-
1
-
-
0003400251
-
Secure Computer System: Unified Exposition and Multics Interpretation Mitre Corp, Bedford, MA
-
Tech. Rep. MTR-2997
-
D. Bell and L. LaPadula, Secure Computer System: Unified Exposition and Multics Interpretation Mitre Corp, Bedford, MA, Tech. Rep. MTR-2997, 1976.
-
(1976)
-
-
Bell, D.1
LaPadula, L.2
-
2
-
-
21344432090
-
Characterizing intransitive non-interference in security policies with observability
-
Jun
-
N. B. Hadj-Alouane, S. Lafrance, F. Lin, J. Mullins, and M. Yeddes, "Characterizing intransitive non-interference in security policies with observability," IEEE Trans. Automat. Control, vol. 50, no. 6, pp. 920-925, Jun. 2005.
-
(2005)
IEEE Trans. Automat. Control
, vol.50
, Issue.6
, pp. 920-925
-
-
Hadj-Alouane, N.B.1
Lafrance, S.2
Lin, F.3
Mullins, J.4
Yeddes, M.5
-
3
-
-
26844532854
-
On the verification of intransitive noninterference in multilevel security
-
Oct
-
N. B. Hadj-Alouane, S. Lafrance, F. Lin, J. Mullins, and M. Yeddes, "On the verification of intransitive noninterference in multilevel security," IEEE Trans. Syst., Man Cybern. B, vol. 35, no. 5, pp. 948-958, Oct. 2005.
-
(2005)
IEEE Trans. Syst., Man Cybern. B
, vol.35
, Issue.5
, pp. 948-958
-
-
Hadj-Alouane, N.B.1
Lafrance, S.2
Lin, F.3
Mullins, J.4
Yeddes, M.5
-
4
-
-
68949166100
-
Synthesis of non-interferent systems
-
Sep
-
F. Cassez, J. Mullins, and O. H. Roux, "Synthesis of non-interferent systems," in Proc. 4th Int. Conf. Math. Methods, Models Architect. Comput. Network Security (MMM-ACNS'07), Sep. 2007, vol. 1, pp. 307-321.
-
(2007)
Proc. 4th Int. Conf. Math. Methods, Models Architect. Comput. Network Security (MMM-ACNS'07)
, vol.1
, pp. 307-321
-
-
Cassez, F.1
Mullins, J.2
Roux, O.H.3
-
5
-
-
0013409602
-
Supremal and maximal sublanguages arising in supervisor synthesis problem with partial observation
-
H. Cho and S. I. Marcus, "Supremal and maximal sublanguages arising in supervisor synthesis problem with partial observation," Math. Syst. Theory, vol. 22, pp. 177-211, 1989.
-
(1989)
Math. Syst. Theory
, vol.22
, pp. 177-211
-
-
Cho, H.1
Marcus, S.I.2
-
6
-
-
0003313017
-
Using non interference for the analysis of security protocol
-
R. Focardi, A. Ghelli, and R. Gorrieri, "Using non interference for the analysis of security protocol," in Proc. DIMACS Workshop Design Formal Verification Security Protocols, 1997, pp. 285-327.
-
(1997)
Proc. DIMACS Workshop Design Formal Verification Security Protocols
, pp. 285-327
-
-
Focardi, R.1
Ghelli, A.2
Gorrieri, R.3
-
7
-
-
84974776068
-
A classification of security properties for process algebras
-
R. Focardi and R. Gorrieri, "A classification of security properties for process algebras," J. Comput. Security, vol. 3, no. 1, pp. 5-33, 1995.
-
(1995)
J. Comput. Security
, vol.3
, Issue.1
, pp. 5-33
-
-
Focardi, R.1
Gorrieri, R.2
-
8
-
-
84885005296
-
Non-interference control synthesis for security timed automata
-
San Francisco, CA, Aug
-
G. Gardey, J. Mullins, and O. H. Roux, "Non-interference control synthesis for security timed automata," in Proc. 3rd Int.Workshop Security Issues Concurrency (SecCo'05), San Francisco, CA, Aug. 2005, vol. 1, pp. 35-53.
-
(2005)
Proc. 3rd Int.Workshop Security Issues Concurrency (SecCo'05)
, vol.1
, pp. 35-53
-
-
Gardey, G.1
Mullins, J.2
Roux, O.H.3
-
10
-
-
0023292228
-
An experience using two covert channel analysis techniques on a real system design
-
Feb
-
J. T. Haigh, R. A. Kemmerer, J. McHugh, and W. D. Young, "An experience using two covert channel analysis techniques on a real system design," IEEE Trans. Software Eng., vol. SE-13, no. 2, pp. 157-168, Feb. 1987.
-
(1987)
IEEE Trans. Software Eng
, vol.SE-13
, Issue.2
, pp. 157-168
-
-
Haigh, J.T.1
Kemmerer, R.A.2
McHugh, J.3
Young, W.D.4
-
11
-
-
0023995784
-
On observability of discrete-event systems
-
F. Lin and W. M. Wonham, "On observability of discrete-event systems," Inform. Sci., vol. 44, pp. 173-198, 1988.
-
(1988)
Inform. Sci
, vol.44
, pp. 173-198
-
-
Lin, F.1
Wonham, W.M.2
-
12
-
-
0002426876
-
A general theory of composition for a class of possibilistic properties
-
Jan
-
J. McLean, "A general theory of composition for a class of possibilistic properties," IEEE Trans. Software Eng., vol. 22, no. 1, pp. 53-66, Jan. 1996.
-
(1996)
IEEE Trans. Software Eng
, vol.22
, Issue.1
, pp. 53-66
-
-
McLean, J.1
-
13
-
-
0042361083
-
Nondeterministic admissible interference
-
J. Mullins, "Nondeterministic admissible interference," J. Universal Comput. Sci., vol. 6, no. 11, pp. 1054-1070, 2000.
-
(2000)
J. Universal Comput. Sci
, vol.6
, Issue.11
, pp. 1054-1070
-
-
Mullins, J.1
-
14
-
-
21344442637
-
Bisimulation-based non-deterministic admissible interference with applications to the analysis of cryptographic protocols
-
J. Mullins and S. Lafrance, "Bisimulation-based non-deterministic admissible interference with applications to the analysis of cryptographic protocols," in Int. J. Inform. Software Technol., pp. 1-25, 2002.
-
(2002)
Int. J. Inform. Software Technol
, pp. 1-25
-
-
Mullins, J.1
Lafrance, S.2
-
15
-
-
0025594567
-
The infimal prefix-closed and observable superlanguage of a given language
-
K. Rudie and W. M. Wonham, "The infimal prefix-closed and observable superlanguage of a given language," Syst. Control Lett., vol. 15, pp. 361-371, 1990.
-
(1990)
Syst. Control Lett
, vol.15
, pp. 361-371
-
-
Rudie, K.1
Wonham, W.M.2
-
18
-
-
68949189451
-
Transitivity and Channel-Control Security Policies SRI International, Menlo Park, CA
-
Tech. Rep. CSL-92-02
-
J. Rushby, Noninterference, Transitivity and Channel-Control Security Policies SRI International, Menlo Park, CA, Tech. Rep. CSL-92-02, 1992.
-
(1992)
-
-
Rushby, J.1
Noninterference2
-
19
-
-
0032646572
-
Process algebra and non-interference
-
Mordano, Italy, Jun
-
P. Ryan and S. Schneider, "Process algebra and non-interference," in Proc. CSFW-12, Mordano, Italy, Jun. 1999, pp. 214-227.
-
(1999)
Proc. CSFW-12
, pp. 214-227
-
-
Ryan, P.1
Schneider, S.2
-
20
-
-
38049082649
-
What, indeed, is intransitive noninterference?
-
R. Van Der Meyden, "What, indeed, is intransitive noninterference?," in Proc. Comput. Security (ESORICS'07), 2008, vol. 4734, pp. 235-250.
-
(2008)
Proc. Comput. Security (ESORICS'07)
, vol.4734
, pp. 235-250
-
-
Van Der Meyden, R.1
-
21
-
-
35048854255
-
Information flow control revisited: Noninfluence.. noninterference + nonleakage
-
D. Von Oheimb, "Information flow control revisited: Noninfluence.. noninterference + nonleakage," in Proc. Computer Security (ESORICS'04), 2004, vol. 3193, pp. 225-243.
-
(2004)
Proc. Computer Security (ESORICS'04)
, vol.3193
, pp. 225-243
-
-
Von Oheimb, D.1
|