ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
[1993] Proceedings Computer Security Foundations Workshop VI
Latest Publications
TOTAL DOCUMENTS
14
(FIVE YEARS 0)
H-INDEX
6
(FIVE YEARS 0)
Published By IEEE Comput. Soc. Press
0818639504
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
The concurrency control and recovery problem for multilevel update transactions in MLS systems
[1993] Proceedings Computer Security Foundations Workshop VI
◽
10.1109/csfw.1993.246642
◽
2002
◽
Cited By ~ 2
Author(s):
A.G. Mathur
◽
T.F. Keefe
Keyword(s):
Concurrency Control
◽
Recovery Problem
Download Full-text
Information flow control in a parallel language framework
[1993] Proceedings Computer Security Foundations Workshop VI
◽
10.1109/csfw.1993.246640
◽
2002
◽
Cited By ~ 6
Author(s):
J.-P. Banatre
◽
C. Bryce
Keyword(s):
Flow Control
◽
Information Flow
◽
Information Flow Control
◽
Parallel Language
Download Full-text
A logical formalization of secrecy
[1993] Proceedings Computer Security Foundations Workshop VI
◽
10.1109/csfw.1993.246639
◽
2002
◽
Cited By ~ 1
Author(s):
F. Cuppens
Keyword(s):
Logical Formalization
Download Full-text
A Petri net representation of the Take-Grant model
[1993] Proceedings Computer Security Foundations Workshop VI
◽
10.1109/csfw.1993.246636
◽
2002
◽
Cited By ~ 1
Author(s):
D. Marc
Keyword(s):
Petri Net
Download Full-text
A lattice of information
[1993] Proceedings Computer Security Foundations Workshop VI
◽
10.1109/csfw.1993.246638
◽
2002
◽
Cited By ~ 21
Author(s):
J. Landauer
◽
T. Redmond
Download Full-text
Automated support for external consistency
[1993] Proceedings Computer Security Foundations Workshop VI
◽
10.1109/csfw.1993.246637
◽
2002
◽
Author(s):
J.G. Williams
◽
L.J. La Padula
Keyword(s):
External Consistency
◽
Automated Support
Download Full-text
Abstract machines for communication security
[1993] Proceedings Computer Security Foundations Workshop VI
◽
10.1109/csfw.1993.246632
◽
2002
◽
Cited By ~ 7
Author(s):
P. Bieber
◽
N. Boulahia-Cuppens
◽
T. Lehmann
◽
E. van Wickeren
Keyword(s):
Communication Security
◽
Abstract Machines
Download Full-text
Variations on the themes of message freshness and replay-or the difficulty in devising formal methods to analyze cryptographic protocols
[1993] Proceedings Computer Security Foundations Workshop VI
◽
10.1109/csfw.1993.246633
◽
2002
◽
Cited By ~ 25
Author(s):
L. Gong
Keyword(s):
Formal Methods
◽
Cryptographic Protocols
Download Full-text
Towards formal analysis of security protocols
[1993] Proceedings Computer Security Foundations Workshop VI
◽
10.1109/csfw.1993.246631
◽
2002
◽
Cited By ~ 35
Author(s):
W. Mao
◽
C. Boyd
Keyword(s):
Formal Analysis
◽
Security Protocols
Download Full-text
Modeling restrictive processes that involve blocking requests
[1993] Proceedings Computer Security Foundations Workshop VI
◽
10.1109/csfw.1993.246641
◽
2002
◽
Author(s):
D. Rosenthal
Download Full-text
Load More ...
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close