


default search action
8th CSFW 1995: Dromquinna Manor, Kenmare, County Kerry, Ireland
- The Eighth IEEE Computer Security Foundations Workshop (CSFW '95), March 13-15, 1995, Kenmare, County Kerry, Ireland. IEEE Computer Society 1995, ISBN 0-8186-7033-9

Composition
- Aris Zakinthinos, E. Stewart Lee:

The composability of non-interference [system security]. 2-8 - A. W. Roscoe, Lars Wulf:

Composing and decomposing systems under security properties. 9-15 - Alfred P. Maneki:

Algebraic properties of system composition in the LORAL, Ulysses and McLean trace models. 16-
Authentication Protocols
- Li Gong:

Optimal authentication protocols resistant to password guessing attacks. 24-29 - Liqun Chen, Dieter Gollmann, Chris J. Mitchell:

Key distribution without individual trusted authentification servers. 30-
Analysis of Cryptographic Protocols
- Colin Boyd:

Towards a classification of key agreement protocols. 38-43 - Wenbo Mao:

An augmentation of BAN-like logics. 44-
Issues in Implementations
- Riccardo Focardi, Roberto Gorrieri, V. Panini:

The security checker: a semantics-based tool for the verification of security properties. 60-69 - Trent Jaeger, Atul Prakash

:
Implementation of a discretionary access control model for script-based systems. 70-84 - John V. A. Janeri, Daylan B. Darby, Daniel D. Schnackenberg:

Building higher resolution synthetic clocks for signaling in covert timing channels. 85-
Models of Cryptographic Protocols
- A. W. Roscoe:

Modelling and verifying key-exchange protocols using CSP and FDR. 98-107 - James W. Gray III, John McLean:

Using temporal logic to specify and verify cryptographic protocols. 108-
Secure Systems
- Iwen E. Kang, Thomas F. Keefe:

Concurrency control for federated multilevel secure database systems. 118-135 - Simon N. Foley, Jeremy Jacob:

Specifying security for CSCW systems. 136-
Information Flow
- Paul F. Syverson, James W. Gray III:

The epistemic representation of information flow security in probabilistic systems. 152-166 - William R. Bevier, Richard M. Cohen, William D. Young:

Connection policies and controlled interference. 167-176

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














