|
Conferences in DBLP
- Jonathan K. Millen
Unwinding Forward Correctability. [Citation Graph (0, 0)][DBLP] CSFW, 1994, pp:2-10 [Conf]
- William D. Young, William R. Bevier
A State-Based Approach to Non-Interference. [Citation Graph (0, 0)][DBLP] CSFW, 1994, pp:11-21 [Conf]
- George W. Dinolt, Lee Benzinger, Mark Yatabe
Combining Components and Policies. [Citation Graph (0, 0)][DBLP] CSFW, 1994, pp:22-33 [Conf]
- Carol Muehrcke
Formal Methods for the Informal World. [Citation Graph (0, 0)][DBLP] CSFW, 1994, pp:36-46 [Conf]
- Adrian Spalka
Formal Semantics of Rights and Confidentiality in Definite Deductive Databases [Citation Graph (0, 0)][DBLP] CSFW, 1994, pp:47-58 [Conf]
- Oliver Costich, John McLean, John P. McDermott
Confidentiality in a Replicated Architecture Trusted Database System: A Formal Model. [Citation Graph (0, 0)][DBLP] CSFW, 1994, pp:60-65 [Conf]
- Ravi S. Sandhu, Roshan K. Thomas
Conceptual Foundations for a Model of Task-based Authorizations. [Citation Graph (0, 0)][DBLP] CSFW, 1994, pp:66-79 [Conf]
- Catherine Meadows
A Model of Computation for the NRL Protocol Analyzer. [Citation Graph (0, 0)][DBLP] CSFW, 1994, pp:84-89 [Conf]
- Volker Kessler, Gabriele Wedel
AUTLOG - An Advanced Logic of Authentication. [Citation Graph (0, 0)][DBLP] CSFW, 1994, pp:90-99 [Conf]
- Aviel D. Rubin, Peter Honeyman
Nonmonotonic Cryptographic Protocols. [Citation Graph (0, 0)][DBLP] CSFW, 1994, pp:100-116 [Conf]
- Ramesh V. Peri, William A. Wulf
Formal Specification of Information Flow Security Policies and Their Enforcement in Security Critical Systems. [Citation Graph (0, 0)][DBLP] CSFW, 1994, pp:118-125 [Conf]
- Riccardo Focardi, Roberto Gorrieri
A Taxonomy of Security Properties for CCS. [Citation Graph (0, 0)][DBLP] CSFW, 1994, pp:126-136 [Conf]
- Ravi S. Sandhu, Paul Ammann
One-Representative Safety Analysis in the Non-Monotonic Transform Model. [Citation Graph (0, 0)][DBLP] CSFW, 1994, pp:139-149 [Conf]
- Simon N. Foley
Reasoning about Confidentiality Requirements. [Citation Graph (0, 0)][DBLP] CSFW, 1994, pp:150-160 [Conf]
- Daniel F. Sterne, Glenn S. Benson, Homayoon Tajalli
Redrawing the Security Perimeter of a Trusted System. [Citation Graph (0, 0)][DBLP] CSFW, 1994, pp:162-174 [Conf]
- Daniel F. Sterne
Panel: Reconsidering the Role fo the Reference Monitor. [Citation Graph (0, 0)][DBLP] CSFW, 1994, pp:175-176 [Conf]
- Wenbo Mao, Colin Boyd
Development of Authentication Protocols: Some Misconceptions and a New Approach. [Citation Graph (0, 0)][DBLP] CSFW, 1994, pp:178-186 [Conf]
- Paul F. Syverson
A Taxonomy of Replay Attacks. [Citation Graph (0, 0)][DBLP] CSFW, 1994, pp:187-191 [Conf]
- Ulf Carlsen
Cryptographic Protocols Flaws. [Citation Graph (0, 0)][DBLP] CSFW, 1994, pp:192-200 [Conf]
|