-
2
-
-
0016949746
-
A lattice model of secure information flow
-
Denning, D.: A lattice model of secure information flow. Communications of the ACM 19(5) (1976) 236-243
-
(1976)
Communications of the ACM
, vol.19
, Issue.5
, pp. 236-243
-
-
Denning, D.1
-
4
-
-
84974747910
-
Aggregation and separation as noninterference properties
-
Foley, S.: Aggregation and separation as noninterference properties. Journal of Computer Security 1(2)(1992) 159-188
-
(1992)
Journal of Computer Security
, vol.1
, Issue.2
, pp. 159-188
-
-
Foley, S.1
-
5
-
-
0027699087
-
Lattice based access control models
-
Sandhu, R.: Lattice based access control models. IEEE Computer 26(11) (1993) 9-19
-
(1993)
IEEE Computer
, vol.26
, Issue.11
, pp. 9-19
-
-
Sandhu, R.1
-
7
-
-
0030680628
-
The specification and implementation of commercial security requirements including dynamic segregation of duties
-
In
-
Foley, S.: The specification and implementation of commercial security requirements including dynamic segregation of duties. In: ACM Conference on Computer and Communications Security. (1997) 125-134
-
(1997)
ACM Conference on Computer and Communications Security
, pp. 125-134
-
-
Foley, S.1
-
10
-
-
84944051800
-
-
In: ESORICS
-
Schellhorn, G., Reif, W., Schairer, A., Karger, P., Austel, V., Toll, D.: Verification of a formal security model for multiapplicative smart cards. In: ESORICS. (2000) 17-36
-
(2000)
Verification of a formal security model for multiapplicative smart cards
, pp. 17-36
-
-
Schellhorn, G.1
Reif, W.2
Schairer, A.3
Karger, P.4
Austel, V.5
Toll, D.6
-
11
-
-
21644486232
-
If A 1 is the answer, what was the question? an edgy naif's retrospective on promulgating the trusted computer systems evaluation criteria
-
In:, IEEE Press
-
Schaefer, M.: If A 1 is the answer, what was the question? an edgy naif's retrospective on promulgating the trusted computer systems evaluation criteria. In: Annual Computer Security Applications Conference, IEEE Press (2004) 204-228
-
(2004)
Annual Computer Security Applications Conference
, pp. 204-228
-
-
Schaefer, M.1
-
12
-
-
0032641890
-
20 years of covert channel modeling and analysis
-
In
-
Millen, J.: 20 years of covert channel modeling and analysis. In: IEEE Symposium on Security and Privacy. (1999) 113-114
-
(1999)
IEEE Symposium on Security and Privacy
, pp. 113-114
-
-
Millen, J.1
-
17
-
-
84974776068
-
A classification of security properties for process algebras
-
Focardi, R., Gorrieri, R.: A classification of security properties for process algebras. Journal of Computer Security 3(1) (1995) 5-33
-
(1995)
Journal of Computer Security
, vol.3
, Issue.1
, pp. 5-33
-
-
Focardi, R.1
Gorrieri, R.2
-
18
-
-
0030232849
-
Non-interference through determinism
-
Roscoe, A., Woodcock, J., Wulf, L.: Non-interference through determinism. Journal of Computer Security 4(1) (1995)
-
(1995)
Journal of Computer Security
, vol.4
, Issue.1
-
-
Roscoe, A.1
Woodcock, J.2
Wulf, L.3
-
23
-
-
0031337155
-
Securing an object relational database
-
In:, IEEE Computer Society
-
Lewis, S., Wiseman, S.: Securing an object relational database. In: ACSAC, IEEE Computer Society (1997) 59-68
-
(1997)
ACSAC
, pp. 59-68
-
-
Lewis, S.1
Wiseman, S.2
-
25
-
-
26444581576
-
Configuring storage area networks for mandatory security
-
In:, Kluwer
-
Aziz, B., Foley, S., Herbert, J., Swart, G.: Configuring storage area networks for mandatory security. In: Proceedings of the 18 TM IFIP Annual Conference on Data and Applications Security, Kluwer (2004)
-
(2004)
Proceedings of the 18 TM IFIP Annual Conference on Data and Applications Security
-
-
Aziz, B.1
Foley, S.2
Herbert, J.3
Swart, G.4
-
26
-
-
84882712406
-
A model for secure information flow
-
In:, Oakland, CA, IEEE Computer Society Press
-
Foley, S.: A model for secure information flow. In: Proceedings of the Symposium on Security and Privacy, Oakland, CA, IEEE Computer Society Press (1989)
-
(1989)
Proceedings of the Symposium on Security and Privacy
-
-
Foley, S.1
-
28
-
-
9444295894
-
Detecting and eliminating the cascade vulnerability problem from multi-level security networks using soft constraints
-
In:, AAAI Press San Jose 808-813
-
Bistarelli, S., Foley, S., O'Sullivan, B.: Detecting and eliminating the cascade vulnerability problem from multi-level security networks using soft constraints. In: Proceedings of AAAI/IAAI-2004 (16th Innovative Applications of AI Conference), AAAI Press San Jose (2004) 808-813
-
(2004)
Proceedings of AAAI/IAAI-2004 (16th Innovative Applications of AI Conference)
-
-
Bistarelli, S.1
Foley, S.2
O'Sullivan, B.3
-
30
-
-
33845248296
-
Trading off security in a service oriented architecture
-
In
-
Swart, G., Aziz, B., Foley, S., Herbert, J.: Trading off security in a service oriented architecture. In: 19th Annual IFIP WG 11.3 Working Conference on Data and Applications Security. (2005)
-
(2005)
19th Annual IFIP WG 11.3 Working Conference on Data and Applications Security
-
-
Swart, G.1
Aziz, B.2
Foley, S.3
Herbert, J.4
-
31
-
-
0001737878
-
Practical applications of constraint programming
-
Wallace, M.: Practical applications of constraint programming. Constraints 1(1-2) (1996) 139-168
-
(1996)
Constraints
, vol.1
, Issue.1-2
, pp. 139-168
-
-
Wallace, M.1
-
34
-
-
84882608073
-
-
U.S. Department of Defense, Technical Report CSCSTD-001-83, U.S. National Computer Security Center
-
U. S. Department of Defense: Trusted computer system criteria. Technical Report CSCSTD-001-83, U. S. National Computer Security Center (1983)
-
(1983)
Trusted computer system criteria
-
-
-
35
-
-
84974751467
-
The cascade vulnerability problem
-
Horton, R., et al.: The cascade vulnerability problem. Journal of Computer Security 2(4) (1993) 279-290
-
(1993)
Journal of Computer Security
, vol.2
, Issue.4
, pp. 279-290
-
-
Horton, R.1
-
36
-
-
0031095278
-
Semiring-based Constraint Solving and Optimization
-
Bistarelli, S., Montanari, U., Rossi, F.: Semiring-based Constraint Solving and Optimization. JACM 44(2) (I 997) 201-236
-
(1997)
JACM
, vol.44
, Issue.2
, pp. 201-236
-
-
Bistarelli, S.1
Montanari, U.2
Rossi, F.3
-
38
-
-
0027559721
-
A shortest path network security model
-
Fitch, J., Hoffman, L.: A shortest path network security model. Computers and Security 12 (1993) 169-189
-
(1993)
Computers and Security
, vol.12
, pp. 169-189
-
-
Fitch, J.1
Hoffman, L.2
|