


default search action
5th CSFW 1992: Franconia, New Hampshire, USA
- 5th IEEE Computer Security Foundations Workshop - CSFW'92, Franconia, New Hampshire, USA, June 16-18, 1992, Proceedings. IEEE Computer Society 1992, ISBN 0-8186-2850-2
- Ira S. Moskowitz, Oliver Costich:
A classical Automata Approach to Noninterference Type Problems. 2-8 - Sandra Rawlings Murphy, Stephen D. Crocker, Timothy Redmond:
Unwinding and the LOCK Proof Referees Study. 9-21 - John Graham-Cumming:
Some Laws of Non-Interference. 22-33 - Sylvan Pinsky:
An Algebraic Approach to Non-Interference. 34-47 - Catherine Meadows:
Panel: Fundamental Questions about Formal Methods. CSFW 1992: 52 - Miranda Mowbray:
Causal Security. 54-62 - Pierre Bieber, Frédéric Cuppens:
Secure Dependencies with Dynamic Level Assignments. 63-75 - Thomas D. Garvey:
Inference Working Group Kickoff: The Inference Problem for Computer Security. 78-81 - E. A. Campbell, Reihaneh Safavi-Naini, P. A. Pleasants:
Partial Belief and Probabilistic Reasoning in the Analysis of Secure Protocols. 84-91 - Claudio Calvelli, Vijay Varadharajan:
An Analysis of some Delegation Protocols for Distributed Systems. 92-110 - Joshua D. Guttman:
Panel: Use of Formal Methods in the Analysis of Cryptographic Protocols. CSFW 1992: 112 - Paul Helman, Gunar E. Liepins, Wynette Richards:
Foundations of Intrusion Detection. 114-120 - Colin O'Halloran:
On Requirements and Security in a CCIS. 121-134 - Bhavani Thuraisingham:
A Non-monotonic Typed Multilevel Logic for Multilevel Secure Data/Knowledge - II. 135-146 - Paul Ammann, Richard J. Lipton, Ravi S. Sandhu:
The Expressive Power of Multi-Parent Creation in a Monotonic Access Control Model. 148-156 - Jaisook Landauer, Timothy Redmond:
A Framework for Composition of Security Models. 157-166 - Jan Verschuren, René Govaerts, Joos Vandewalle:
Realization of the Bell-LaPadula Security Policy in an OSI-Distributed System using Asymmetric and Symmetric Cryptographic Algorithms. 168-178 - Mary Ellen Zurko:
Attribute Support for Inter-Domain Use. 179-188

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.