-
4
-
-
0022614502
-
Extending the non-interference version of MLS for SAT
-
IEEE Computer Society Press
-
J. Haigh and W. Young. Extending the non-interference version of MLS for SAT. In Proc. of the Symposium on Security and Privacy, pages 232-239. IEEE Computer Society Press, 1986.
-
(1986)
Proc. of the Symposium on Security and Privacy
, pp. 232-239
-
-
Haigh, J.1
Young, W.2
-
5
-
-
0034244831
-
A Formal Security Model for Microprocessor Hardware
-
August
-
Volkmar Lotz, Volker Kessler, and Georg Walter. A Formal Security Model for Microprocessor Hardware. In IEEE Transactions on Software Engineering, volume 26, pages 702-712, August 2000.
-
(2000)
IEEE Transactions on Software Engineering
, vol.26
, pp. 702-712
-
-
Lotz, V.1
Kessler, V.2
Walter, G.3
-
6
-
-
84944059120
-
Unwinding possibilistic security properties
-
Proc. of ESORICS, Springer
-
Heiko Mantel. Unwinding possibilistic security properties. In Proc. of ESORICS, volume 1895 of LNCS, pages 238-254. Springer, 2000.
-
(2000)
LNCS
, vol.1895
, pp. 238-254
-
-
Mantel, H.1
-
7
-
-
84881123660
-
Information Flow and Applications - Bridging a Gap
-
Proc. of FME 2001: Formal Methods for Increasig Software Productivity, Springer
-
Heiko Mantel. Information Flow and Applications - Bridging a Gap. In Proc. of FME 2001: Formal Methods for Increasig Software Productivity, volume 2021 of LNCS, pages 153-172. Springer, 2001.
-
(2001)
LNCS
, vol.2021
, pp. 153-172
-
-
Mantel, H.1
-
10
-
-
0028058408
-
A general theory of composition for trace sets closed under selective interleaving functions
-
John McLean. A general theory of composition for trace sets closed under selective interleaving functions. In IEEE Symposium on Security and Privacy, pages 79-93, 1994.
-
(1994)
IEEE Symposium on Security and Privacy
, pp. 79-93
-
-
McLean, J.1
-
11
-
-
0034823079
-
A Generic Approach to the Security of Multi-threaded Programs
-
Cape Breton, Nova Scotia, Canada, IEEE Computer Society
-
Heiko Mantel and Andrei Sabelfeld. A Generic Approach to the Security of Multi-threaded Programs. In Proc. of 14th CSFW, pages 126-142, Cape Breton, Nova Scotia, Canada, 2001. IEEE Computer Society.
-
(2001)
Proc. of 14th CSFW
, pp. 126-142
-
-
Mantel, H.1
Sabelfeld, A.2
-
12
-
-
0348126394
-
Isabelle/HOL - A Proof Assistant for Higher-Order Logic
-
Springer
-
Tobias Nipkow, Lawrence C. Paulson, and Markus Wenzel. Isabelle/HOL - A Proof Assistant for Higher-Order Logic, volume 2283 of LNCS. Springer, 2002. See also http://isabelle.in.tum.de/docs.html.
-
(2002)
LNCS
, vol.2283
-
-
Nipkow, T.1
Paulson, L.C.2
Wenzel, M.3
-
14
-
-
84957035924
-
Formal Security Analysis with Interacting State Machines
-
th European Symposium on Research in Computer Security (ESORICS), Springer
-
th European Symposium on Research in Computer Security (ESORICS), volume 2502 of LNCS, pages 212-228. Springer, 2002. http://ddvo.net/papers/FSA_ISM.html.
-
(2002)
LNCS
, vol.2502
, pp. 212-228
-
-
Von Oheimb, D.1
Lotz, V.2
-
16
-
-
0029228214
-
Absorbing covers and intransitive non-interference
-
Sylvan Pinsky. Absorbing covers and intransitive non-interference. In IEEE Symposium on Security and Privacy, pages 102-113, 1995.
-
(1995)
IEEE Symposium on Security and Privacy
, pp. 102-113
-
-
Pinsky, S.1
-
19
-
-
0003706571
-
A CSP formulation of non-interference and unwinding
-
Cipher
-
Peter Ryan. A CSP formulation of non-interference and unwinding. In Proc. of IEEE CSFW-3. Cipher, 1990.
-
(1990)
Proc. of IEEE CSFW-3
-
-
Ryan, P.1
-
20
-
-
84949243805
-
Mathematical models of computer security
-
Riccardo Focardi and Roberto Gorrieri, editors, Foundations of Security Analysis and Design: Tutorial Lectures, Springer
-
Peter Y. A. Ryan. Mathematical models of computer security. In Riccardo Focardi and Roberto Gorrieri, editors, Foundations of Security Analysis and Design: Tutorial Lectures, volume 2171 of LNCS. Springer, 2001.
-
(2001)
LNCS
, vol.2171
-
-
Ryan, P.Y.A.1
|