70 [Conf]
  7. James G. Williams, Leonard J. LaPadula
    Automated Support for External Consistency. [Citation Graph (0, 0)][DBLP]
    CSFW, 1993, pp:71-81 [Conf]
  8. Mary Ellen Zurko
    Panel: What are the Foundations of Computer Security? [Citation Graph (0, 0)][DBLP]
    CSFW, 1993, pp:85-95 [Conf]
  9. Marc Dacier
    A Petri Net Representation of the Take-Grant Model. [Citation Graph (0, 0)][DBLP]
    CSFW, 1993, pp:99-108 [Conf]
  10. Ravi S. Sandhu, Srinivas Ganta
    On Testing for Absence of Rights in Access Control Models. [Citation Graph (0, 0)][DBLP]
    CSFW, 1993, pp:109-118 [Conf]
  11. Gustavus J. Simmons
    Invited talk: An Introductions to the Mathematics of Trust in Security Protocols. [Citation Graph (0, 0)][DBLP]
    CSFW, 1993, pp:121-127 [Conf]
  12. Li Gong
    A Variation on the Themes of Message Freshness and Replay or, the Difficulty in Devising Formal Methods to Analyze Cryptographic Protocols. [Citation Graph (0, 0)][DBLP]
    CSFW, 1993, pp:131-136 [Conf]
  13. Pierre Bieber, Nora Boulahia-Cuppens, T. Lehmann, E. van Wickeren
    Abstract Machines for Communication Security. [Citation Graph (0, 0)][DBLP]
    CSFW, 1993, pp:137-146 [Conf]
  14. Wenbo Mao, Colin Boyd
    Towards Formal Analysis of Security Protocols. [Citation Graph (0, 0)][DBLP]
    CSFW, 1993, pp:147-158 [Conf]
  15. Paul F. Syverson
    Panel: Cryptographic Protocol Models and Requirements. [Citation Graph (0, 0)][DBLP]
    CSFW, 1993, pp:161- [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002