|
Conferences in DBLP
- Ian Sutherland, Stanley Perlo, Rammohan Varadarajan
Deducibility Security with Dynamic Level Assignment. [Citation Graph (0, 0)][DBLP] CSFW, 1989, pp:3-8 [Conf]
- Dale M. Johnson, F. Javier Thayer
Security Properties Consistent with the Testing Semantics for Communicating Processes. [Citation Graph (0, 0)][DBLP] CSFW, 1989, pp:9-21 [Conf]
- Todd Fine, J. Thomas Haigh, Richard C. O'Brien, Dana L. Toups
Noninterference and the Unwinding for LOCK. [Citation Graph (0, 0)][DBLP] CSFW, 1989, pp:22-28 [Conf]
- Jaisook Landauer, Timothy Redmond, T. Benzel
Formal Policies for Trusted Processes. [Citation Graph (0, 0)][DBLP] CSFW, 1989, pp:31-40 [Conf]
- Hai-Ping Ko
Security Properties of Ring Brackets. [Citation Graph (0, 0)][DBLP] CSFW, 1989, pp:41-46 [Conf]
- Louise E. Moser
A Logic of Knowledge and Belief for Reasoning about Computer Security. [Citation Graph (0, 0)][DBLP] CSFW, 1989, pp:47-63 [Conf]
- Maurice Herlihy, Jeannette M. Wing
Specifying Security Constraints with Relaxation Lattices. [Citation Graph (0, 0)][DBLP] CSFW, 1989, pp:47-53 [Conf]
- Janice I. Glasgow, Glenn H. MacEwen
Obligation as the Basis of Integrity Specification. [Citation Graph (0, 0)][DBLP] CSFW, 1989, pp:64-70 [Conf]
- Leo Marcus, Telis Menas
Safety via State Transition Language Plus Invariants. [Citation Graph (0, 0)][DBLP] CSFW, 1989, pp:71-77 [Conf]
- Jonathan K. Millen
Finite-State Noiseless Covert Channels. [Citation Graph (0, 0)][DBLP] CSFW, 1989, pp:81-86 [Conf]
- J. Todd Wittbold
Controlled Signalling Systems and Covert Channels. [Citation Graph (0, 0)][DBLP] CSFW, 1989, pp:87-104 [Conf]
- J. C. Wray
An Optimization for Information Flow Analysis. [Citation Graph (0, 0)][DBLP] CSFW, 1989, pp:105-110 [Conf]
- Richard B. Neely, J. W. Freeman, M. D. Krenzin
Achieving Understandable Results in a Formal Design Verification. [Citation Graph (0, 0)][DBLP] CSFW, 1989, pp:115-124 [Conf]
- R. Alan Whitehurst, Teresa F. Lunt
The Sea View Verification. [Citation Graph (0, 0)][DBLP] CSFW, 1989, pp:125-132 [Conf]
- David Rosenthal
Implementing a Verification Methodology for McCullough Security. [Citation Graph (0, 0)][DBLP] CSFW, 1989, pp:133-140 [Conf]
|