default search action
7th CSFW 1994: Franconia, New Hampshire, USA
- Seventh IEEE Computer Security Foundations Workshop - CSFW'94, Franconia, New Hampshire, USA, June 14-16, 1994, Proceedings. IEEE Computer Society 1994, ISBN 0-8186-6230-1
Non-Interference and Composability
- Jonathan K. Millen:
Unwinding Forward Correctability. 2-10 - William D. Young, William R. Bevier:
A State-Based Approach to Non-Interference. 11-21 - George W. Dinolt, Lee A. Benzinger, Mark Yatabe:
Combining Components and Policies. 22-33
Formal Methods and Semantics
- Carol Muehrcke:
Formal Methods for the Informal World. 36-46 - Adrian Spalka:
Formal Semantics of Rights and Confidentiality in Definite Deductive Databases. 47-58
Model(l)ing
- Oliver Costich, John McLean, John P. McDermott:
Confidentiality in a Replicated Architecture Trusted Database System: A Formal Model. 60-65 - Ravi S. Sandhu, Roshan K. Thomas:
Conceptual Foundations for a Model of Task-based Authorizations. 66-79
Panel on "The General Write-Up Problem"
Cryptographic Protocol Analysis
- Catherine Meadows:
A Model of Computation for the NRL Protocol Analyzer. 84-89 - Volker Kessler, Gabriele Wedel:
AUTLOG - An Advanced Logic of Authentication. 90-99 - Aviel D. Rubin, Peter Honeyman:
Nonmonotonic Cryptographic Protocols. 100-116
Security Policies
- Ramesh V. Peri, William A. Wulf:
Formal Specification of Information Flow Security Policies and Their Enforcement in Security Critical Systems. 118-125 - Riccardo Focardi, Roberto Gorrieri:
A Taxonomy of Security Properties for CCS. 126-136
Access Control
- Ravi S. Sandhu, Paul Ammann:
One-Representative Safety Analysis in the Non-Monotonic Transform Model. 139-149 - Simon N. Foley:
Reasoning about Confidentiality Requirements. 150-160
Panel on "Reconsidering the Role of the Reference Monitor"
- Daniel F. Sterne, Glenn S. Benson, Homayoon Tajalli:
Redrawing the Security Perimeter of a Trusted System. 162-174 - Daniel F. Sterne:
Panel: Reconsidering the Role fo the Reference Monitor. 175-176
Protocol Security
- Wenbo Mao, Colin Boyd:
Development of Authentication Protocols: Some Misconceptions and a New Approach. 178-186 - Paul F. Syverson:
A Taxonomy of Replay Attacks. 187-191 - Ulf Carlsen:
Cryptographic Protocols Flaws. 192-200
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.