Search dblp for Publications

export results for "toc:db/conf/csfw/csfw1989.bht:"

 download as .bib file

@inproceedings{DBLP:conf/csfw/FineHOT89,
  author       = {Todd Fine and
                  J. Thomas Haigh and
                  Richard C. O'Brien and
                  Dana L. Toups},
  title        = {Noninterference and the Unwinding for {LOCK}},
  booktitle    = {Second {IEEE} Computer Security Foundations Workshop - CSFW'89, Franconia,
                  New Hampshire, USA, June 11-14, 1989, Proceedings},
  pages        = {22--28},
  publisher    = {{IEEE} Computer Society},
  year         = {1989},
  url          = {https://doi.org/10.1109/CSFW.1989.40583},
  doi          = {10.1109/CSFW.1989.40583},
  timestamp    = {Wed, 16 Oct 2019 14:14:49 +0200},
  biburl       = {https://dblp.org/rec/conf/csfw/FineHOT89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/GlasgowM89,
  author       = {Janice I. Glasgow and
                  Glenn H. MacEwen},
  title        = {Obligation as the Basis of Integrity Specification},
  booktitle    = {Second {IEEE} Computer Security Foundations Workshop - CSFW'89, Franconia,
                  New Hampshire, USA, June 11-14, 1989, Proceedings},
  pages        = {64--70},
  publisher    = {{IEEE} Computer Society},
  year         = {1989},
  url          = {https://doi.org/10.1109/CSFW.1989.40588},
  doi          = {10.1109/CSFW.1989.40588},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csfw/GlasgowM89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/HerlihyW89,
  author       = {Maurice Herlihy and
                  Jeannette M. Wing},
  title        = {Specifying Security Constraints with Relaxation Lattices},
  booktitle    = {Second {IEEE} Computer Security Foundations Workshop - CSFW'89, Franconia,
                  New Hampshire, USA, June 11-14, 1989, Proceedings},
  pages        = {47--53},
  publisher    = {{IEEE} Computer Society},
  year         = {1989},
  url          = {https://doi.org/10.1109/CSFW.1989.40586},
  doi          = {10.1109/CSFW.1989.40586},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csfw/HerlihyW89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/JohnsonT89,
  author       = {Dale M. Johnson and
                  F. Javier Thayer},
  title        = {Security Properties Consistent with the Testing Semantics for Communicating
                  Processes},
  booktitle    = {Second {IEEE} Computer Security Foundations Workshop - CSFW'89, Franconia,
                  New Hampshire, USA, June 11-14, 1989, Proceedings},
  pages        = {9--21},
  publisher    = {{IEEE} Computer Society},
  year         = {1989},
  url          = {https://doi.org/10.1109/CSFW.1989.40582},
  doi          = {10.1109/CSFW.1989.40582},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csfw/JohnsonT89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/Ko89,
  author       = {Hai{-}Ping Ko},
  title        = {Security Properties of Ring Brackets},
  booktitle    = {Second {IEEE} Computer Security Foundations Workshop - CSFW'89, Franconia,
                  New Hampshire, USA, June 11-14, 1989, Proceedings},
  pages        = {41--46},
  publisher    = {{IEEE} Computer Society},
  year         = {1989},
  url          = {https://doi.org/10.1109/CSFW.1989.40585},
  doi          = {10.1109/CSFW.1989.40585},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csfw/Ko89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/LandauerRB89,
  author       = {Jaisook Landauer and
                  Timothy Redmond and
                  Terry Benzel},
  title        = {Formal Policies for Trusted Processes},
  booktitle    = {Second {IEEE} Computer Security Foundations Workshop - CSFW'89, Franconia,
                  New Hampshire, USA, June 11-14, 1989, Proceedings},
  pages        = {31--40},
  publisher    = {{IEEE} Computer Society},
  year         = {1989},
  url          = {https://doi.org/10.1109/CSFW.1989.40584},
  doi          = {10.1109/CSFW.1989.40584},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csfw/LandauerRB89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/MarcusM89,
  author       = {Leo Marcus and
                  Telis Menas},
  title        = {Safety via State Transition Language Plus Invariants},
  booktitle    = {Second {IEEE} Computer Security Foundations Workshop - CSFW'89, Franconia,
                  New Hampshire, USA, June 11-14, 1989, Proceedings},
  pages        = {71--77},
  publisher    = {{IEEE} Computer Society},
  year         = {1989},
  url          = {https://doi.org/10.1109/CSFW.1989.40589},
  doi          = {10.1109/CSFW.1989.40589},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csfw/MarcusM89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/Millen89,
  author       = {Jonathan K. Millen},
  title        = {Finite-State Noiseless Covert Channels},
  booktitle    = {Second {IEEE} Computer Security Foundations Workshop - CSFW'89, Franconia,
                  New Hampshire, USA, June 11-14, 1989, Proceedings},
  pages        = {81--86},
  publisher    = {{IEEE} Computer Society},
  year         = {1989},
  url          = {https://doi.org/10.1109/CSFW.1989.40590},
  doi          = {10.1109/CSFW.1989.40590},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csfw/Millen89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/Moser89,
  author       = {Louise E. Moser},
  title        = {A Logic of Knowledge and Belief for Reasoning about Computer Security},
  booktitle    = {Second {IEEE} Computer Security Foundations Workshop - CSFW'89, Franconia,
                  New Hampshire, USA, June 11-14, 1989, Proceedings},
  pages        = {47--63},
  publisher    = {{IEEE} Computer Society},
  year         = {1989},
  url          = {https://doi.org/10.1109/CSFW.1989.40587},
  doi          = {10.1109/CSFW.1989.40587},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csfw/Moser89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/NeelyFK89,
  author       = {Richard B. Neely and
                  James W. Freeman and
                  M. D. Krenzin},
  title        = {Achieving Understandable Results in a Formal Design Verification},
  booktitle    = {Second {IEEE} Computer Security Foundations Workshop - CSFW'89, Franconia,
                  New Hampshire, USA, June 11-14, 1989, Proceedings},
  pages        = {115--124},
  publisher    = {{IEEE} Computer Society},
  year         = {1989},
  url          = {https://doi.org/10.1109/CSFW.1989.40594},
  doi          = {10.1109/CSFW.1989.40594},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csfw/NeelyFK89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/Rosenthal89,
  author       = {David Rosenthal},
  title        = {Implementing a Verification Methodology for McCullough Security},
  booktitle    = {Second {IEEE} Computer Security Foundations Workshop - CSFW'89, Franconia,
                  New Hampshire, USA, June 11-14, 1989, Proceedings},
  pages        = {133--140},
  publisher    = {{IEEE} Computer Society},
  year         = {1989},
  url          = {https://doi.org/10.1109/CSFW.1989.40596},
  doi          = {10.1109/CSFW.1989.40596},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csfw/Rosenthal89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/SutherlandPV89,
  author       = {Ian Sutherland and
                  Stanley Perlo and
                  Rammohan Varadarajan},
  title        = {Deducibility Security with Dynamic Level Assignment},
  booktitle    = {Second {IEEE} Computer Security Foundations Workshop - CSFW'89, Franconia,
                  New Hampshire, USA, June 11-14, 1989, Proceedings},
  pages        = {3--8},
  publisher    = {{IEEE} Computer Society},
  year         = {1989},
  url          = {https://doi.org/10.1109/CSFW.1989.40581},
  doi          = {10.1109/CSFW.1989.40581},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csfw/SutherlandPV89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/WhitehurstL89,
  author       = {R. Alan Whitehurst and
                  Teresa F. Lunt},
  title        = {The Sea View Verification},
  booktitle    = {Second {IEEE} Computer Security Foundations Workshop - CSFW'89, Franconia,
                  New Hampshire, USA, June 11-14, 1989, Proceedings},
  pages        = {125--132},
  publisher    = {{IEEE} Computer Society},
  year         = {1989},
  url          = {https://doi.org/10.1109/CSFW.1989.40595},
  doi          = {10.1109/CSFW.1989.40595},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csfw/WhitehurstL89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/Wittbold89,
  author       = {J. Todd Wittbold},
  title        = {Controlled Signalling Systems and Covert Channels},
  booktitle    = {Second {IEEE} Computer Security Foundations Workshop - CSFW'89, Franconia,
                  New Hampshire, USA, June 11-14, 1989, Proceedings},
  pages        = {87--104},
  publisher    = {{IEEE} Computer Society},
  year         = {1989},
  url          = {https://doi.org/10.1109/CSFW.1989.40591},
  doi          = {10.1109/CSFW.1989.40591},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csfw/Wittbold89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/Wray89,
  author       = {John C. Wray},
  title        = {An Optimization for Information Flow Analysis},
  booktitle    = {Second {IEEE} Computer Security Foundations Workshop - CSFW'89, Franconia,
                  New Hampshire, USA, June 11-14, 1989, Proceedings},
  pages        = {105--110},
  publisher    = {{IEEE} Computer Society},
  year         = {1989},
  url          = {https://doi.org/10.1109/CSFW.1989.40593},
  doi          = {10.1109/CSFW.1989.40593},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csfw/Wray89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/csfw/1989,
  title        = {Second {IEEE} Computer Security Foundations Workshop - CSFW'89, Franconia,
                  New Hampshire, USA, June 11-14, 1989, Proceedings},
  publisher    = {{IEEE} Computer Society},
  year         = {1989},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/869/proceeding},
  isbn         = {0-8186-1955-4},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csfw/1989.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}