The SCEAS System
Navigation Menu

Conferences in DBLP

IEEE Computer Security Foundations Workshop (CSFW) (csfw)
1991 (conf/csfw/1991)

  1. Pierre Bieber, Frédéric Cuppens
    A Definition of Secure Dependencies Using the Logic of Security. [Citation Graph (0, 0)][DBLP]
    CSFW, 1991, pp:2-11 [Conf]
  2. Gilles Trouessin
    Quantitative Evaluation of Confidentiality by Entropy Calculation. [Citation Graph (0, 0)][DBLP]
    CSFW, 1991, pp:12-21 [Conf]
  3. Jonathan T. Trostle
    Multiple Trojan Horse Systems and Covert Channel Analysis. [Citation Graph (0, 0)][DBLP]
    CSFW, 1991, pp:22-33 [Conf]
  4. John Graham-Cumming, Jeff W. Sanders
    On the Refinement of Non-Interference. [Citation Graph (0, 0)][DBLP]
    CSFW, 1991, pp:35-42 [Conf]
  5. P. G. Allen
    A Comparison of non-Interference and Non-Deducibility using CSP. [Citation Graph (0, 0)][DBLP]
    CSFW, 1991, pp:43-54 [Conf]
  6. James W. Gray III
    On Information Flow Security Models. [Citation Graph (0, 0)][DBLP]
    CSFW, 1991, pp:55-60 [Conf]
  7. Sarbari Gupta, Virgil D. Gligor
    Towards a Theory of Penetration-Resistant Systems and its Applications. [Citation Graph (0, 0)][DBLP]
    CSFW, 1991, pp:62-78 [Conf]
  8. Simon N. Foley
    Separation of Duty using High Water Marks. [Citation Graph (0, 0)][DBLP]
    CSFW, 1991, pp:79-88 [Conf]
  9. Jeremy Jacob
    The Basic Integrity Theorem. [Citation Graph (0, 0)][DBLP]
    CSFW, 1991, pp:89-97 [Conf]
  10. Li Gong
    Handling Infeasible Specifications fo Cryptographic Protocols. [Citation Graph (0, 0)][DBLP]
    CSFW, 1991, pp:99-102 [Conf]
  11. Rajashekar Kailar, Virgil D. Gligor
    On Belief Evolution in Authentication Protocols. [Citation Graph (0, 0)][DBLP]
    CSFW, 1991, pp:103-116 [Conf]
  12. Thomas D. Garvey, Teresa F. Lunt, Mark E. Stickel
    Abductive and Approximate Reasoning Models for Characterizing Inference Channels. [Citation Graph (0, 0)][DBLP]
    CSFW, 1991, pp:118-126 [Conf]
  13. Bhavani M. Thuraisingham
    A Nonmonotonic Typed Multilevel Logic for Multilevel Secure Database/Knowledge-Based Management Systems. [Citation Graph (0, 0)][DBLP]
    CSFW, 1991, pp:127-138 [Conf]
  14. Ravi S. Sandhu, Roshan K. Thomas, Sushil Jajodia
    A Secure Kernelized Architecture for Multiple Object-Oriented Databases. [Citation Graph (0, 0)][DBLP]
    CSFW, 1991, pp:139-152 [Conf]
  15. Vijay Varadharajan
    Hook-Up Property of Information Flow Secure Nets. [Citation Graph (0, 0)][DBLP]
    CSFW, 1991, pp:154-175 [Conf]
  16. Glenn H. MacEwen, Janice I. Glasgow
    A Proof of Secrecy for a Network Security Model. [Citation Graph (0, 0)][DBLP]
    CSFW, 1991, pp:176-181 [Conf]
  17. E. John Sebes, Richard J. Feiertag
    Implicit Discretionary Access Propagation: A new Interpretation of DAC. [Citation Graph (0, 0)][DBLP]
    CSFW, 1991, pp:183-187 [Conf]
  18. John A. McDermid, Qi Shi
    A Formal Model of Security Dependency for Analysis and Testing of Secure Systems. [Citation Graph (0, 0)][DBLP]
    CSFW, 1991, pp:188-200 [Conf]
  19. Oliver Costich, Ira S. Moskowitz
    Analysis of a Storage Channel in the Two-Phase Commit Protocol. [Citation Graph (0, 0)][DBLP]
    CSFW, 1991, pp:201-208 [Conf]
  20. P. M. Melliar-Smith, Louise E. Moser
    Protection against Covert Storage and Timing Channels. [Citation Graph (0, 0)][DBLP]
    CSFW, 1991, pp:209-214 [Conf]
  21. Leonard J. LaPadula, James G. Williams
    Toward a Universal Integrity Model. [Citation Graph (0, 0)][DBLP]
    CSFW, 1991, pp:216-218 [Conf]
  22. Virgil D. Gligor, Rajashekar Kailar, Stuart G. Stubblebine, Li Gong
    Logics for Cryptographic Protocols - Virtues and Limitations. [Citation Graph (0, 0)][DBLP]
    CSFW, 1991, pp:219-226 [Conf]
  23. Catherine Meadows
    The NRL Protocol Analysis Tool: A Position Paper. [Citation Graph (0, 0)][DBLP]
    CSFW, 1991, pp:227- [Conf]
  24. Paul F. Syverson
    The Value of Semantics for the Analysis of Cryptographic Protocols. [Citation Graph (0, 0)][DBLP]
    CSFW, 1991, pp:228-229 [Conf]
  25. Yacov Yacobi
    Complexity Theoretic Analysis of Crypto-Protcols - Overview. [Citation Graph (0, 0)][DBLP]
    CSFW, 1991, pp:230-233 [Conf]
  26. Catherine Meadows
    Panel Discussion on the Polyinstantiation Problem: An Introduction. [Citation Graph (0, 0)][DBLP]
    CSFW, 1991, pp:234- [Conf]
  27. Sushil Jajodia
    Panel Discussion on the Polyinstantiation Problem: A Position Paper. [Citation Graph (0, 0)][DBLP]
    CSFW, 1991, pp:235- [Conf]
  28. Teresa F. Lunt
    Polyinstantiation: An Inevitable Part of a Multilevel World. [Citation Graph (0, 0)][DBLP]
    CSFW, 1991, pp:236-238 [Conf]
  29. Dick O'Brien
    The LDV Approach to Polyinstantiation. [Citation Graph (0, 0)][DBLP]
    CSFW, 1991, pp:239-240 [Conf]
  30. Simon R. Wiseman
    The Conflict Between Confidentiality and Integrity. [Citation Graph (0, 0)][DBLP]
    CSFW, 1991, pp:241-242 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002