4. CSFW 1991:
Franconia,
New Hampshire,
USA
4th IEEE Computer Security Foundations Workshop - CSFW'91,
Franconia,
New Hampshire,
USA,
18-20 June 1991,
Proceedings. IEEE Computer Society,
ISBN 0-8186-2215-6
- Pierre Bieber, Frédéric Cuppens:
A Definition of Secure Dependencies Using the Logic of Security.
2-11 BibTeX
- Gilles Trouessin:
Quantitative Evaluation of Confidentiality by Entropy Calculation.
12-21 BibTeX
- Jonathan T. Trostle:
Multiple Trojan Horse Systems and Covert Channel Analysis.
22-33 BibTeX
- John Graham-Cumming, Jeff W. Sanders:
On the Refinement of Non-Interference.
35-42 BibTeX
- P. G. Allen:
A Comparison of non-Interference and Non-Deducibility using CSP.
43-54 BibTeX
- James W. Gray III:
On Information Flow Security Models.
55-60 BibTeX
- Sarbari Gupta, Virgil D. Gligor:
Towards a Theory of Penetration-Resistant Systems and its Applications.
62-78 BibTeX
- Simon N. Foley:
Separation of Duty using High Water Marks.
79-88 BibTeX
- Jeremy Jacob:
The Basic Integrity Theorem.
89-97 BibTeX
- Li Gong:
Handling Infeasible Specifications fo Cryptographic Protocols.
99-102 BibTeX
- Rajashekar Kailar, Virgil D. Gligor:
On Belief Evolution in Authentication Protocols.
103-116 BibTeX
- Thomas D. Garvey, Teresa F. Lunt, Mark E. Stickel:
Abductive and Approximate Reasoning Models for Characterizing Inference Channels.
118-126 BibTeX
- Bhavani M. Thuraisingham:
A Nonmonotonic Typed Multilevel Logic for Multilevel Secure Database/Knowledge-Based Management Systems.
127-138 BibTeX
- Ravi S. Sandhu, Roshan K. Thomas, Sushil Jajodia:
A Secure Kernelized Architecture for Multiple Object-Oriented Databases.
139-152 BibTeX
- Vijay Varadharajan:
Hook-Up Property of Information Flow Secure Nets.
154-175 BibTeX
- Glenn H. MacEwen, Janice I. Glasgow:
A Proof of Secrecy for a Network Security Model.
176-181 BibTeX
- E. John Sebes, Richard J. Feiertag:
Implicit Discretionary Access Propagation: A new Interpretation of DAC.
183-187 BibTeX
- John A. McDermid, Qi Shi:
A Formal Model of Security Dependency for Analysis and Testing of Secure Systems.
188-200 BibTeX
- Oliver Costich, Ira S. Moskowitz:
Analysis of a Storage Channel in the Two-Phase Commit Protocol.
201-208 BibTeX
- P. M. Melliar-Smith, Louise E. Moser:
Protection against Covert Storage and Timing Channels.
209-214 BibTeX
- Leonard J. LaPadula, James G. Williams:
Toward a Universal Integrity Model.
216-218 BibTeX
- Virgil D. Gligor, Rajashekar Kailar, Stuart G. Stubblebine, Li Gong:
Logics for Cryptographic Protocols - Virtues and Limitations.
219-226 BibTeX
- Catherine Meadows:
The NRL Protocol Analysis Tool: A Position Paper.
227 BibTeX
- Paul F. Syverson:
The Value of Semantics for the Analysis of Cryptographic Protocols.
228-229 BibTeX
- Yacov Yacobi:
Complexity Theoretic Analysis of Crypto-Protcols - Overview.
230-233 BibTeX
- Catherine Meadows:
Panel Discussion on the Polyinstantiation Problem: An Introduction.
234 BibTeX
- Sushil Jajodia:
Panel Discussion on the Polyinstantiation Problem: A Position Paper.
235 BibTeX
- Teresa F. Lunt:
Polyinstantiation: An Inevitable Part of a Multilevel World.
236-238 BibTeX
- Dick O'Brien:
The LDV Approach to Polyinstantiation.
239-240 BibTeX
- Simon R. Wiseman:
The Conflict Between Confidentiality and Integrity.
241-242 BibTeX
Copyright © Sat May 16 23:04:12 2009
by Michael Ley (ley@uni-trier.de)