dblp.uni-trier.dewww.uni-trier.de

James W. Gray III Vis

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeerX - CSB - MetaPress - Google - Bing - Yahoo

*2001
18EEWai W. Fung, Mordecai J. Golin, James W. Gray III: Protection of Keys against Modification Attack. IEEE Symposium on Security and Privacy 2001: 26-
1999
17EEWai W. Fung, James W. Gray III: On m-Permutation Protection Scheme Against Modification Attack. ACISP 1999: 77-87
16 Patrick C. K. Hung, Kamalakar Karlapalem, James W. Gray III: Least Privilege Security in CapBasED-AMS. Int. J. Cooperative Inf. Syst. 8(2-3): 139-168 (1999)
1998
15EEWai W. Fung, James W. Gray III: Protection Against EEPROM Modification Attacks. ACISP 1998: 250-260
14EEPatrick C. K. Hung, Kamalakar Karlapalem, James W. Gray III: A Study of Least Privilege in CapBasED-AMS. CoopIS 1998: 208-217
13EEJames W. Gray III, Paul F. Syverson: A Logical Approach to Multilevel Security of Probabilistic Systems. Distributed Computing 11(2): 73-90 (1998)
12 James W. Gray III, Kin Fai Epsilon Ip, King-Shan Lui: Provable Security for Cryptographic Protocols - Exact Analysis and Engineering Applications. Journal of Computer Security 6(1-2): 23-52 (1998)
1997
11EEJames W. Gray III, Kin Fai Epsilon Ip, King-Shan Lui: Provable Security for Cryptographic Protocols: Exact Analysis and Engineering Applications. CSFW 1997: 45-58
10 James W. Gray III, Kin Fai Epsilon Ip: Protocols for issuing public-key certificates over the Internet. ICICS 1997: 424-434
9EEJames W. Gray III: On the Clark-Jacob Version of SPLICE/AS. Inf. Process. Lett. 62(5): 251-254 (1997)
1995
8EEJames W. Gray III, John McLean: Using temporal logic to specify and verify cryptographic protocols. CSFW 1995: 108-
7EEPaul F. Syverson, James W. Gray III: The epistemic representation of information flow security in probabilistic systems. CSFW 1995: 152-166
1993
6 James W. Gray III: On Analyzing the Bus-Contention Channel Under Fuzzy Time. CSFW 1993: 3-9
1992
5 James W. Gray III: Toward a Mathematical Foundation for Information. Journal of Computer Security 1(3-4): 255-294 (1992)
1991
4 James W. Gray III: On Information Flow Security Models. CSFW 1991: 55-60
3 James W. Gray III: Toward a Mathematical Foundation for Information Flow Security. IEEE Symposium on Security and Privacy 1991: 21-35
1990
2 James W. Gray III: Information Sharing in Secure Systems. CSFW 1990: 128-138
1 James W. Gray III: Probabilistic Interference. IEEE Symposium on Security and Privacy 1990: 170-179

Coauthor Index

1Wai W. Fung [15] [17] [18]
2Mordecai J. Golin [18]
3Patrick C. K. Hung [14] [16]
4Kin Fai Epsilon Ip [10] [11] [12]
5Kamalakar Karlapalem [14] [16]
6King-Shan Lui [11] [12]
7John McLean [8]
8Paul F. Syverson [7] [13]

Colors in the list of coauthors

Copyright © Tue Nov 3 08:52:44 2009 by Michael Ley (ley@uni-trier.de)