A comment on the `basic security theorem' of Bell and LaPadula
Information Processing Letters
Designing secure message systems: the military message systems (MMS) project
Proc. of the IFIP WG 6.5 working conference on Computer-based message services
Formal Models for Computer Security
ACM Computing Surveys (CSUR)
A model for verification of data security in operating systems
Communications of the ACM
A lattice model of secure information flow
Communications of the ACM
Proving multilevel security of a system design
SOSP '77 Proceedings of the sixth ACM symposium on Operating systems principles
Information transmission in computational systems
SOSP '77 Proceedings of the sixth ACM symposium on Operating systems principles
The use of quick prototypes in the secure military message systems project
Proceedings of the workshop on Rapid prototyping
SIGCOMM '86 Proceedings of the ACM SIGCOMM conference on Communications architectures & protocols
A Model for Multilevel Security in Computer Networks
IEEE Transactions on Software Engineering
A formal protection model of security in centralized, parallel, and distributed systems
ACM Transactions on Computer Systems (TOCS)
Automated consistency checking of requirements specifications
ACM Transactions on Software Engineering and Methodology (TOSEM)
Prospect on security paradigms
NSPW '92-93 Proceedings on the 1992-1993 workshop on New security paradigms
Modelling multidomain security
NSPW '92-93 Proceedings on the 1992-1993 workshop on New security paradigms
A new security policy for distributed resource management and access control
NSPW '96 Proceedings of the 1996 workshop on New security paradigms
Discussion topic: what is the old security paradigm?
Proceedings of the 1998 workshop on New security paradigms
Mathematics, Technology, and Trust: Formal Verification, Computer Security, and the U.S. Military
IEEE Annals of the History of Computing
On a Network Security Model for the Secure Information Flow on Multilevel Secure Network
ICICS '01 Proceedings of the Third International Conference on Information and Communications Security
Some lessons from formalizing a security model
ACM SIGSOFT Software Engineering Notes - Proceedings of VERkshop III -- a formal verification workshop
Core role-based access control: efficient implementations by transformations
Proceedings of the 2006 ACM SIGPLAN symposium on Partial evaluation and semantics-based program manipulation
Developing safety-critical systems: the role of formal methods and tools
SCS '05 Proceedings of the 10th Australian workshop on Safety critical systems and software - Volume 55
Proceedings of the 13th ACM conference on Computer and communications security
A high assurance MLS file server
ACM SIGOPS Operating Systems Review
A domain and type enforcement UNIX prototype
SSYM'95 Proceedings of the 5th conference on USENIX UNIX Security Symposium - Volume 5
On the Role of Formal Methods in Software Certification: An Experience Report
Electronic Notes in Theoretical Computer Science (ENTCS)
Requirements modeling for embedded realtime systems
MBEERTS'07 Proceedings of the 2007 International Dagstuhl conference on Model-based engineering of embedded real-time systems
SP'88 Proceedings of the 1988 IEEE conference on Security and privacy
SP 800-12. An Introduction to Computer Security: the NIST Handbook
SP 800-12. An Introduction to Computer Security: the NIST Handbook
The Journal of Supercomputing
Hi-index | 0.00 |