5. S&P 1984:
Oakland,
California,
USA
Proceedings of the 1984 IEEE Symposium on Security and Privacy,
Oakland,
California,
USA,
April 1984. IEEE Computer Society Press,
1984
- Paul A. Karger, A. J. Herbert:
An Augmented Capability Architecture to Support Lattice Security and Traceability of Access.
2-12 BibTeX
- B. D. Gold, R. Linde, P. F. Cudney:
KVM/37O in Retrospect.
13-23 BibTeX
- S. Kramer:
Linus IV : An Experiment in Computer Security.
24-33 BibTeX
- Carl E. Landwehr, John M. Carroll:
Hardware Requirements for Secure Computer Systems: A Framework.
34-40 BibTeX
- M. Schaefer, Roger R. Schell:
Toward an Understanding of Extensible Architectures for Evaluated Trusted Computer System Products.
41-51 BibTeX
- Dorothy E. Denning:
Cryptographic Checksums for Multilevel Database Security.
52-61 BibTeX
- Richard D. Graubart:
The Integrity-Lock Approach to Secure Database Management.
62-74 BibTeX
- Joseph A. Goguen, José Meseguer:
Unwinding and Inference Control.
75-87 BibTeX
- Robert S. Winternitz:
A Secure One-Way Hash Function Built from DES.
88-90 BibTeX
- Neal R. Wagner:
Searching for Public-Key Cryptosystems.
91-98 BibTeX
- David Chaum:
A New Paradigm for Individuals in the Information Age.
99-106 BibTeX
- Richard Platek:
The Use of Ada as an Implementation Language in Formally Specified Systems.
107-110 BibTeX
- Lawrence Yelowitz:
Practical Experience with an Ada-Based Formal Specification/Language on a Large Project.
111-113 BibTeX
- Dan Craigen:
Ottawa Euclid and EVES: A Status Report.
114-124 BibTeX
- Terry Benzel:
Analysis of a Kernel Verification.
125-133 BibTeX
- Jonathan K. Millen:
The Interrogator: A Tool for Cryptographic Protocol Security.
134-141 BibTeX
- Deepinder P. Sidhu:
Executable Logic Specifications: A New Approach to Computer Security.
142-153 BibTeX
- D. E. Britton:
Formal Verification of a Secure Network with End-to-End Encryption.
154-166 BibTeX
- Glenn H. MacEwen, B. Burwell, Z.-J. Lu:
Multi-Level Security Based on Physical Distribution.
167-179 BibTeX
- D. Bailey:
Attacks on Computers: Congressional Hearings and Pending Legislation.
180-187 BibTeX
- John D. McLean, Carl E. Landwehr, Constance L. Heitmeyer:
A Formal Statement of the MMS Security Model.
188-194 BibTeX
- T. Taylor:
Comparison Paper between the Bell and LaPadula Model and the SRI Model.
195-203 BibTeX
- J. O. Neilson, F. E. Wuebker:
Design Experiences from the Multilevel Secure MCF Operating System.
204-208 BibTeX
- Tanya Korelsky, David Sutherland:
Formal Specification of a Multi-Level Secure Operating System.
209-218 BibTeX
- B. A. Hartman:
A Gypsy-Based Kernel.
219-225 BibTeX
- George W. Dinolt, Richard B. Neely, P. C. Baker, J. Freeman:
Multinet Gateway-Towards A1 Certification.
226-226 BibTeX
Copyright © Sat May 16 23:42:04 2009
by Michael Ley (ley@uni-trier.de)