Proceedings: 1994 IEEE Computer Society Symposium on Research in Security and Privacy, May 16-18, 1994, Oakland, California |
From inside the book
10 pages matching complementary suppressions in this book
Where's the rest of this book?
Results 1-3 of 10
Contents
N Heintze and J D Tygar | 12 |
Eliminating Formal Flows in Automated Information Flow Analysis | 30 |
Simple Timing Channels | 56 |
Copyright | |
10 other sections not shown
Other editions - View all
Common terms and phrases
agent algorithm allows analysis applications approach assume assumption beliefs called cell collection command composition Computer consider constraints construct contains copying correct covert channels create database defined definition denote described detection discussed distributed encryption event example execution exists expression fact Figure flow formal formula function given Hence IEEE inference channels initial input interoperation label logic machine means method Mode Mode Secure multilevel Note object observation obtained operation output phase possible present principal problem Proceedings produce proof properties protection protocol random reason received reference relation removed represent respectively result rules satisfies says selective semantics Separability sequence solution specification strings suppressions Table tests Theorem ticket tion tool trace true update valid