


default search action
1st CSFW 1988: Franconia, New Hampshire, USA
- First IEEE Computer Security Foundations Workshop - CSFW'88, Franconia, New Hampshire, USA, June 12-15, 1988, Proceedings. MITRE Corporation Press 1988

- Daryl McCullough:

Covert Channels and Degrees of Insecurity. CSFW 1988: 1-33 - Joshua D. Guttman, Mark E. Nadel:

What Needs Securing. CSFW 1988: 34-57 - D. G. Weber:

Quantitative Formal Security Analysis. CSFW 1988: 58-71 - Dale M. Johnson, F. Javier Thayer:

Security and the Composition of Machines. CSFW 1988: 72-89 - David Rosenthal:

An Approach to Increasing the Automation of the Verification of Security. CSFW 1988: 90-97 - Jeremy Jacob:

A Security Framework. CSFW 1988: 98-111 - Ian Sutherland:

Relating Bell-LaPadula-Style Security Models to Information Models. CSFW 1988: 112-123 - Leo Marcus, Timothy Redmond:

A Model-Theoretic Approach to Specifying, Verifying and Hooking Up Security Policies. CSFW 1988: 127-138 - Janice I. Glasgow, Glenn H. MacEwen, Prakash Panangaden:

Reasoning about Knowledge and Permission in Secure Distributed Systems. CSFW 1988: 139-146 - John McHugh:

A Formal Definition for Information Flow in the Gypsy Expression Language. CSFW 1988: 147-165 - Bret Hartman:

A General Approach to Tranquility in Information Flow Analysis. CSFW 1988: 166-181 - Benedetto L. DiVito:

Derived Information Sensitivity as a Modelling Technique. CSFW 1988: 182-187 - Ravi S. Sandhu:

Expressive Power of the Schematic Protection Model. CSFW 1988: 188-193 - Matt Bishop:

Theft of Information in the Take-Grant Protection Model. CSFW 1988: 194-218 - Will Harkness, Paul A. Pittelli:

Command Authorization as a Component of Information Integrity. CSFW 1988: 219-226 - Teresa F. Lunt:

Access Control Policies: Some Unanswered Questions. CSFW 1988: 227-245

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














