2. CSFW 1989:
Franconia,
New Hampshire,
USA
Second IEEE Computer Security Foundations Workshop - CSFW'89,
Franconia,
New Hampshire,
USA,
11-14 June 1989,
Proceedings. IEEE Computer Society,
ISBN 0-8186-1955-4
- Ian Sutherland, Stanley Perlo, Rammohan Varadarajan:
Deducibility Security with Dynamic Level Assignment.
3-8 BibTeX
- Dale M. Johnson, F. Javier Thayer:
Security Properties Consistent with the Testing Semantics for Communicating Processes.
9-21 BibTeX
- Todd Fine, J. Thomas Haigh, Richard C. O'Brien, Dana L. Toups:
Noninterference and the Unwinding for LOCK.
22-28 BibTeX
- Jaisook Landauer, Timothy Redmond, Terry Benzel:
Formal Policies for Trusted Processes.
31-40 BibTeX
- Hai-Ping Ko:
Security Properties of Ring Brackets.
41-46 BibTeX
- Maurice Herlihy, Jeannette M. Wing:
Specifying Security Constraints with Relaxation Lattices.
47-53 BibTeX
- Louise E. Moser:
A Logic of Knowledge and Belief for Reasoning about Computer Security.
47-63 BibTeX
- Janice I. Glasgow, Glenn H. MacEwen:
Obligation as the Basis of Integrity Specification.
64-70 BibTeX
- Leo Marcus, Telis Menas:
Safety via State Transition Language Plus Invariants.
71-77 BibTeX
- Jonathan K. Millen:
Finite-State Noiseless Covert Channels.
81-86 BibTeX
- J. Todd Wittbold:
Controlled Signalling Systems and Covert Channels.
87-104 BibTeX
- J. C. Wray:
An Optimization for Information Flow Analysis.
105-110 BibTeX
- Richard B. Neely, J. W. Freeman, M. D. Krenzin:
Achieving Understandable Results in a Formal Design Verification.
115-124 BibTeX
- R. Alan Whitehurst, Teresa F. Lunt:
The Sea View Verification.
125-132 BibTeX
- David Rosenthal:
Implementing a Verification Methodology for McCullough Security.
133-140 BibTeX
Copyright © Sat May 16 23:04:12 2009
by Michael Ley (ley@uni-trier.de)