Sciweavers

5 search results - page 1 / 1
» csfw 1996
Sort
View
CSFW
1996
IEEE
13 years 8 months ago
A High-Throughput Secure Reliable Multicast Protocol
Dalia Malki, Michael K. Reiter
CSFW
1996
IEEE
13 years 8 months ago
Towards a model of storage jamming
John P. McDermott, David M. Goldschlag
CSFW
1996
IEEE
13 years 8 months ago
A Logic of Composition for Information Flow Predicates
Ramesh V. Peri, William A. Wulf, Darrell M. Kienzl...
CSFW
1996
IEEE
13 years 8 months ago
Comparing Two Information Flow Security Properties
In this paper we compare two information flow security properties: the lazy security (L-Sec) [11] and the Bisimulation Non-deducibility on Compositions (BNDC) [4]. To make this we...
Riccardo Focardi
CSFW
1996
IEEE
13 years 8 months ago
An Immunological Approach to Change Detection: Theoretical Results
: This paper examines some of the theoretical foundations of the distributable change detection method introduced by Forrest et al. in [10], including fundamental bounds on some of...
Patrik D'haeseleer