The Craft of System Security by Sean Smith; John Marchesini List of Figures 1.1 An access control matrix 7 1.2 Security and state spaces 10 2.1 Example clearance order 26 2.2 Example categories order 27 2.3 Example MLS lattice 28 2.4 The *-Property
It can be remarkably hard to design a good communications protocol, much harder even than it is to write a normal sequential program. Unfortunately, when the design of a new protocol is complete, we usually have little trouble convincing ourselves t
Invited Paper Formal Analysis of Processor Timing Models Reinhard Wilhelm 1 Heuristics and Probabilities Typical Structural Properties of State Spaces Radek Pelánek 5 State Caching Reconsidered Jaco Geldenhuys 23 Directed Error Detection in C++ with