-
2
-
-
84974754345
-
A logical view of secure dependencies
-
Bieber P, Cuppens F: A logical view of secure dependencies. J Comput Security, 1:99-129 (1992)
-
(1992)
J Comput Security
, vol.1
, pp. 99-129
-
-
Bieber, P.1
Cuppens, F.2
-
9
-
-
0016949746
-
A lattice model of secure information flow
-
May
-
Denning DE: A lattice model of secure information flow. Communications of the ACM. 19(5):236-243. May 1976
-
(1976)
Communications of the ACM
, vol.19
, Issue.5
, pp. 236-243
-
-
Denning, D.E.1
-
11
-
-
0027341860
-
Perfectly secure message transmission
-
January
-
Dolev D, Dwork C, Waarts O, Yung M: Perfectly secure message transmission. JACM, 40(1): 17-47. January 1993
-
(1993)
JACM
, vol.40
, Issue.1
, pp. 17-47
-
-
Dolev, D.1
Dwork, C.2
Waarts, O.3
Yung, M.4
-
12
-
-
84976774564
-
Reasoning about knowledge and probability
-
March
-
Fagin R, Halpern JY: Reasoning about knowledge and probability. JACM. 41(2):340-367, March 1994
-
(1994)
JACM.
, vol.41
, Issue.2
, pp. 340-367
-
-
Fagin, R.1
Halpern, J.Y.2
-
16
-
-
0003697514
-
Logics of Time and Computation (2nd edn)
-
CSLI Publications. Stanford, CA
-
Goldblatt R: Logics of Time and Computation (2nd edn) Vol 7 of CSLI Lecture Notes. CSLI Publications. Stanford, CA 1992
-
(1992)
CSLI Lecture Notes
, vol.7
-
-
Goldblatt, R.1
-
17
-
-
84974759639
-
Toward a mathematical foundation for information flow security
-
Gray, III JW: Toward a mathematical foundation for information flow security. J Comput Security 1:255-294 (1992). A preliminary version appears in Proc. 1991 IEEE Symposium on Research in Security and Privacy. Oakland, CA, May 1991.
-
(1992)
J Comput Security
, vol.1
, pp. 255-294
-
-
Gray III, J.W.1
-
18
-
-
84974759639
-
-
A preliminary version appears in Oakland, CA, May
-
Gray, III JW: Toward a mathematical foundation for information flow security. J Comput Security 1:255-294 (1992) A preliminary version appears in Proc. 1991 IEEE Symposium on Research in Security and Privacy. Oakland, CA, May 1991.
-
(1991)
Proc. 1991 IEEE Symposium on Research in Security and Privacy
-
-
-
19
-
-
0026850049
-
A logical approach to multilevel security of probabilistic systems
-
Oakland, CA, May
-
Gray, III JW, Syverson PF: A logical approach to multilevel security of probabilistic systems. In Proceedings of the 1992 IEEE Computer Society Symposium on Research in Security and Privacy, pp 164-176, Oakland, CA, May 1992
-
(1992)
Proceedings of the 1992 IEEE Computer Society Symposium on Research in Security and Privacy
, pp. 164-176
-
-
Gray III, J.W.1
Syverson, P.F.2
-
20
-
-
26744445387
-
Epistemology of information flow in the multilevel security of probabilistic systems
-
Naval Research Laboratory, May
-
Gray, III JW, Syverson PF: Epistemology of information flow in the multilevel security of probabilistic systems. Technical Report NRL/MR/5540-95-7733, Naval Research Laboratory, May 1995
-
(1995)
Technical Report
, vol.NRL-MR-5540-95-7733
-
-
Gray III, J.W.1
Syverson, P.F.2
-
22
-
-
0005048833
-
Using reasoning about knowledge to analyze distributed systems
-
Traub J, Grosz B, Lampson B, Nilson N (eds)
-
Halpern JY: Using reasoning about knowledge to analyze distributed systems. In Traub J, Grosz B, Lampson B, Nilson N (eds) Annu Rev Comput Sci 2:37-68 (1987)
-
(1987)
Annu Rev Comput Sci
, vol.2
, pp. 37-68
-
-
Halpern, J.Y.1
-
23
-
-
0027665952
-
Knowledge, probability, and adversaries
-
Halpern JY, Tuttle MR: Knowledge, probability, and adversaries. JACM. 40:917-962 (1993)
-
(1993)
JACM
, vol.40
, pp. 917-962
-
-
Halpern, J.Y.1
Tuttle, M.R.2
-
24
-
-
0026254933
-
A retrospective on the vax vmm security kernel
-
Karger PA, Zurko ME, Bonin DW, Mason AH, Kahn CF.: A retrospective on the vax vmm security kernel. IEEE Trans Softw Eng. 17:1147-1165 (1991)
-
(1991)
IEEE Trans Softw Eng
, vol.17
, pp. 1147-1165
-
-
Karger, P.A.1
Zurko, M.E.2
Bonin, D.W.3
Mason, A.H.4
Kahn, C.F.5
-
25
-
-
0004294401
-
The temporal logic of actions
-
DEC Systems Research Center. Palo Alto, CA, December
-
Lamport L: The temporal logic of actions Technical Report 79, DEC Systems Research Center. Palo Alto, CA, December 1991
-
(1991)
Technical Report
, vol.79
-
-
Lamport, L.1
-
26
-
-
0015672289
-
A note on the confinement problem
-
October
-
Lampson BW: A note on the confinement problem. Communications of the ACM. 16(10), October 1973
-
(1973)
Communications of the ACM.
, vol.16
, Issue.10
-
-
Lampson, B.W.1
-
27
-
-
3042944831
-
A model-theoretic approach to specifying, verifying, and hooking up security policies
-
Franconia, NH
-
L.Marcus, Redmond T: A model-theoretic approach to specifying, verifying, and hooking up security policies. In Proceeding of the Computer Security Foundations Workshop. Franconia, NH, 1988
-
(1988)
Proceeding of the Computer Security Foundations Workshop
-
-
Marcus, L.1
Redmond, T.2
-
32
-
-
0342880800
-
Applying formal methods to the analysis of a key management protocol
-
Meadows C: Applying formal methods to the analysis of a key management protocol. J Comput Security, 1:5-35 (1992)
-
(1992)
J Comput Security
, vol.1
, pp. 5-35
-
-
Meadows, C.1
-
37
-
-
0642337456
-
Probabilistic communicating processes
-
University of Oxford, Lady Margaret Hall PhD thesis
-
Seidel K: Probabilistic communicating processes. Technical report. University of Oxford, Lady Margaret Hall PhD thesis, 1992
-
(1992)
Technical Report
-
-
Seidel, K.1
-
38
-
-
0001560154
-
Channels with side information at the transmitter
-
Shannon CE: Channels with side information at the transmitter. IBM Journal of Research and Development 2:289-293 (1958) Republished in: David Slepian (ed.), "Key Papers in the Development of Information Theory", IEEE Press, 1974
-
(1958)
IBM Journal of Research and Development
, vol.2
, pp. 289-293
-
-
Shannon, C.E.1
-
39
-
-
0003618326
-
-
IEEE Press
-
Shannon CE: Channels with side information at the transmitter. IBM Journal of Research and Development 2:289-293 (1958) Republished in: David Slepian (ed.), "Key Papers in the Development of Information Theory", IEEE Press, 1974
-
(1974)
Key Papers in the Development of Information Theory
-
-
Slepian, D.1
-
40
-
-
0001371497
-
Two-way communication channels
-
Shannon CE: Two-way communication channels. In Proc. 4th Berkeley Symp. Math. Stat. and Prob., Vol. 1: pp 611-644 (1961) Republished in: David Slepian (ed.), "Key Papers in the Development of Information Theory", IEEE Press, 1974
-
(1961)
Proc. 4th Berkeley Symp. Math. Stat. and Prob.
, vol.1
, pp. 611-644
-
-
Shannon, C.E.1
-
41
-
-
0003618326
-
-
IEEE Press
-
Shannon CE: Two-way communication channels. In Proc. 4th Berkeley Symp. Math. Stat. and Prob., Vol. 1: pp 611-644 (1961) Republished in: David Slepian (ed.), "Key Papers in the Development of Information Theory", IEEE Press, 1974
-
(1974)
Key Papers in the Development of Information Theory
-
-
Slepian, D.1
-
42
-
-
0003358482
-
Probability
-
Springer Berlin Heidelberg New York
-
Shiryayev AN: Probability, Vol. 95 of Graduate Texts in Mathematics. Springer Berlin Heidelberg New York 1984
-
(1984)
Graduate Texts in Mathematics
, vol.95
-
-
Shiryayev, A.N.1
-
46
-
-
84974759585
-
An analysis of covert timing channels
-
Wray JC: An analysis of covert timing channels. J Comput Security 1:219-232 (1992)
-
(1992)
J Comput Security
, vol.1
, pp. 219-232
-
-
Wray, J.C.1
|