ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
[1990] Proceedings. The Computer Security Foundations Workshop III
Latest Publications
TOTAL DOCUMENTS
18
(FIVE YEARS 0)
H-INDEX
8
(FIVE YEARS 0)
Published By IEEE
0818620714
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
A logic for reasoning about security
[1990] Proceedings. The Computer Security Foundations Workshop III
◽
10.1109/csfw.1990.128180
◽
2002
◽
Cited By ~ 10
Author(s):
J. Glasgow
◽
G. MacEwen
◽
P. Panangaden
Download Full-text
Security models for priority buffering and interrupt handling
[1990] Proceedings. The Computer Security Foundations Workshop III
◽
10.1109/csfw.1990.128189
◽
2002
◽
Cited By ~ 5
Author(s):
D. Rosenthal
Keyword(s):
Security Models
◽
Interrupt Handling
Download Full-text
Information-flow analysis for covert-channel identification in multilevel secure operating systems
[1990] Proceedings. The Computer Security Foundations Workshop III
◽
10.1109/csfw.1990.128194
◽
2002
◽
Cited By ~ 5
Author(s):
J. He
◽
V.D. Gligor
Keyword(s):
Information Flow
◽
Operating Systems
◽
Flow Analysis
◽
Covert Channel
◽
Channel Identification
◽
Information Flow Analysis
Download Full-text
Representing partial knowledge in an algebraic security model
[1990] Proceedings. The Computer Security Foundations Workshop III
◽
10.1109/csfw.1990.128182
◽
2002
◽
Cited By ~ 8
Author(s):
C. Meadows
Keyword(s):
Security Model
◽
Partial Knowledge
Download Full-text
Petri net based modelling of information flow security requirements
[1990] Proceedings. The Computer Security Foundations Workshop III
◽
10.1109/csfw.1990.128185
◽
2002
◽
Cited By ~ 10
Author(s):
V. Varadharajan
Keyword(s):
Information Flow
◽
Petri Net
◽
Security Requirements
◽
Information Flow Security
Download Full-text
A logic of communication in hostile environment
[1990] Proceedings. The Computer Security Foundations Workshop III
◽
10.1109/csfw.1990.128181
◽
2002
◽
Cited By ~ 40
Author(s):
P. Bieber
Keyword(s):
Hostile Environment
Download Full-text
Formal semantics for logics of cryptographic protocols
[1990] Proceedings. The Computer Security Foundations Workshop III
◽
10.1109/csfw.1990.128183
◽
2002
◽
Cited By ~ 11
Author(s):
P. Syverson
Keyword(s):
Formal Semantics
◽
Cryptographic Protocols
Download Full-text
A policy model for denial of service
[1990] Proceedings. The Computer Security Foundations Workshop III
◽
10.1109/csfw.1990.128191
◽
2002
◽
Cited By ~ 13
Author(s):
E. Amoroso
Keyword(s):
Denial Of Service
◽
Policy Model
Download Full-text
Categorising non-interference
[1990] Proceedings. The Computer Security Foundations Workshop III
◽
10.1109/csfw.1990.128184
◽
2002
◽
Cited By ~ 3
Author(s):
J. Jacob
Download Full-text
Information sharing in secure systems
[1990] Proceedings. The Computer Security Foundations Workshop III
◽
10.1109/csfw.1990.128193
◽
2002
◽
Cited By ~ 2
Author(s):
J.W. Gray
Keyword(s):
Information Sharing
◽
Secure Systems
Download Full-text
Load More ...
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close