Sciweavers

CSFW
1996
IEEE
13 years 11 months ago
Towards a model of storage jamming
John P. McDermott, David M. Goldschlag
CSFW
1996
IEEE
13 years 11 months ago
A High-Throughput Secure Reliable Multicast Protocol
Dalia Malki, Michael K. Reiter
CSFW
1996
IEEE
13 years 11 months ago
A Logic of Composition for Information Flow Predicates
Ramesh V. Peri, William A. Wulf, Darrell M. Kienzl...
CSFW
1996
IEEE
13 years 11 months ago
Comparing Two Information Flow Security Properties
In this paper we compare two information flow security properties: the lazy security (L-Sec) [11] and the Bisimulation Non-deducibility on Compositions (BNDC) [4]. To make this we...
Riccardo Focardi
CSFW
1996
IEEE
13 years 11 months ago
An Immunological Approach to Change Detection: Theoretical Results
: This paper examines some of the theoretical foundations of the distributable change detection method introduced by Forrest et al. in [10], including fundamental bounds on some of...
Patrik D'haeseleer