An analysis of the proxy problem in distributed systems (Englisch)
- Neue Suche nach: Varadharajan, V.
- Neue Suche nach: Allen, P.
- Neue Suche nach: Black, S.
- Neue Suche nach: Varadharajan, V.
- Neue Suche nach: Allen, P.
- Neue Suche nach: Black, S.
In:
Proceedings. 1991 IEEE Computer Society Symposium on Research in Security and Privacy
;
255-275
;
1991
-
ISBN:
- Aufsatz (Konferenz) / Print
-
Titel:An analysis of the proxy problem in distributed systems
-
Weitere Titelangaben:Eine Analyse des Proxy-Problems in verteilten Systemen
-
Beteiligte:
-
Erschienen in:
-
Verlag:
- Neue Suche nach: IEEE Comput. Soc. Press
-
Erscheinungsort:Los Alamitos
-
Erscheinungsdatum:1991
-
Format / Umfang:21 Seiten, 7 Quellen
-
ISBN:
-
DOI:
-
Medientyp:Aufsatz (Konferenz)
-
Format:Print
-
Sprache:Englisch
-
Schlagwörter:
-
Datenquelle:
Inhaltsverzeichnis Konferenzband
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 0_1
-
Proceedings. 1991 IEEE Computer Society Symposium on Research in Security and Privacy (Cat. No.91CH2986-8)| 1991
- 2
-
An analysis of covert timing channelsWray, J.C. et al. | 1991
- 8
-
Reducing timing channels with fuzzy timeHu, W.M. et al. | 1991
- 21
-
Toward a mathematical foundation for information flow securityGray, J.W. III et al. | 1991
- 36
-
Covert flow trees: a technique for identifying and analyzing covert storage channelsPorras, P.A. / Kemmerer, R.A. et al. | 1991
- 52
-
Storage channels in disk arm optimizationKarger, P.A. / Wray, J.C. et al. | 1991
- 64
-
Modeling nondisclosure in terms of the subject-instruction streamWilliams, J.G. et al. | 1991
- 78
-
A separation model for virtual machine monitorsKelem, N.L. / Feiertag, R.J. et al. | 1991
- 87
-
Safety analysis for the extended schematic protection modelAmmann, P.E. / Sandhu, R.S. et al. | 1991
- 98
-
A taxonomy for information flow policies and modelsFoley, S.N. et al. | 1991
- 110
-
Intrusion tolerance in distributed computing systemsDeswarte, Y. / Blain, L. / Fabre, J.C. et al. | 1991
- 122
-
Verification of secure distributed systems in higher order logic: A modular approach using generic componentsAlves-Foss, J. / Levitt, K. et al. | 1991
- 136
-
Applying a theory of modules and interfaces to security verificationLam, S.S. / Shankar, A.U. / Woo, T.Y.C. et al. | 1991
- 156
-
The use of logic in the analysis of cryptographic protocolsSyverson, P. et al. | 1991
- 171
-
Exploring the BAN approach to protocol analysisSnekkenes, E. et al. | 1991
- 182
-
A system for the specification and analysis of key management protocolsMeadows, C. et al. | 1991
- 198
-
Toward an approach to measuring software trustAmoroso, E. / Nguyen, T. / Weiss, J. / Watson, J. / Lapiska, P. / Starr, T. et al. | 1991
- 219
-
On the buzzword 'security policy'Sterne, D.F. et al. | 1991
- 232
-
SPX: global authentication using public key certificatesTardo, J.J. / Alagappan, K. et al. | 1991
- 245
-
Protecting security information in distributed systemsFritzner, C. / Nilsen, L. / Skomedal, A. et al. | 1991
- 255
-
An analysis of the proxy problem in distributed systemsVaradharajan, V. / Allen, P. / Black, S. et al. | 1991
- 278
-
Microdata disclosure limitation in statistical databases: query size and random sample query controlDuncan, G.T. / Mukherjee, S. et al. | 1991
- 288
-
Discretionary access controls in a high-performance object management systemKelter, U. et al. | 1991
- 300
-
A novel decomposition of multilevel relations into single-level relationsJajodia, S. / Sandhu, R. et al. | 1991
- 316
-
The SRI IDES statistical anomaly detectorJavitz, H.S. / Valdes, A. et al. | 1991
- 327
-
A pattern-oriented intrusion-detection model and its applicationsShieh, S.W. / Gligor, V.D. et al. | 1991
- 343
-
Directed-graph epidemiological models of computer virusesKephart, J.O. / White, S.R. et al. | 1991
- 362
-
Variable noise effects upon a simple timing channelMoskowitz, I.S. et al. | 1991
- 373
-
The Turing Test and non-information flowBrowne, R. et al. | 1991