ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
[1992] Proceedings The Computer Security Foundations Workshop V
Latest Publications
TOTAL DOCUMENTS
17
(FIVE YEARS 0)
H-INDEX
3
(FIVE YEARS 0)
Published By IEEE Comput. Soc. Press
0818628502
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
Partial belief and probabilistic reasoning in the analysis of secure protocols
[1992] Proceedings The Computer Security Foundations Workshop V
◽
10.1109/csfw.1992.236785
◽
2003
◽
Cited By ~ 8
Author(s):
E.A. Campbell
◽
R. Safavi-Naini
◽
P.A. Pleasants
Keyword(s):
Probabilistic Reasoning
◽
Partial Belief
◽
Secure Protocols
Download Full-text
Foundations of intrusion detection (computer security)
[1992] Proceedings The Computer Security Foundations Workshop V
◽
10.1109/csfw.1992.236783
◽
2003
◽
Cited By ~ 9
Author(s):
P. Helman
◽
G. Liepins
◽
W. Richards
Keyword(s):
Intrusion Detection
◽
Computer Security
Download Full-text
An algebraic approach to non-interference (computer security)
[1992] Proceedings The Computer Security Foundations Workshop V
◽
10.1109/csfw.1992.236789
◽
2003
◽
Cited By ~ 1
Author(s):
S. Pinsky
Keyword(s):
Computer Security
◽
Algebraic Approach
Download Full-text
An analysis of some delegation protocols for distributed systems
[1992] Proceedings The Computer Security Foundations Workshop V
◽
10.1109/csfw.1992.236784
◽
2003
◽
Cited By ~ 3
Author(s):
C. Calvelli
◽
V. Varadharajan
Keyword(s):
Distributed Systems
Download Full-text
The expressive power of multi-parent creation in monotonic access control models
[1992] Proceedings The Computer Security Foundations Workshop V
◽
10.1109/csfw.1992.236780
◽
2003
◽
Cited By ~ 2
Author(s):
P. Ammann
◽
R. Lipton
◽
R.S. Sandhu
Keyword(s):
Access Control
◽
Expressive Power
◽
Access Control Models
◽
Control Models
Download Full-text
Causal security (computer systems)
[1992] Proceedings The Computer Security Foundations Workshop V
◽
10.1109/csfw.1992.236788
◽
2003
◽
Author(s):
M. Mowbray
Keyword(s):
Computer Systems
Download Full-text
A classical automata approach to noninterference type problems
[1992] Proceedings The Computer Security Foundations Workshop V
◽
10.1109/csfw.1992.236792
◽
2003
◽
Cited By ~ 4
Author(s):
I.S. Moskowitz
◽
O.L. Costich
Download Full-text
A nonmonotonic typed multilevel logic for multilevel secure data/knowledge base management systems. II
[1992] Proceedings The Computer Security Foundations Workshop V
◽
10.1109/csfw.1992.236781
◽
2003
◽
Cited By ~ 2
Author(s):
B. Thuraisingham
Keyword(s):
Knowledge Base
◽
Management Systems
◽
Secure Data
◽
Base Management
◽
Knowledge Base Management Systems
◽
Knowledge Base Management
Download Full-text
On requirements and security in a CCIS
[1992] Proceedings The Computer Security Foundations Workshop V
◽
10.1109/csfw.1992.236782
◽
2003
◽
Cited By ~ 2
Author(s):
C. O'Halloran
Download Full-text
Realisation of the Bell-LaPadula security policy in an OSI-distributed system using asymmetric and symmetric cryptographic algorithms
[1992] Proceedings The Computer Security Foundations Workshop V
◽
10.1109/csfw.1992.236778
◽
2003
◽
Cited By ~ 1
Author(s):
J. Verschuren
◽
R. Govaerts
◽
J. Vandewalle
Keyword(s):
Distributed System
◽
Security Policy
◽
Cryptographic Algorithms
Download Full-text
Load More ...
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close