-
1
-
-
2442558738
-
Computer security requirements - Guidance for applying the department of defense trusted computer system evaluation criteria in specific environments
-
Orange Book
-
Computer security requirements - guidance for applying the department of defense trusted computer system evaluation criteria in specific environments. Technical Report CSC-STD-003-85, 1985. Orange Book.
-
(1985)
Technical Report
, vol.CSC-STD-003-85
-
-
-
2
-
-
2442613539
-
Trusted computer system evaluation criteria: Trusted network interpretation
-
National Computer Security Center, Red Book
-
Trusted computer system evaluation criteria: Trusted network interpretation. Technical report, National Computer Security Center, 1987. Red Book.
-
(1987)
Technical Report
-
-
-
4
-
-
0141553470
-
The cassowary linear arithmetic constraint solving algorithm
-
dec
-
G. J. Badros, A. Borning, and P. J. Stuckey. The cassowary linear arithmetic constraint solving algorithm. ACM Transactions on Computer Human Interaction, 8(4):276-306, dec 2001.
-
(2001)
ACM Transactions on Computer Human Interaction
, vol.8
, Issue.4
, pp. 276-306
-
-
Badros, G.J.1
Borning, A.2
Stuckey, P.J.3
-
7
-
-
0003369786
-
Semiring-based CSPs and Valued CSPs: Frameworks, properties, and comparison
-
S. Bistarelli, H. Fargier, U. Montanari, F. Rossi, T. Schiex, and G. Verfaillie. Semiring-based CSPs and Valued CSPs: Frameworks, properties, and comparison. CONSTRAINTS: An international journal. Kluwer, 4(3), 1999.
-
(1999)
CONSTRAINTS: An international Journal. Kluwer
, vol.4
, Issue.3
-
-
Bistarelli, S.1
Fargier, H.2
Montanari, U.3
Rossi, F.4
Schiex, T.5
Verfaillie, G.6
-
9
-
-
0031095278
-
Semiring-based Constraint Solving and Optimization
-
Mar
-
S. Bistarelli, U. Montanari, and F. Rossi. Semiring-based Constraint Solving and Optimization. Journal of the ACM, 44(2):201-236, Mar 1997.
-
(1997)
Journal of the ACM
, vol.44
, Issue.2
, pp. 201-236
-
-
Bistarelli, S.1
Montanari, U.2
Rossi, F.3
-
10
-
-
84947424049
-
Combining constraint solving and symbolic model checking for a class of systems with non-linear constraints
-
O. Grumberg, editor, Haifa, Israel, June Springer-Verlag
-
W. Chan, R. Andersen, P. Beame, and D. Notkin. Combining constraint solving and symbolic model checking for a class of systems with non-linear constraints. In O. Grumberg, editor, Computer Aided Verification, 9th International Conference, CAV'97 Proceedings, volume 1254 of Lecture Notes in Computer Science, pages 316-327, Haifa, Israel, June 1997. Springer-Verlag.
-
(1997)
Computer Aided Verification, 9th International Conference, CAV'97 Proceedings, Volume 1254 of Lecture Notes in Computer Science
, vol.1254
, pp. 316-327
-
-
Chan, W.1
Andersen, R.2
Beame, P.3
Notkin, D.4
-
12
-
-
0002883087
-
The constraint logic programming language chip
-
M. Dincbas, P. V. Hentenryck, H. Simonis, A. Aggoun, T. Graf, and F. Berthier. The constraint logic programming language chip. In Proceedings of FGCS, pages 693-702, 1988.
-
(1988)
Proceedings of FGCS
, pp. 693-702
-
-
Dincbas, M.1
Hentenryck, P.V.2
Simonis, H.3
Aggoun, A.4
Graf, T.5
Berthier, F.6
-
13
-
-
26144472279
-
Constraint programming based column generation for crew assignment
-
University of Paderborn
-
T. Fahle, U. Junker, S. Karisch, N. Kohl, M. Sellmann, and B. Vaaben, Constraint programming based column generation for crew assignment. Technical Report TR-RI-99-212, University of Paderborn, 1999.
-
(1999)
Technical Report
, vol.TR-RI-99-212
-
-
Fahle, T.1
Junker, U.2
Karisch, S.3
Kohl, N.4
Sellmann, M.5
Vaaben, B.6
-
14
-
-
0027559721
-
A shortest path network security model
-
J. A. Fitch and L. J. Hoffman. A shortest path network security model. Computers and Security, 12(2):169-189, 1993.
-
(1993)
Computers and Security
, vol.12
, Issue.2
, pp. 169-189
-
-
Fitch, J.A.1
Hoffman, L.J.2
-
16
-
-
0027969913
-
The complexity and composability of secure interoperation
-
Oakland, CA, May IEEE Computer Society Press
-
L. Gong and X. Qian. The complexity and composability of secure interoperation. In Proceedings of the Symposium on Security and Privacy, pages 190-200, Oakland, CA, May 1994. IEEE Computer Society Press.
-
(1994)
Proceedings of the Symposium on Security and Privacy
, pp. 190-200
-
-
Gong, L.1
Qian, X.2
-
17
-
-
0032045587
-
The cascade vulnerability problem: The detection problem and a simulated annealing approach to its correction
-
S. Gritalis and D. Spinellis. The cascade vulnerability problem: The detection problem and a simulated annealing approach to its correction. Microprocessors and Microsystems, 21(10):621-628, 1998.
-
(1998)
Microprocessors and Microsystems
, vol.21
, Issue.10
, pp. 621-628
-
-
Gritalis, S.1
Spinellis, D.2
-
19
-
-
84974751467
-
The cascade vulnerability problem
-
R. Horton et al. The cascade vulnerability problem. Journal of Computer Security, 2(4):279-290, 1993.
-
(1993)
Journal of Computer Security
, vol.2
, Issue.4
, pp. 279-290
-
-
Horton, R.1
-
20
-
-
0023829319
-
Noninterference and the composability of security properties
-
IEEE Computer Society Press
-
D. McCullough. Noninterference and the composability of security properties. In Proceedings 1988 IEEE Symposium on Security and Privacy, pages 177-186. IEEE Computer Society Press, 1988.
-
(1988)
Proceedings 1988 IEEE Symposium on Security and Privacy
, pp. 177-186
-
-
McCullough, D.1
-
22
-
-
0016050041
-
Networks of constraints: Fundamental properties and applications to picture processing
-
U. Montanari. Networks of constraints: Fundamental properties and applications to picture processing. Information Science, 7:95-132, 1974. Also Technical Report, Carnegie Mellon University, 1971.
-
(1974)
Information Science
, vol.7
, pp. 95-132
-
-
Montanari, U.1
-
23
-
-
0016050041
-
-
Carnegie Mellon University
-
U. Montanari. Networks of constraints: Fundamental properties and applications to picture processing. Information Science, 7:95-132, 1974. Also Technical Report, Carnegie Mellon University, 1971.
-
(1971)
Technical Report
-
-
-
26
-
-
0028567611
-
A filtering algorithm for constraints of difference in csps
-
J.-C. Regin. A filtering algorithm for constraints of difference in csps. In Proceedings AAAI-94, pages 362-367, 1994.
-
(1994)
Proceedings AAAI-94
, pp. 362-367
-
-
Regin, J.-C.1
-
27
-
-
0001553684
-
Possibilistic constraint satisfaction problems, or "how to handle soft constraints?"
-
T. Schiex. Possibilistic constraint satisfaction problems, or "how to handle soft constraints?". In Proc. 8th Conf. of Uncertainty in AI, pages 269-275, 1992.
-
(1992)
Proc. 8th Conf. of Uncertainty in AI
, pp. 269-275
-
-
Schiex, T.1
-
29
-
-
0001737878
-
Practical applications of constraint programming
-
M. Wallace. Practical applications of constraint programming. Constraints, 1(1-2):139-168, 1996.
-
(1996)
Constraints
, vol.1
, Issue.1-2
, pp. 139-168
-
-
Wallace, M.1
|