4. CSFW 1991:
Franconia,
New Hampshire,
USA
4th IEEE Computer Security Foundations Workshop - CSFW'91,
Franconia,
New Hampshire,
USA,
18-20 June 1991,
Proceedings. IEEE Computer Society,
ISBN 0-8186-2215-6
- Pierre Bieber, Frédéric Cuppens:
A Definition of Secure Dependencies Using the Logic of Security.
2-11
- Gilles Trouessin:
Quantitative Evaluation of Confidentiality by Entropy Calculation.
12-21
- Jonathan T. Trostle:
Multiple Trojan Horse Systems and Covert Channel Analysis.
22-33
- John Graham-Cumming, Jeff W. Sanders:
On the Refinement of Non-Interference.
35-42
- P. G. Allen:
A Comparison of non-Interference and Non-Deducibility using CSP.
43-54
- James W. Gray III:
On Information Flow Security Models.
55-60
- Sarbari Gupta, Virgil D. Gligor:
Towards a Theory of Penetration-Resistant Systems and its Applications.
62-78
- Simon N. Foley:
Separation of Duty using High Water Marks.
79-88
- Jeremy Jacob:
The Basic Integrity Theorem.
89-97
- Li Gong:
Handling Infeasible Specifications fo Cryptographic Protocols.
99-102
- Rajashekar Kailar, Virgil D. Gligor:
On Belief Evolution in Authentication Protocols.
103-116
- Thomas D. Garvey, Teresa F. Lunt, Mark E. Stickel:
Abductive and Approximate Reasoning Models for Characterizing Inference Channels.
118-126
- Bhavani M. Thuraisingham:
A Nonmonotonic Typed Multilevel Logic for Multilevel Secure Database/Knowledge-Based Management Systems.
127-138
- Ravi S. Sandhu, Roshan K. Thomas, Sushil Jajodia:
A Secure Kernelized Architecture for Multiple Object-Oriented Databases.
139-152
- Vijay Varadharajan:
Hook-Up Property of Information Flow Secure Nets.
154-175
- Glenn H. MacEwen, Janice I. Glasgow:
A Proof of Secrecy for a Network Security Model.
176-181
- E. John Sebes, Richard J. Feiertag:
Implicit Discretionary Access Propagation: A new Interpretation of DAC.
183-187
- John A. McDermid, Qi Shi:
A Formal Model of Security Dependency for Analysis and Testing of Secure Systems.
188-200
- Oliver Costich, Ira S. Moskowitz:
Analysis of a Storage Channel in the Two-Phase Commit Protocol.
201-208
- P. M. Melliar-Smith, Louise E. Moser:
Protection against Covert Storage and Timing Channels.
209-214
- Leonard J. LaPadula, James G. Williams:
Toward a Universal Integrity Model.
216-218
- Virgil D. Gligor, Rajashekar Kailar, Stuart G. Stubblebine, Li Gong:
Logics for Cryptographic Protocols - Virtues and Limitations.
219-226
- Catherine Meadows:
The NRL Protocol Analysis Tool: A Position Paper.
227
- Paul F. Syverson:
The Value of Semantics for the Analysis of Cryptographic Protocols.
228-229
- Yacov Yacobi:
Complexity Theoretic Analysis of Crypto-Protcols - Overview.
230-233
- Catherine Meadows:
Panel Discussion on the Polyinstantiation Problem: An Introduction.
234
- Sushil Jajodia:
Panel Discussion on the Polyinstantiation Problem: A Position Paper.
235
- Teresa F. Lunt:
Polyinstantiation: An Inevitable Part of a Multilevel World.
236-238
- Dick O'Brien:
The LDV Approach to Polyinstantiation.
239-240
- Simon R. Wiseman:
The Conflict Between Confidentiality and Integrity.
241-242
Copyright © Sun Mar 14 22:59:20 2010
by Michael Ley (ley@uni-trier.de)