1. S&P 1980:
Oakland,
California,
USA
Proceedings of the 1980 IEEE Symposium on Security and Privacy,
Oakland,
California,
USA,
April 1980. IEEE Computer Society Press,
1980
- Rein Turn:
An Overview of Transborder Data Flow Issues.
3-8 BibTeX
- Gerald Kreissig:
A Model to Describe Protection Problems.
9-17 BibTeX
- Theodore D. Friedman, Lance J. Hoffman:
Towards a Fail-Safe Approach to Secure Databases.
18-21 BibTeX
- L. Liu:
On Security Flow Analysis in Computer Systems (Preliminary Report).
22-33 BibTeX
- David A. Bonyun:
The Secure Relational Database Management System Kernel: Three Years After.
34-37 BibTeX
- Steven P. Reiss:
Practical Data-Swapping: The First Steps.
38-45 BibTeX
- S. M. Miranda:
Aspects of Data Security in General-Purpose Data Base Management Systems.
46-58 BibTeX
- Reind P. van de Riet, Martin L. Kersten, Anthony I. Wasserman:
A Module Definition Facility for Access Control in Distributed Data Base Systems.
59-66 BibTeX
- P. Tucker Withington:
The Trusted Function in Secure Decentralized Processing.
67-82 BibTeX
- Martin E. Hellman:
On the Difficulty of Computing Logarithms Over GF(qm).
83 BibTeX
- Gustavus J. Simmons:
Secure Communications in the Presence of Pervasive Deceit.
84-93 BibTeX
- Adi Shamir:
The Cryptographic Security of Compact Knapsacks (Preliminary Report).
94-99 BibTeX
- George I. Davida, Richard A. DeMillo, Richard J. Lipton:
Protecting Shared Cryptographic Keys.
100-102 BibTeX
- Dorothy E. Denning, Fred B. Schneider:
The Master Key Problem.
103-107 BibTeX
- G. R. Blakley:
One Time Pads Are Key Safeguarding Schemes, Not Cryptosystems Fast Key Safeguarding Schemes (Threshold Schemes) Exist.
108-113 BibTeX
- P. Barbarino:
Multi-Tiered Approach to System Security.
114-121 BibTeX
- Ralph C. Merkle:
Protocols for Public Key Cryptosystems.
122-134 BibTeX
- George I. Davida, Richard A. DeMillo, Richard J. Lipton:
A System Architecture to Support a Verifiably Secure Multilevel Security System.
137-144 BibTeX
- Stanley R. Ames Jr., James G. Keeton-Williams:
Demonstrating Security for Trusted Applications on a Security Kernel Base.
145-156 BibTeX
Copyright © Sat May 16 23:42:04 2009
by Michael Ley (ley@uni-trier.de)