7. S&P 1986:
Oakland,
California,
USA
Proceedings of the 1986 IEEE Symposium on Security and Privacy,
Oakland,
California,
USA,
April 1986. IEEE Computer Society Press,
1986
- Jeannette M. Wing, Mark R. Nixon:
Extending Ina Jo with Temporal Logic.
2-13 BibTeX
- J. Thomas Haigh, Richard A. Kemmerer, John McHugh, William D. Young:
An Experience Using Two Covert Channel Analysis Techniques on a Real System Design.
14-24 BibTeX
- J. Daniel Halpern, Sam Owre, Norman Proctor, William F. Wilson:
Muse : A Computer Assisted Verification System.
25-33 BibTeX
- John McHugh, Andrew P. Moore:
A Security Policy and Formal Top Level Specification for a Multi-Level Secure Local Area Network.
34-39 BibTeX
- Virgil D. Gligor, C. Sekar Chandersekaran, W. Cheng, Wen-Der Jiang, Abhai Johri, Gary L. Luckenbaugh, L. Edward Reich:
A New Security Testing Method and Its Application to the Secure Xenix Kernel.
40-59 BibTeX
- J. Thomas Haigh, William D. Young:
Extending the Non-Interference Version of MLS for SAT.
60-60 BibTeX
- Ravi S. Sandhu, M. E. Share:
Some Owner Based Schemes with Dynamic Groups in the Schematic Protection Model.
61-70 BibTeX
- L. S. Chalmers:
An Analysis of the Differences Between the Computer Security Practices in the Military and Private Sectors.
71-77 BibTeX
- S. A. Rajunas, Norman Hardy, Allen C. Bomberger, William S. Frantz, Charles R. Landau:
Security in KeyKOS.
78-85 BibTeX
- Simon R. Wiseman:
A Secure Capability Computer System.
86-94 BibTeX
- Richard Y. Kain, Carl E. Landwehr:
On Access Checking in Capability-Based Systems.
95-101 BibTeX
- Virgil D. Gligor, E. L. Burch, C. Sekar Chandersekaran, Robert S. Chapman, Leslie J. Dotterer, Matthew S. Hecht, Wen-Der Jiang, Gary L. Luckenbaugh, N. Vasudevan:
On the Design and the Implementation of Secure Xenix Workstations.
102-117 BibTeX
- Dorothy E. Denning:
An Intrusion-Detection Model.
118-133 BibTeX
- Catherine Meadows:
A More Efficient Cryptographic Matchmaking Protocol for Use in the Absence of a Continuously Available Third Party.
134-137 BibTeX
- Wen-Pai Lu, Malur K. Sundareshan:
A Hierarchical Key Management Scheme for End-to-End Encryption in Internet Environments.
138-147 BibTeX
- Neal R. Wagner, Paul Putter, Marianne R. Cain:
Encrypted Database Design: Specialized Approaches.
148-155 BibTeX
- Dorothy E. Denning, Selim G. Akl, Matthew Morgenstern, Peter G. Neumann, Roger R. Schell, Mark Heckman:
Views for Multilevel Database Security.
156-172 BibTeX
- Norman S. Matloff:
Another Look at the Use of Noise Addition for Database Security.
173-181 BibTeX
- R. A. Carlson, Teresa F. Lunt:
The Trusted Domain Machine: A Secure Communication Device for Security Guard Applications.
182-186 BibTeX
- John E. Dobson, Brian Randell:
Building Reliable Secure Computing Systems out of Unreliable Insecure Components.
187-193 BibTeX
- J.-M. Fray, Yves Deswarte, David Powell:
Intrusion-Tolerance Using Fine-Grain Fragmentation-Scattering.
194-203 BibTeX
- Dan M. Nessett:
Factors Affecting Distributed System Security.
204-222 BibTeX
- Andrew Birrell, Butler W. Lampson, Roger M. Needham, Michael D. Schroeder:
A Global Authentication Service without Global Trust.
223-230 BibTeX
Copyright © Sat May 16 23:42:04 2009
by Michael Ley (ley@uni-trier.de)