default search action
Search dblp for Publications
export results for "toc:db/conf/csfw/csfw1989.bht:"
@inproceedings{DBLP:conf/csfw/FineHOT89, author = {Todd Fine and J. Thomas Haigh and Richard C. O'Brien and Dana L. Toups}, title = {Noninterference and the Unwinding for {LOCK}}, booktitle = {Second {IEEE} Computer Security Foundations Workshop - CSFW'89, Franconia, New Hampshire, USA, June 11-14, 1989, Proceedings}, pages = {22--28}, publisher = {{IEEE} Computer Society}, year = {1989}, url = {https://doi.org/10.1109/CSFW.1989.40583}, doi = {10.1109/CSFW.1989.40583}, timestamp = {Wed, 16 Oct 2019 14:14:49 +0200}, biburl = {https://dblp.org/rec/conf/csfw/FineHOT89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/GlasgowM89, author = {Janice I. Glasgow and Glenn H. MacEwen}, title = {Obligation as the Basis of Integrity Specification}, booktitle = {Second {IEEE} Computer Security Foundations Workshop - CSFW'89, Franconia, New Hampshire, USA, June 11-14, 1989, Proceedings}, pages = {64--70}, publisher = {{IEEE} Computer Society}, year = {1989}, url = {https://doi.org/10.1109/CSFW.1989.40588}, doi = {10.1109/CSFW.1989.40588}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csfw/GlasgowM89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/HerlihyW89, author = {Maurice Herlihy and Jeannette M. Wing}, title = {Specifying Security Constraints with Relaxation Lattices}, booktitle = {Second {IEEE} Computer Security Foundations Workshop - CSFW'89, Franconia, New Hampshire, USA, June 11-14, 1989, Proceedings}, pages = {47--53}, publisher = {{IEEE} Computer Society}, year = {1989}, url = {https://doi.org/10.1109/CSFW.1989.40586}, doi = {10.1109/CSFW.1989.40586}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csfw/HerlihyW89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/JohnsonT89, author = {Dale M. Johnson and F. Javier Thayer}, title = {Security Properties Consistent with the Testing Semantics for Communicating Processes}, booktitle = {Second {IEEE} Computer Security Foundations Workshop - CSFW'89, Franconia, New Hampshire, USA, June 11-14, 1989, Proceedings}, pages = {9--21}, publisher = {{IEEE} Computer Society}, year = {1989}, url = {https://doi.org/10.1109/CSFW.1989.40582}, doi = {10.1109/CSFW.1989.40582}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csfw/JohnsonT89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/Ko89, author = {Hai{-}Ping Ko}, title = {Security Properties of Ring Brackets}, booktitle = {Second {IEEE} Computer Security Foundations Workshop - CSFW'89, Franconia, New Hampshire, USA, June 11-14, 1989, Proceedings}, pages = {41--46}, publisher = {{IEEE} Computer Society}, year = {1989}, url = {https://doi.org/10.1109/CSFW.1989.40585}, doi = {10.1109/CSFW.1989.40585}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csfw/Ko89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/LandauerRB89, author = {Jaisook Landauer and Timothy Redmond and Terry Benzel}, title = {Formal Policies for Trusted Processes}, booktitle = {Second {IEEE} Computer Security Foundations Workshop - CSFW'89, Franconia, New Hampshire, USA, June 11-14, 1989, Proceedings}, pages = {31--40}, publisher = {{IEEE} Computer Society}, year = {1989}, url = {https://doi.org/10.1109/CSFW.1989.40584}, doi = {10.1109/CSFW.1989.40584}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csfw/LandauerRB89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/MarcusM89, author = {Leo Marcus and Telis Menas}, title = {Safety via State Transition Language Plus Invariants}, booktitle = {Second {IEEE} Computer Security Foundations Workshop - CSFW'89, Franconia, New Hampshire, USA, June 11-14, 1989, Proceedings}, pages = {71--77}, publisher = {{IEEE} Computer Society}, year = {1989}, url = {https://doi.org/10.1109/CSFW.1989.40589}, doi = {10.1109/CSFW.1989.40589}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csfw/MarcusM89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/Millen89, author = {Jonathan K. Millen}, title = {Finite-State Noiseless Covert Channels}, booktitle = {Second {IEEE} Computer Security Foundations Workshop - CSFW'89, Franconia, New Hampshire, USA, June 11-14, 1989, Proceedings}, pages = {81--86}, publisher = {{IEEE} Computer Society}, year = {1989}, url = {https://doi.org/10.1109/CSFW.1989.40590}, doi = {10.1109/CSFW.1989.40590}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csfw/Millen89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/Moser89, author = {Louise E. Moser}, title = {A Logic of Knowledge and Belief for Reasoning about Computer Security}, booktitle = {Second {IEEE} Computer Security Foundations Workshop - CSFW'89, Franconia, New Hampshire, USA, June 11-14, 1989, Proceedings}, pages = {47--63}, publisher = {{IEEE} Computer Society}, year = {1989}, url = {https://doi.org/10.1109/CSFW.1989.40587}, doi = {10.1109/CSFW.1989.40587}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csfw/Moser89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/NeelyFK89, author = {Richard B. Neely and James W. Freeman and M. D. Krenzin}, title = {Achieving Understandable Results in a Formal Design Verification}, booktitle = {Second {IEEE} Computer Security Foundations Workshop - CSFW'89, Franconia, New Hampshire, USA, June 11-14, 1989, Proceedings}, pages = {115--124}, publisher = {{IEEE} Computer Society}, year = {1989}, url = {https://doi.org/10.1109/CSFW.1989.40594}, doi = {10.1109/CSFW.1989.40594}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csfw/NeelyFK89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/Rosenthal89, author = {David Rosenthal}, title = {Implementing a Verification Methodology for McCullough Security}, booktitle = {Second {IEEE} Computer Security Foundations Workshop - CSFW'89, Franconia, New Hampshire, USA, June 11-14, 1989, Proceedings}, pages = {133--140}, publisher = {{IEEE} Computer Society}, year = {1989}, url = {https://doi.org/10.1109/CSFW.1989.40596}, doi = {10.1109/CSFW.1989.40596}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csfw/Rosenthal89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/SutherlandPV89, author = {Ian Sutherland and Stanley Perlo and Rammohan Varadarajan}, title = {Deducibility Security with Dynamic Level Assignment}, booktitle = {Second {IEEE} Computer Security Foundations Workshop - CSFW'89, Franconia, New Hampshire, USA, June 11-14, 1989, Proceedings}, pages = {3--8}, publisher = {{IEEE} Computer Society}, year = {1989}, url = {https://doi.org/10.1109/CSFW.1989.40581}, doi = {10.1109/CSFW.1989.40581}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csfw/SutherlandPV89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/WhitehurstL89, author = {R. Alan Whitehurst and Teresa F. Lunt}, title = {The Sea View Verification}, booktitle = {Second {IEEE} Computer Security Foundations Workshop - CSFW'89, Franconia, New Hampshire, USA, June 11-14, 1989, Proceedings}, pages = {125--132}, publisher = {{IEEE} Computer Society}, year = {1989}, url = {https://doi.org/10.1109/CSFW.1989.40595}, doi = {10.1109/CSFW.1989.40595}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csfw/WhitehurstL89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/Wittbold89, author = {J. Todd Wittbold}, title = {Controlled Signalling Systems and Covert Channels}, booktitle = {Second {IEEE} Computer Security Foundations Workshop - CSFW'89, Franconia, New Hampshire, USA, June 11-14, 1989, Proceedings}, pages = {87--104}, publisher = {{IEEE} Computer Society}, year = {1989}, url = {https://doi.org/10.1109/CSFW.1989.40591}, doi = {10.1109/CSFW.1989.40591}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csfw/Wittbold89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/Wray89, author = {John C. Wray}, title = {An Optimization for Information Flow Analysis}, booktitle = {Second {IEEE} Computer Security Foundations Workshop - CSFW'89, Franconia, New Hampshire, USA, June 11-14, 1989, Proceedings}, pages = {105--110}, publisher = {{IEEE} Computer Society}, year = {1989}, url = {https://doi.org/10.1109/CSFW.1989.40593}, doi = {10.1109/CSFW.1989.40593}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csfw/Wray89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/csfw/1989, title = {Second {IEEE} Computer Security Foundations Workshop - CSFW'89, Franconia, New Hampshire, USA, June 11-14, 1989, Proceedings}, publisher = {{IEEE} Computer Society}, year = {1989}, url = {https://ieeexplore.ieee.org/xpl/conhome/869/proceeding}, isbn = {0-8186-1955-4}, timestamp = {Wed, 16 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csfw/1989.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.