-
1
-
-
0003400251
-
"Secure computer system: Unified Eexposition and multics interpretation"
-
Mitre Corporation, Bedford, MA, Tech. Rep. MTR-2997
-
D. E. Bell and L. J. LaPadula, "Secure computer system: Unified Eexposition and multics interpretation," Mitre Corporation, Bedford, MA, Tech. Rep. MTR-2997, 1976.
-
(1976)
-
-
Bell, D.E.1
LaPadula, L.J.2
-
2
-
-
26844535985
-
"Characterizing intransitive noninterference for 3-domain security policies with observability"
-
to be published
-
N. Ben Hadj-Alouane, S. Lafrance, F. Lin, J. Mullins, and M. Yeddes, "Characterizing intransitive noninterference for 3-domain security policies with observability," IEEE Trans. Autom. Control, to be published.
-
IEEE Trans. Autom. Control
-
-
Ben Hadj-Alouane, N.1
Lafrance, S.2
Lin, F.3
Mullins, J.4
Yeddes, M.5
-
3
-
-
84974776068
-
"A classification of security properties for process algebras"
-
R. Focardi and R. Gorrieri, "A classification of security properties for process algebras," J. Comput. Security, vol. 3, no. 1, pp. 5-33, 1994/1995.
-
(1994)
J. Comput. Security
, vol.3
, Issue.1
, pp. 5-33
-
-
Focardi, R.1
Gorrieri, R.2
-
4
-
-
26844480899
-
"Message authentication through non interference"
-
R. Focardi, R. Gorrieri, and F. Martinelli, "Message authentication through non interference," Algebraic Methodol. Software Technoll, pp. 258-272, 2000.
-
(2000)
Algebraic Methodol. Software Technoll.
, pp. 258-272
-
-
Focardi, R.1
Gorrieri, R.2
Martinelli, F.3
-
5
-
-
26844451198
-
"Secrecy in security protocols as non interference"
-
presented at the DERA/RHUL Workshop on Secure Architectures and Information Flow
-
R. Focardi, R. Gorrieri, and F. Martinelli, "Secrecy in security protocols as non interference," presented at the DERA/RHUL Workshop on Secure Architectures and Information Flow, 2000.
-
(2000)
-
-
Focardi, R.1
Gorrieri, R.2
Martinelli, F.3
-
7
-
-
0023292465
-
"Extending the noninterference version of mls for sat"
-
Feb
-
J. T. Haigh and W. D. Young, "Extending the noninterference version of mls for sat," IEEE Trans. Softw. Eng., vol. 13, no. 2, pp. 141-150, Feb. 1987.
-
(1987)
IEEE Trans. Softw. Eng.
, vol.13
, Issue.2
, pp. 141-150
-
-
Haigh, J.T.1
Young, W.D.2
-
8
-
-
0003620778
-
-
2nd ed. Reading, MA: Addison-Wesley
-
J. E. Hopcroft, R. Motwani, and J. D. Ullman, Introduction to Automata Theory, Languages, and Computation, 2nd ed. Reading, MA: Addison-Wesley, 2001.
-
(2001)
Introduction to Automata Theory, Languages, and Computation
-
-
Hopcroft, J.E.1
Motwani, R.2
Ullman, J.D.3
-
9
-
-
1442292328
-
"An information flow method to detect denial of service vulnerabilities"
-
S. Lafrance and J. Mullins, "An information flow method to detect denial of service vulnerabilities," J. Univ. Comput. Sci., vol. 9, no. 11, pp. 1350-1369, 2003.
-
(2003)
J. Univ. Comput. Sci.
, vol.9
, Issue.11
, pp. 1350-1369
-
-
Lafrance, S.1
Mullins, J.2
-
10
-
-
0023995784
-
"On observability of discrete-event systems"
-
F. Lin and W. M. Wonham, "On observability of discrete-event systems," Inf. Sci., vol. 44, pp. 173-198, 1988.
-
(1988)
Inf. Sci.
, vol.44
, pp. 173-198
-
-
Lin, F.1
Wonham, W.M.2
-
11
-
-
0035075103
-
"A cost-based framework for analysis of denial of service networks"
-
C. Meadows, "A cost-based framework for analysis of denial of service networks," J. Comput. Security, vol. 9, no. 1/2, pp. 143-164, 2001.
-
(2001)
J. Comput. Security
, vol.9
, Issue.1-2
, pp. 143-164
-
-
Meadows, C.1
-
12
-
-
0042361083
-
"Nondeterministic admissible interference"
-
J. Mullins, "Nondeterministic admissible interference," J. Univ. Comput. Sci., vol. 6, no. 11, pp. 1054-1070, 2000.
-
(2000)
J. Univ. Comput. Sci.
, vol.6
, Issue.11
, pp. 1054-1070
-
-
Mullins, J.1
-
13
-
-
0023104549
-
"Supervisory control of a class of discrete-event processes"
-
P. J. Ramadge and W. M. Wonham, "Supervisory control of a class of discrete-event processes," SIAM J. Control Optim., vol. 25, no. 1, pp. 206-230, 1987.
-
(1987)
SIAM J. Control Optim.
, vol.25
, Issue.1
, pp. 206-230
-
-
Ramadge, P.J.1
Wonham, W.M.2
-
14
-
-
0032671780
-
"What is intransitive noninterference"
-
presented at the 12th IEEE Computer Security Foundations Workshop
-
A. W. Roscoe and M. H. Goldsmith, "What is intransitive noninterference," presented at the 12th IEEE Computer Security Foundations Workshop, 1999.
-
(1999)
-
-
Roscoe, A.W.1
Goldsmith, M.H.2
-
15
-
-
0003502331
-
"Noninterference, transitivity and channel-control Security policies"
-
SRI International, Menlo Park, CA, Tech. Rep. CSL-92-02
-
J. Rushby, "Noninterference, transitivity and channel-control Security policies," SRI International, Menlo Park, CA, Tech. Rep. CSL-92-02, 1992.
-
(1992)
-
-
Rushby, J.1
-
16
-
-
0032646572
-
"Process algebra and noninterference"
-
presented at the CSFW-12, Mordano, Italy, Jun
-
P. Y. A. Ryan and S. A. Schneider, "Process algebra and noninterference," presented at the CSFW-12, Mordano, Italy, Jun. 1999.
-
(1999)
-
-
Ryan, P.Y.A.1
Schneider, S.A.2
-
17
-
-
0000937825
-
"Verifying authentication protocols in CSP"
-
Aug
-
S. Schneider, "Verifying authentication protocols in CSP," IEEE Trans. Softw. Eng., vol. 24, no. 8, pp. 447-479, Aug. 1998.
-
(1998)
IEEE Trans. Softw. Eng.
, vol.24
, Issue.8
, pp. 447-479
-
-
Schneider, S.1
-
18
-
-
0030715989
-
"Analysis of a denial of service attack on TCP"
-
May
-
C. L. Schuba, I. V. Krsul, M. G. Kuhn, E. H. Spafford, A. Sundaram, and D. Zamboni, "Analysis of a denial of service attack on TCP," in Proc. IEEE Symp. Security Privacy, May 1997, pp. 208-223.
-
(1997)
Proc. IEEE Symp. Security Privacy
, pp. 208-223
-
-
Schuba, C.L.1
Krsul, I.V.2
Kuhn, M.G.3
Spafford, E.H.4
Sundaram, A.5
Zamboni, D.6
|