-
2
-
-
85037127279
-
The temporal logic of branching time
-
ACM, New York
-
BEN-ARI, M., MANNA, Z., AND PNUELI, A. The temporal logic of branching time. In 8th Annual ACM Symposium on Principles of Programming Languages, ACM, New York, 1981, 164-176.
-
(1981)
In 8th Annual ACM Symposium on Principles of Programming Languages
, pp. 164-176
-
-
BEN-ARI, M.1
MANNA, Z.2
PNUELI, A.3
-
3
-
-
0025386404
-
A logic of authentication
-
BURROWS, M., ABADI, M., AND NEEDHAM, R. A logic of authentication. ACM Trans. Comput. Syst. 8, 1 (1990), 18-36.
-
(1990)
ACM Trans. Comput. Syst.
, vol.8
, Issue.1
, pp. 18-36
-
-
BURROWS, M.1
ABADI, M.2
NEEDHAM, R.3
-
5
-
-
0003400257
-
-
Tech. Rep., MITRE Corp., Bedford, Mass.
-
BELL, D. E., AND LAPADULA, L. J. Secure computer systems: Mathematical foundations and model. Tech. Rep., MITRE Corp., Bedford, Mass., 1974.
-
(1974)
Secure computer systems: Mathematical foundations and model
-
-
BELL, D.E.1
LAPADULA, L.J.2
-
6
-
-
0004019982
-
Authentication: A practical study in belief and action
-
(Pacific Grove, Calif., 1988). ACM, New York
-
BURROWS, M., NEEDHAM, R., AND ABADI, M. Authentication: A practical study in belief and action. In Proceedings of the 2nd Conference on Theoretical Aspects of Reasoning About Knowledge (Pacific Grove, Calif., 1988). ACM, New York, 1988, 325-342.
-
(1988)
In Proceedings of the 2nd Conference on Theoretical Aspects of Reasoning About Knowledge
, pp. 325-342
-
-
BURROWS, M.1
NEEDHAM, R.2
ABADI, M.3
-
8
-
-
0023266943
-
A comparison of commercial and military computer security policies
-
(Oakland, Calif., April 1987). IEEE, New York
-
CLARK, D. D., AND WILSON, D. R. A comparison of commercial and military computer security policies. In Proceedings of IEEE Symposium on Security and Privacy (Oakland, Calif., April 1987). IEEE, New York, 1987, 184-194.
-
(1987)
In Proceedings of IEEE Symposium on Security and Privacy
, pp. 184-194
-
-
CLARK, D.D.1
WILSON, D.R.2
-
9
-
-
0016949746
-
A lattice model of secure information flow
-
(May)
-
DENNING, D. E. A lattice model of secure information flow. Commun. ACM 19, 5 (May 1976), 236-243.
-
(1976)
Commun. ACM
, vol.19
, Issue.5
, pp. 236-243
-
-
DENNING, D.E.1
-
10
-
-
18044384743
-
Sometimes” and “not never revisited
-
ACM, New York
-
EMERSON, E. A., AND HALPERN, J. Y. “Sometimes” and “not never” revisited. In 9th Annual ACM Symposium on Principles of Programming Languages. ACM, New York, 1982, 127-139.
-
(1982)
In 9th Annual ACM Symposium on Principles of Programming Languages
, pp. 127-139
-
-
EMERSON, E.A.1
HALPERN, J.Y.2
-
12
-
-
0020299523
-
Security policies and security models
-
(Oakland, Calif., April 1982). IEEE, New York
-
GOGUEN, J. A., AND MESEGUER, J. Security policies and security models. In IEEE Symposium on Security and Privacy (Oakland, Calif., April 1982). IEEE, New York, 1982, 11-20.
-
(1982)
In IEEE Symposium on Security and Privacy
, pp. 11-20
-
-
GOGUEN, J.A.1
MESEGUER, J.2
-
13
-
-
0023348314
-
The development and proof of a formal specification for a multilevel secure system
-
(May)
-
GLASGOW, J. I., AND MACEWEN, G. H. The development and proof of a formal specification for a multilevel secure system. ACM Trans. Comput. Syst. 5, 2 (May 1987), 151-184.
-
(1987)
ACM Trans. Comput. Syst.
, vol.5
, Issue.2
, pp. 151-184
-
-
GLASGOW, J.I.1
MACEWEN, G.H.2
-
14
-
-
0023826589
-
Reasoning about knowledge in multilevel secure distributed systems
-
(Oakland, Calif., 1988). IEEE, New York
-
GLASGOW, J. I., AND MACEWEN, G. H. Reasoning about knowledge in multilevel secure distributed systems. In Proceedings of the IEEE Symposium on Security and Privacy (Oakland, Calif., 1988). IEEE, New York, 1988, 122-128.
-
(1988)
In Proceedings of the IEEE Symposium on Security and Privacy
, pp. 122-128
-
-
GLASGOW, J.I.1
MACEWEN, G.H.2
-
15
-
-
84976732487
-
Obligation as the basis of integrity specification
-
(Oakland, Calif.,), IEEE, New York
-
GLASGOW, J. I., AND MACEWEN, G. H. Obligation as the basis of integrity specification. In Proceedings of the IEEE Symposium on Security and Privacy (Oakland, Calif.,), IEEE, New York, 1982-91.
-
(1982)
In Proceedings of the IEEE Symposium on Security and Privacy
-
-
GLASGOW, J.I.1
MACEWEN, G.H.2
-
17
-
-
0024916783
-
Obligation as the basis of integrity specification
-
(Franconia, N. H., June 1989). MITRE Corp.
-
GLASGOW, J. I., AND MACEWEN, G. H. Obligation as the basis of integrity specification. In Proceedings of the Computer Security Foundations Workshop (Franconia, N. H., June 1989). MITRE Corp., 1989, 64-70.
-
(1989)
In Proceedings of the Computer Security Foundations Workshop
, pp. 64-70
-
-
GLASGOW, J.I.1
MACEWEN, G.H.2
-
18
-
-
34249976000
-
An operator net model for distributed systems
-
(Sept.)
-
GLASGOW, J. I., AND MACEWEN, G. H. An operator net model for distributed systems. J. Distributed Syst. 3, 4 (Sept. 1989), 196-209.
-
(1989)
J. Distributed Syst.
, vol.3
, Issue.4
, pp. 196-209
-
-
GLASGOW, J.I.1
MACEWEN, G.H.2
-
19
-
-
0025694649
-
A logic for reasoning about security
-
(Franconia, N.H., June 1990). IEEE, New York
-
GLASGOW, J. I., AND MACEWEN, G. H. A logic for reasoning about security. In Proceedings of the Computer Security Foundations Workshop (Franconia, N.H., June 1990). IEEE, New York, 1990.
-
(1990)
In Proceedings of the Computer Security Foundations Workshop
-
-
GLASGOW, J.I.1
MACEWEN, G.H.2
-
20
-
-
66149190137
-
Reasoning about knowledge and permission in secure distributed systems
-
(Franconia, N.H.,), IEEE, New York, 1988, 139-146. Also appears in IEEE Cipher
-
GLASGOW, J. I., MACEWEN, G. H., AND PANANGADEN, P. Reasoning about knowledge and permission in secure distributed systems. In Proceedings of the Computer Security Foundations Workshop (Franconia, N.H., 1988). IEEE, New York, 1988, 139-146. Also appears in IEEE Cipher.
-
(1988)
In Proceedings of the Computer Security Foundations Workshop
-
-
GLASGOW, J.I.1
MACEWEN, G.H.2
PANANGADEN, P.3
-
21
-
-
25444458493
-
Security by permission in databases
-
Elsevier North-Holland, Amsterdam
-
GLASGOW, J. I., MACEWEN, G. H., AND PANANGADEN, P. Security by permission in databases. In Database Security II: Status and Prospects. Elsevier North-Holland, Amsterdam, 1988, 197-205.
-
(1988)
In Database Security II: Status and Prospects.
, pp. 197-205
-
-
GLASGOW, J.I.1
MACEWEN, G.H.2
PANANGADEN, P.3
-
22
-
-
0002646924
-
What needs security?
-
(Franconia, N.H., June)
-
GUTTMAN, J. D., AND NADEL, M. E. What needs security? In Proceedings of the Computer Security Foundations Workshop (Franconia, N.H., June 1988), 34-57.
-
(1988)
In Proceedings of the Computer Security Foundations Workshop
, pp. 34-57
-
-
GUTTMAN, J.D.1
NADEL, M.E.2
-
26
-
-
0024063861
-
Stating security requirements with tolerable sets
-
(Aug.)
-
JOHNSON, D. M., AND THAYER, F. J. Stating security requirements with tolerable sets. ACM Trans. Comput. Syst. 6, 3 (Aug. 1988), 284-295.
-
(1988)
ACM Trans. Comput. Syst.
, vol.6
, Issue.3
, pp. 284-295
-
-
JOHNSON, D.M.1
THAYER, F.J.2
-
27
-
-
0002446133
-
Security and the composition of machines
-
(Franconia, N.H., June)
-
JOHNSON, D. M., AND THAYER, F. J. Security and the composition of machines. In Proceedings of the Computer Security Foundations Workshop (Franconia, N.H., June 1988), 72-89.
-
(1988)
In Proceedings of the Computer Security Foundations Workshop
, pp. 72-89
-
-
JOHNSON, D.M.1
THAYER, F.J.2
-
28
-
-
0001972488
-
Semantical considerations of modal logic
-
KRIPKE, S. Semantical considerations of modal logic. Acta Philosophica Fennica 16 (1963), 83-94.
-
(1963)
Acta Philosophica Fennica
, vol.16
, pp. 83-94
-
-
KRIPKE, S.1
-
30
-
-
0019608720
-
Formal models for computer security
-
(Sept.)
-
LANDWEHR, C. E. Formal models for computer security. ACM Comput. Surv. 13, 3 (Sept. 1981), 247-278.
-
(1981)
ACM Comput. Surv.
, vol.13
, Issue.3
, pp. 247-278
-
-
LANDWEHR, C.E.1
-
31
-
-
84976652798
-
-
Tech. Rep., SRI International, Computer Science Lab., Menlo Park, Calif, Feb.
-
LUNT, T. F. ET AL. The Seaview formal security policy model. Tech. Rep., SRI International, Computer Science Lab., Menlo Park, Calif, Feb. 1989.
-
(1989)
The Seaview formal security policy model
-
-
LUNT, T.F.1
-
33
-
-
0023231848
-
Specifications for multi-level security and a hook-up property
-
(Oakland, Calif., April 1987), IEEE, New York
-
MCCULLOUGH, A. D. Specifications for multi-level security and a hook-up property. In Proceedings of IEEE Symposium on Security and Privacy (Oakland, Calif., April 1987), IEEE, New York, 1987, 161-166.
-
(1987)
In Proceedings of IEEE Symposium on Security and Privacy
, pp. 161-166
-
-
MCCULLOUGH, A.D.1
-
35
-
-
0023829319
-
Non-interference and the composability of security properties
-
(Oakland, Calif., April 1988), IEEE, New York
-
MCCULLOUGH, A. D. Non-interference and the composability of security properties. In Proceedings of IEEE Symposium on Security and Privacy (Oakland, Calif., April 1988), IEEE, New York, 1988, 177-186.
-
(1988)
In Proceedings of IEEE Symposium on Security and Privacy
, pp. 177-186
-
-
MCCULLOUGH, A.D.1
-
36
-
-
0023218630
-
Reasoning about security models
-
(Oakland, Calif., April 1987), IEEE, New York
-
MCLEAN, J. Reasoning about security models. In Proceedings of IEEE Symposium on Security and Privacy (Oakland, Calif., April 1987), IEEE, New York, 1987, 123-131.
-
(1987)
In Proceedings of IEEE Symposium on Security and Privacy
, pp. 123-131
-
-
MCLEAN, J.1
-
37
-
-
0023847479
-
The algebra of security
-
(Oakland, Calif., April 1988), IEEE, New York
-
MCLEAN, J. The algebra of security. In Proceedings of IEEE Symposium on Security and Privacy (Oakland, Calif., April 1988), IEEE, New York, 1988, 2-7.
-
(1988)
In Proceedings of IEEE Symposium on Security and Privacy
, pp. 2-7
-
-
MCLEAN, J.1
-
38
-
-
0024928980
-
A logic of knowledge and belief for reasoning about computer security
-
(Franconia, N.H.,)
-
MOSER, L. A logic of knowledge and belief for reasoning about computer security. In Proceedings of the Computer Security Foundations Workshop II (Franconia, N.H., 1989), 57-63.
-
(1989)
In Proceedings of the Computer Security Foundations Workshop II
, pp. 57-63
-
-
MOSER, L.1
-
39
-
-
0023229762
-
A model for multilevel security based on operator nets
-
(Oakland, Calif., April 1987), IEEE, New York
-
MACEWEN, G. H., POON, V. W. W., AND GLASGOW, J. I. A model for multilevel security based on operator nets. In Proceedings of IEEE Symposium on Security and Privacy (Oakland, Calif., April 1987), IEEE, New York, 1987, 150-160.
-
(1987)
In Proceedings of IEEE Symposium on Security and Privacy
-
-
MACEWEN, G.H.1
POON, V.W.W.2
GLASGOW, J.I.3
-
42
-
-
49149133038
-
The temporal logic of concurrent programs
-
PNUELI, A. The temporal logic of concurrent programs. Theor. Comput. Sci. 13 (1981), 45-60.
-
(1981)
Theor. Comput. Sci.
, vol.13
, pp. 45-60
-
-
PNUELI, A.1
-
45
-
-
85041481084
-
Design and verification of secure systems
-
(Dec.)
-
RUSHBY, J. M. Design and verification of secure systems. ACM SIGOPS 15, 5 (Dec. 1981), 12-21.
-
(1981)
ACM SIGOPS
, vol.15
, Issue.5
, pp. 12-21
-
-
RUSHBY, J.M.1
-
46
-
-
0038118932
-
A model of information
-
(Gaithersburg, Md., Sept. 1986), Dept. of Defense
-
SUTHERLAND, A. D. A model of information. In Proceedings of 9th National Computer Security Conference (Gaithersburg, Md., Sept. 1986), Dept. of Defense, 175-183.
-
In Proceedings of 9th National Computer Security Conference
, pp. 175-183
-
-
SUTHERLAND, A.D.1
|