J. C. Wray An Analysis of Covert Timing Channels. [Citation Graph (0, 0)][DBLP] IEEE Symposium on Security and Privacy, 1991, pp:2-7 [Conf]
W.-M. Hu Reducing Timing Channels with Fuzzy Time. [Citation Graph (0, 0)][DBLP] IEEE Symposium on Security and Privacy, 1991, pp:8-20 [Conf]
James W. Gray III Toward a Mathematical Foundation for Information Flow Security. [Citation Graph (0, 0)][DBLP] IEEE Symposium on Security and Privacy, 1991, pp:21-35 [Conf]
J. G. Williams Modeling Nondisclosure in Terms of the Subject-Instruction Stream. [Citation Graph (0, 0)][DBLP] IEEE Symposium on Security and Privacy, 1991, pp:64-77 [Conf]
Simon N. Foley A Taxonomy for Information Flow Policies and Models. [Citation Graph (0, 0)][DBLP] IEEE Symposium on Security and Privacy, 1991, pp:98-109 [Conf]
Jim Alves-Foss, Karl N. Levitt Verification of Secure Distributed Systems in Higher Order Logic: A Modular Approach Using Generic Components. [Citation Graph (0, 0)][DBLP] IEEE Symposium on Security and Privacy, 1991, pp:122-135 [Conf]
Paul F. Syverson The Use of Logic in the Analysis of Cryptographic Protocols. [Citation Graph (0, 0)][DBLP] IEEE Symposium on Security and Privacy, 1991, pp:156-170 [Conf]
Einar Snekkenes Exploring the BAN Approach to Protocol Analysis. [Citation Graph (0, 0)][DBLP] IEEE Symposium on Security and Privacy, 1991, pp:171-181 [Conf]
Catherine Meadows A System for the Specification and Verification of Key Management Protocols. [Citation Graph (0, 0)][DBLP] IEEE Symposium on Security and Privacy, 1991, pp:182-197 [Conf]
George T. Duncan, Sumitra Mukherjee Microdata Disclosure Limitation in Statistical Databases: Query Size and Random Sample Query Control. [Citation Graph (0, 0)][DBLP] IEEE Symposium on Security and Privacy, 1991, pp:278-287 [Conf]
Udo Kelter Discretionary Access Controls in a High-Performance Object Management System. [Citation Graph (2, 0)][DBLP] IEEE Symposium on Security and Privacy, 1991, pp:288-299 [Conf]
Ira S. Moskowitz Variable Noise Effects Upon a Simple Timing Channel. [Citation Graph (0, 0)][DBLP] IEEE Symposium on Security and Privacy, 1991, pp:362-372 [Conf]
Randy Brown The Turing Test and Non-Information Flow. [Citation Graph (0, 0)][DBLP] IEEE Symposium on Security and Privacy, 1991, pp:373-388 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP