James W. Gray III

According to our database1, James W. Gray III authored at least 18 papers between 1990 and 2001.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2001
Protection of Keys against Modification Attack.
Proceedings of the 2001 IEEE Symposium on Security and Privacy, 2001

1999
Least Privilege Security in CapBasED-AMS.
Int. J. Cooperative Inf. Syst., 1999

On <i>m</i>-Permutation Protection Scheme Against Modification Attack.
Proceedings of the Information Security and Privacy, 4th Australasian Conference, 1999

1998
Provable Security for Cryptographic Protocols - Exact Analysis and Engineering Applications.
J. Comput. Secur., 1998

A Logical Approach to Multilevel Security of Probabilistic Systems.
Distributed Comput., 1998

A Study of Least Privilege in CapBasED-AMS.
Proceedings of the 3rd IFCIS International Conference on Cooperative Information Systems, 1998

Protection Against EEPROM Modification Attacks.
Proceedings of the Information Security and Privacy, Third Australasian Conference, 1998

1997
On the Clark-Jacob Version of SPLICE/AS.
Inf. Process. Lett., 1997

Protocols for issuing public-key certificates over the Internet.
Proceedings of the Information and Communication Security, First International Conference, 1997

1995
The epistemic representation of information flow security in probabilistic systems.
Proceedings of the Eighth IEEE Computer Security Foundations Workshop (CSFW '95), 1995

Using temporal logic to specify and verify cryptographic protocols.
Proceedings of the Eighth IEEE Computer Security Foundations Workshop (CSFW '95), 1995

1993
On introducing noise into the bus-contention channel.
Proceedings of the 1993 IEEE Computer Society Symposium on Research in Security and Privacy, 1993

On Analyzing the Bus-Contention Channel Under Fuzzy Time.
Proceedings of the 6th IEEE Computer Security Foundations Workshop, 1993

1992
Toward a Mathematical Foundation for Information.
J. Comput. Secur., 1992

1991
Toward a Mathematical Foundation for Information Flow Security.
Proceedings of the 1991 IEEE Symposium on Security and Privacy, 1991

On Information Flow Security Models.
Proceedings of the 4th IEEE Computer Security Foundations Workshop, 1991

1990
Probabilistic Interference.
Proceedings of the 1990 IEEE Symposium on Security and Privacy, 1990

Information Sharing in Secure Systems.
Proceedings of the Third IEEE Computer Security Foundations Workshop, 1990


  Loading...