4. CSFW 1991:
Franconia,
New Hampshire,
USA
 4th IEEE Computer Security Foundations Workshop - CSFW'91,
Franconia,
New Hampshire,
USA,
18-20 June 1991,
Proceedings. IEEE Computer Society,
ISBN 0-8186-2215-6 
- Pierre Bieber, Frédéric Cuppens:
A Definition of Secure Dependencies Using the Logic of Security.
2-11           
- Gilles Trouessin:
Quantitative Evaluation of Confidentiality by Entropy Calculation.
12-21           
- Jonathan T. Trostle:
Multiple Trojan Horse Systems and Covert Channel Analysis.
22-33           
- John Graham-Cumming, Jeff W. Sanders:
On the Refinement of Non-Interference.
35-42           
- P. G. Allen:
A Comparison of non-Interference and Non-Deducibility using CSP.
43-54           
- James W. Gray III:
On Information Flow Security Models.
55-60           
- Sarbari Gupta, Virgil D. Gligor:
Towards a Theory of Penetration-Resistant Systems and its Applications.
62-78           
- Simon N. Foley:
Separation of Duty using High Water Marks.
79-88           
- Jeremy Jacob:
The Basic Integrity Theorem.
89-97           
- Li Gong:
Handling Infeasible Specifications fo Cryptographic Protocols.
99-102           
- Rajashekar Kailar, Virgil D. Gligor:
On Belief Evolution in Authentication Protocols.
103-116           
- Thomas D. Garvey, Teresa F. Lunt, Mark E. Stickel:
Abductive and Approximate Reasoning Models for Characterizing Inference Channels.
118-126           
- Bhavani M. Thuraisingham:
A Nonmonotonic Typed Multilevel Logic for Multilevel Secure Database/Knowledge-Based Management Systems.
127-138           
- Ravi S. Sandhu, Roshan K. Thomas, Sushil Jajodia:
A Secure Kernelized Architecture for Multiple Object-Oriented Databases.
139-152           
- Vijay Varadharajan:
Hook-Up Property of Information Flow Secure Nets.
154-175           
- Glenn H. MacEwen, Janice I. Glasgow:
A Proof of Secrecy for a Network Security Model.
176-181           
- E. John Sebes, Richard J. Feiertag:
Implicit Discretionary Access Propagation: A new Interpretation of DAC.
183-187           
- John A. McDermid, Qi Shi:
A Formal Model of Security Dependency for Analysis and Testing of Secure Systems.
188-200           
- Oliver Costich, Ira S. Moskowitz:
Analysis of a Storage Channel in the Two-Phase Commit Protocol.
201-208           
- P. M. Melliar-Smith, Louise E. Moser:
Protection against Covert Storage and Timing Channels.
209-214           
- Leonard J. LaPadula, James G. Williams:
Toward a Universal Integrity Model.
216-218           
- Virgil D. Gligor, Rajashekar Kailar, Stuart G. Stubblebine, Li Gong:
Logics for Cryptographic Protocols - Virtues and Limitations.
219-226           
- Catherine Meadows:
The NRL Protocol Analysis Tool: A Position Paper.
227           
- Paul F. Syverson:
The Value of Semantics for the Analysis of Cryptographic Protocols.
228-229           
- Yacov Yacobi:
Complexity Theoretic Analysis of Crypto-Protcols - Overview.
230-233           
- Catherine Meadows:
Panel Discussion on the Polyinstantiation Problem: An Introduction.
234           
- Sushil Jajodia:
Panel Discussion on the Polyinstantiation Problem: A Position Paper.
235           
- Teresa F. Lunt:
Polyinstantiation: An Inevitable Part of a Multilevel World.
236-238           
- Dick O'Brien:
The LDV Approach to Polyinstantiation.
239-240           
- Simon R. Wiseman:
The Conflict Between Confidentiality and Integrity.
241-242           
Copyright © Sun Mar 14 22:59:20 2010
 by Michael Ley (ley@uni-trier.de)