The SCEAS System
Navigation Menu

Conferences in DBLP

IEEE Computer Security Foundations Workshop (CSFW) (csfw)
1989 (conf/csfw/1989)

  1. Ian Sutherland, Stanley Perlo, Rammohan Varadarajan
    Deducibility Security with Dynamic Level Assignment. [Citation Graph (0, 0)][DBLP]
    CSFW, 1989, pp:3-8 [Conf]
  2. Dale M. Johnson, F. Javier Thayer
    Security Properties Consistent with the Testing Semantics for Communicating Processes. [Citation Graph (0, 0)][DBLP]
    CSFW, 1989, pp:9-21 [Conf]
  3. Todd Fine, J. Thomas Haigh, Richard C. O'Brien, Dana L. Toups
    Noninterference and the Unwinding for LOCK. [Citation Graph (0, 0)][DBLP]
    CSFW, 1989, pp:22-28 [Conf]
  4. Jaisook Landauer, Timothy Redmond, T. Benzel
    Formal Policies for Trusted Processes. [Citation Graph (0, 0)][DBLP]
    CSFW, 1989, pp:31-40 [Conf]
  5. Hai-Ping Ko
    Security Properties of Ring Brackets. [Citation Graph (0, 0)][DBLP]
    CSFW, 1989, pp:41-46 [Conf]
  6. Louise E. Moser
    A Logic of Knowledge and Belief for Reasoning about Computer Security. [Citation Graph (0, 0)][DBLP]
    CSFW, 1989, pp:47-63 [Conf]
  7. Maurice Herlihy, Jeannette M. Wing
    Specifying Security Constraints with Relaxation Lattices. [Citation Graph (0, 0)][DBLP]
    CSFW, 1989, pp:47-53 [Conf]
  8. Janice I. Glasgow, Glenn H. MacEwen
    Obligation as the Basis of Integrity Specification. [Citation Graph (0, 0)][DBLP]
    CSFW, 1989, pp:64-70 [Conf]
  9. Leo Marcus, Telis Menas
    Safety via State Transition Language Plus Invariants. [Citation Graph (0, 0)][DBLP]
    CSFW, 1989, pp:71-77 [Conf]
  10. Jonathan K. Millen
    Finite-State Noiseless Covert Channels. [Citation Graph (0, 0)][DBLP]
    CSFW, 1989, pp:81-86 [Conf]
  11. J. Todd Wittbold
    Controlled Signalling Systems and Covert Channels. [Citation Graph (0, 0)][DBLP]
    CSFW, 1989, pp:87-104 [Conf]
  12. J. C. Wray
    An Optimization for Information Flow Analysis. [Citation Graph (0, 0)][DBLP]
    CSFW, 1989, pp:105-110 [Conf]
  13. Richard B. Neely, J. W. Freeman, M. D. Krenzin
    Achieving Understandable Results in a Formal Design Verification. [Citation Graph (0, 0)][DBLP]
    CSFW, 1989, pp:115-124 [Conf]
  14. R. Alan Whitehurst, Teresa F. Lunt
    The Sea View Verification. [Citation Graph (0, 0)][DBLP]
    CSFW, 1989, pp:125-132 [Conf]
  15. David Rosenthal
    Implementing a Verification Methodology for McCullough Security. [Citation Graph (0, 0)][DBLP]
    CSFW, 1989, pp:133-140 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002