default search action
3rd CSFW 1990: Franconia, New Hampshire, USA
- Third IEEE Computer Security Foundations Workshop - CSFW'90, Franconia, New Hampshire, USA, June 12-14, 1990, Proceedings. IEEE Computer Society 1990, ISBN 0-8186-2071-4
- Janice I. Glasgow, Glenn H. MacEwen, Prakash Panangaden:
A Logic for Reasoning about Security. 2-13 - Pierre Bieber:
A Logic of Communication in Hostile Environments. 14-22 - Catherine Meadows:
Representing Partial Knowledge in an Algebraic Security Model. 23-31 - Paul F. Syverson:
Formal Semantics for Logics of Cryptographic Protocols. 32-41 - Jeremy Jacob:
Categorizing non-interference. 44-50 - Vijay Varadharajan:
Petri Net Based Modelling of Information Flow Security Requirements. 51-61 - Simon N. Foley:
Secure Information Flow Using Security Groups. 62-72 - Ira S. Moskowitz:
Quotient States and Probabilistic Channels. 74-83 - Jonathan K. Millen:
Hookup Security for Synchronous Machines. 84-90 - David Rosenthal:
Security Models for Priority Buffering and Interrupt Handling. 91-97 - Leonard J. LaPadula:
Formal Modeling in a Generalized Framework for Access Control. 100-109 - Edward Amoroso:
A Policy Model for Denial of Service. 110-114 - Lee Badger:
Providing a Flexible Security Override for Trusted Systems. 115-121 - James W. Gray III:
Information Sharing in Secure Systems. 128-138 - Jingsha He, Virgil D. Gligor:
Information-Flow Analysis for Covert-Channel Identification in Multilevel Secure Operating Systems. 139-149 - Sushil Jajodia, Ravi S. Sandhu:
A Formal Framework for Single Level Decomposition of Multilevel Relations. 152-158 - Ravi S. Sandhu, Sushil Jajodia, Teresa F. Lunt:
A New Polyinstantiation Integrity Constraint for Multilevel Relations. 159-165
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.