1. S&P 1980:
Oakland,
California,
USA
 Proceedings of the 1980 IEEE Symposium on Security and Privacy,
Oakland,
California,
USA,
April 1980. IEEE Computer Society Press,
1980 
- Rein Turn:
An Overview of Transborder Data Flow Issues.
3-8 BibTeX
 - Gerald Kreissig:
A Model to Describe Protection Problems.
9-17 BibTeX
 - Theodore D. Friedman, Lance J. Hoffman:
Towards a Fail-Safe Approach to Secure Databases.
18-21 BibTeX
 - L. Liu:
On Security Flow Analysis in Computer Systems (Preliminary Report).
22-33 BibTeX
 - David A. Bonyun:
The Secure Relational Database Management System Kernel: Three Years After.
34-37 BibTeX
 - Steven P. Reiss:
Practical Data-Swapping: The First Steps.
38-45 BibTeX
 - S. M. Miranda:
Aspects of Data Security in General-Purpose Data Base Management Systems.
46-58 BibTeX
 - Reind P. van de Riet, Martin L. Kersten, Anthony I. Wasserman:
A Module Definition Facility for Access Control in Distributed Data Base Systems.
59-66 BibTeX
 - P. Tucker Withington:
The Trusted Function in Secure Decentralized Processing.
67-82 BibTeX
 - Martin E. Hellman:
On the Difficulty of Computing Logarithms Over GF(qm).
83 BibTeX
 - Gustavus J. Simmons:
Secure Communications in the Presence of Pervasive Deceit.
84-93 BibTeX
 - Adi Shamir:
The Cryptographic Security of Compact Knapsacks (Preliminary Report).
94-99 BibTeX
 - George I. Davida, Richard A. DeMillo, Richard J. Lipton:
Protecting Shared Cryptographic Keys.
100-102 BibTeX
 - Dorothy E. Denning, Fred B. Schneider:
The Master Key Problem.
103-107 BibTeX
 - G. R. Blakley:
One Time Pads Are Key Safeguarding Schemes, Not Cryptosystems Fast Key Safeguarding Schemes (Threshold Schemes) Exist.
108-113 BibTeX
 - P. Barbarino:
Multi-Tiered Approach to System Security.
114-121 BibTeX
 - Ralph C. Merkle:
Protocols for Public Key Cryptosystems.
122-134 BibTeX
 - George I. Davida, Richard A. DeMillo, Richard J. Lipton:
A System Architecture to Support a Verifiably Secure Multilevel Security System.
137-144 BibTeX
 - Stanley R. Ames Jr., James G. Keeton-Williams:
Demonstrating Security for Trusted Applications on a Security Kernel Base.
145-156 BibTeX
 
Copyright © Sat May 16 23:42:04 2009
 by Michael Ley (ley@uni-trier.de)