-
1
-
-
85031933412
-
"Composing specifications,"
-
J. W. de Bakker, W. P. de Roever, and G. Rosenberg, eds., Lecture Notes in Computer Science, vol. 430. Springer-Verlag, 1990.
-
M. Abadi and L. Lamport, "Composing specifications," Stepwise Refinement of Distributed Systems, J. W. de Bakker, W. P. de Roever, and G. Rosenberg, eds., Lecture Notes in Computer Science, vol. 430. Springer-Verlag, 1990.
-
Stepwise Refinement of Distributed Systems
-
-
Abadi, M.1
Lamport, L.2
-
2
-
-
0022420723
-
"Defining liveness,"
-
vol. 21, no. 4, pp. 181-185, Oct. 1985.
-
B. Alpern and F. Schneider, "Defining liveness," Information Processing Letters, vol. 21, no. 4, pp. 181-185, Oct. 1985.
-
Information Processing Letters
-
-
Alpern, B.1
Schneider, F.2
-
3
-
-
0020299523
-
"Security policies and security models,"
-
1982 IEEE Symp. Research in Security and Privacy. IEEE Press, 1982.
-
J. Goguen and J. Meseguer, "Security policies and security models," Proc. 1982 IEEE Symp. Research in Security and Privacy. IEEE Press, 1982.
-
Proc.
-
-
Goguen, J.1
Meseguer, J.2
-
5
-
-
84974759639
-
"Toward a mathematical foundation for information flow security,"
-
vol. 1, nos. 3-4, pp. 255-294,1992.
-
J. Gray, "Toward a mathematical foundation for information flow security," J. Computer Security, vol. 1, nos. 3-4, pp. 255-294,1992.
-
J. Computer Security
-
-
Gray, J.1
-
6
-
-
0024663847
-
"On the derivation of secure components,"
-
1989 IEEE Symp. Research in Security and Privacy. IEEE Press, 1989.
-
J. Jacob, "On the derivation of secure components," Proc. 1989 IEEE Symp. Research in Security and Privacy. IEEE Press, 1989.
-
Proc.
-
-
Jacob, J.1
-
7
-
-
33747339533
-
"Kolmogorov complexity and its applications,"
-
M. Li and P. Vitänyi, "Kolmogorov complexity and its applications," Handbook of Theoretical Computer Science, vol. A: Algorithms and Complexity,}. van Leeuwen, ed. MIT Press/Elsevier, 1990.
-
Handbook of Theoretical Computer Science, Vol. A: Algorithms and Complexity,}. Van Leeuwen, Ed. MIT Press/Elsevier, 1990.
-
-
Li, M.1
Vitänyi, P.2
-
8
-
-
33747349821
-
"Specifications for multi-level security and a hook-up property,"
-
1387 IEEE Symp. Research in Security and Privacy. IEEE Pre'ss, 1987.
-
D. McCullough, "Specifications for multi-level security and a hook-up property," Proc. 1387 IEEE Symp. Research in Security and Privacy. IEEE Pre'ss, 1987.
-
Proc.
-
-
McCullough, D.1
-
9
-
-
0025211594
-
"The specification and modeling of computer security,"
-
vol. 23, no. 1, pp. 9-16,1990.
-
J. McLean, "The specification and modeling of computer security," Computer, vol. 23, no. 1, pp. 9-16,1990.
-
Computer
-
-
McLean, J.1
-
10
-
-
0025139568
-
"Security models and information flow,"
-
1990 IEEE Symp. Research in Security and Privacy. IEEE Press, 1990.
-
J. McLean, "Security models and information flow," Proc. 1990 IEEE Symp. Research in Security and Privacy. IEEE Press, 1990.
-
Proc.
-
-
McLean, J.1
-
11
-
-
84974747891
-
"Proving noninterference and functional correctness using traces,"
-
vol. 1, no. 1, pp. 37-57,1992.
-
[II] J. McLean, "Proving noninterference and functional correctness using traces," J. Computer Security, vol. 1, no. 1, pp. 37-57,1992.
-
J. Computer Security
-
-
McLean, J.1
-
12
-
-
33747330969
-
"Models of confidentiality: Past, present, and future,"
-
J. McLean, "Models of confidentiality: Past, present, and future," Proc. Computer Security Foundations Workshop VI. IEEE Press, 1993.
-
Proc. Computer Security Foundations Workshop VI. IEEE Press, 1993.
-
-
McLean, J.1
-
13
-
-
0028058408
-
"A general theory of composition for trace sets closed under selective interleaving functions,"
-
1994 IEEE Symp. Research in Security and Privacy. IEEE Press, 1994.
-
J. McLean, "A general theory of composition for trace sets closed under selective interleaving functions," Proc. 1994 IEEE Symp. Research in Security and Privacy. IEEE Press, 1994.
-
Proc.
-
-
McLean, J.1
-
14
-
-
33747373915
-
"Security Models,"
-
J. McLean, "Security Models," Encyclopedia of Software Engineering , J. Marciniak, ed. John Wiley & Sons, 1994.
-
Encyclopedia of Software Engineering , J. Marciniak, Ed. John Wiley & Sons, 1994.
-
-
McLean, J.1
-
15
-
-
33747342753
-
"Using traces based on procedure calls to reason about composability,"
-
1992 IEEE Symp. Research in Security and Privacy. IEEE Press, 1992.
-
C. Meadows, "Using traces based on procedure calls to reason about composability," Proc. 1992 IEEE Symp. Research in Security and Privacy. IEEE Press, 1992.
-
Proc.
-
-
Meadows, C.1
-
17
-
-
0006010789
-
"A calculus of information flow,"
-
C. O'Halloran, "A calculus of information flow," Proc. European Symp. Research in Computer Security, Toulouse, France, 1990.
-
Proc. European Symp. Research in Computer Security, Toulouse, France, 1990.
-
-
O'Halloran, C.1
-
18
-
-
0025135716
-
"Information flow in nondeterministic systems,"
-
1990 IEEE Symp. Research in Security and Priva. J.'IEEE Press, 1990.
-
J.T. Wittbold and D. Johnson, "Information flow in nondeterministic systems," Proc. 1990 IEEE Symp. Research in Security and Priva. J.'IEEE Press, 1990.
-
Proc.
-
-
Wittbold, J.T.1
Johnson, D.2
-
20
-
-
33747334980
-
"A model of information,"
-
1 Computer Security ConJ., Gaithersburg, Md., 1986.
-
I. Sutherland, "A model of information," Proc. Ninth Nat'1 Computer Security ConJ., Gaithersburg, Md., 1986.
-
Proc. Ninth Nat'
-
-
Sutherland, I.1
|