-
1
-
-
85031933412
-
-
Technical Report 66 DEC Systems Research Center October
-
Martin Abadi and Leslie Lamport. Composing specifications. Technical Report 66, DEC Systems Research Center, October 1990.
-
(1990)
Composing Specifications
-
-
Abadi, M.1
Lamport, L.2
-
3
-
-
84976675687
-
Information transmission in computational systems
-
November
-
E. Cohen. Information transmission in computational systems. ACM SIGOPS Operating System Review, 11(5), November 1977.
-
(1977)
ACM SIGOPS Operating System Review
, vol.11
, Issue.5
-
-
Cohen, E.1
-
6
-
-
0025103204
-
Constructively using noninterference to analyze systems
-
IEEE Computer Society
-
Todd Fine. Constructively using noninterference to analyze systems. In Proceedings of the Symposium on Research in Security and Privacy, pages 162-169. IEEE Computer Society, 1990.
-
(1990)
Proceedings of the Symposium on Research in Security and Privacy
, pp. 162-169
-
-
Fine, T.1
-
11
-
-
0018005391
-
Communicating sequential processes
-
August
-
C.A.R. Hoare. Communicating sequential processes. Communications of the ACM, 21(8):666-677, August 1978.
-
(1978)
Communications of the ACM
, vol.21
, Issue.8
, pp. 666-677
-
-
Hoare, C.A.R.1
-
12
-
-
0022614502
-
Extending the noninterference version of MLS for SAT
-
IEEE Computer Society, April
-
J.T. Haigh and W.D. Young. Extending the noninterference version of MLS for SAT. In Proceedings of the Symposium on Security and Privacy, pages 232-239. IEEE Computer Society, April 1986.
-
(1986)
Proceedings of the Symposium on Security and Privacy
, pp. 232-239
-
-
Haigh, J.T.1
Young, W.D.2
-
13
-
-
0024663847
-
On the derivation of secure components
-
IEEE Computer Society, May
-
Jeremy Jacob. On the derivation of secure components. In Proceedings of the Symposium on Security and Privacy, pages 243-247. IEEE Computer Society, May 1989.
-
(1989)
Proceedings of the Symposium on Security and Privacy
, pp. 243-247
-
-
Jacob, J.1
-
18
-
-
0025438880
-
A hookup theorem for multilevel security
-
June
-
Daryl McCullough. A hookup theorem for multilevel security. IEEE Transactions on Software Engineering, 16(6):563-568, June 1990.
-
(1990)
IEEE Transactions on Software Engineering
, vol.16
, Issue.6
, pp. 563-568
-
-
McCullough, D.1
-
24
-
-
85058386275
-
-
Defence Research Agency, Malvern, Wore, UK, December
-
Colin O'Halloran. A calculus of information flow. Technical report 92001, Defence Research Agency, Malvern, Wore, UK, December 1992.
-
(1992)
A Calculus of Information Flow. Technical Report 92001
-
-
O'Halloran, C.1
-
25
-
-
0018019384
-
A model of verification of data security in operating systems
-
September
-
G. Popek and D. Farber. A model of verification of data security in operating systems. Communications of the ACM, 21(9), September 1978.
-
(1978)
Communications of the ACM
, vol.21
, Issue.9
-
-
Popek, G.1
Farber, D.2
-
26
-
-
0003502331
-
Noninterference, transitivity, and channel-control security policies
-
April
-
John Rushby. Noninterference, transitivity, and channel-control security policies. Technical report, SRI Computer Science Laboratory, April 1991.
-
(1991)
Technical Report, SRI Computer Science Laboratory
-
-
Rushby, J.1
-
28
-
-
0242328215
-
What are the foundations of computer security?: Introduction to panel discussion
-
IEEE Computer Society, June
-
M.E. Zurko, John McLean, Jonathan Millen, Robert Morris, and Marv Schaefer. What are the foundations of computer security?: Introduction to panel discussion. In Proceedings of the Computer Security Foundations Workshop VI, pages 85-95. IEEE Computer Society, June 1993.
-
(1993)
Proceedings of the Computer Security Foundations Workshop
, vol.6
, pp. 85-95
-
-
Zurko, M.E.1
McLean, J.2
Millen, J.3
Morris, R.4
Schaefer, M.5
|