default search action
2nd CSFW 1989: Franconia, New Hampshire, USA
- Second IEEE Computer Security Foundations Workshop - CSFW'89, Franconia, New Hampshire, USA, June 11-14, 1989, Proceedings. IEEE Computer Society 1989, ISBN 0-8186-1955-4
- Ian Sutherland, Stanley Perlo, Rammohan Varadarajan:
Deducibility Security with Dynamic Level Assignment. 3-8 - Dale M. Johnson, F. Javier Thayer:
Security Properties Consistent with the Testing Semantics for Communicating Processes. 9-21 - Todd Fine, J. Thomas Haigh, Richard C. O'Brien, Dana L. Toups:
Noninterference and the Unwinding for LOCK. 22-28 - Jaisook Landauer, Timothy Redmond, Terry Benzel:
Formal Policies for Trusted Processes. 31-40 - Hai-Ping Ko:
Security Properties of Ring Brackets. 41-46 - Maurice Herlihy, Jeannette M. Wing:
Specifying Security Constraints with Relaxation Lattices. 47-53 - Louise E. Moser:
A Logic of Knowledge and Belief for Reasoning about Computer Security. 47-63 - Janice I. Glasgow, Glenn H. MacEwen:
Obligation as the Basis of Integrity Specification. 64-70 - Leo Marcus, Telis Menas:
Safety via State Transition Language Plus Invariants. 71-77 - Jonathan K. Millen:
Finite-State Noiseless Covert Channels. 81-86 - J. Todd Wittbold:
Controlled Signalling Systems and Covert Channels. 87-104 - John C. Wray:
An Optimization for Information Flow Analysis. 105-110 - Richard B. Neely, James W. Freeman, M. D. Krenzin:
Achieving Understandable Results in a Formal Design Verification. 115-124 - R. Alan Whitehurst, Teresa F. Lunt:
The Sea View Verification. 125-132 - David Rosenthal:
Implementing a Verification Methodology for McCullough Security. 133-140
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.