8. S&P 1987:
Oakland,
California,
USA
Proceedings of the 1987 IEEE Symposium on Security and Privacy,
Oakland,
California,
USA,
April 1987. IEEE Computer Society Press,
1987
- Paul T. Cummings, D. A. Fullam, M. J. Goldstein, M. J. Gosselin, Jeffrey Picciotto, John P. L. Woodward, J. Wynn:
Compartimented Mode Workstation: Results Through Prototyping.
2-12 BibTeX
- Jeffrey Picciotto:
The Design of an Effective Auditing Subsystem.
13-22 BibTeX
- John P. L. Woodward:
Exploiting the Dual Nature of Sensitivity Labels.
23-31 BibTeX
- Paul A. Karger:
Limiting the Damage Potential of Discretionary Trojan Horses.
32-37 BibTeX
- Steve R. White, Liam Comerford:
ABYSS: A Trusted Architecture for Software Protection.
38-51 BibTeX
- Steve H. Weingart:
Physical Security for the µABYSS System.
52-59 BibTeX
- Jonathan K. Millen:
Covert Channel Capacity.
60-66 BibTeX
- J. Guttman:
Information Flow and Invariance.
67-73 BibTeX
- Chii-Ren Tsai, Virgil D. Gligor, C. Sekar Chandersekaran:
A Formal Method for the Identification of Covert Storage Channels in Source Code.
74-87 BibTeX
- Louise E. Moser:
Graph Homomorphisms and the Design of Secure Computer Systems.
88-96 BibTeX
- J. C. Williams, George W. Dinolt:
A Graph-Theoretic Formulation of Multilevel Secure Distributed Systems: An Overview.
97-105 BibTeX
- William R. Bevier, Warren A. Hunt Jr., William D. Young:
Toward Verified Execution Environments.
106-115 BibTeX
- Simon N. Foley:
A Universal Theory of Information Flow.
116-122 BibTeX
- John McLean:
Reasoning About Security Models.
123-133 BibTeX
- Richard A. Kemmerer:
Using Formal Verification Techniques to Analyze Encryption Protocols.
134-139 BibTeX
- William D. Young, John McHugh:
Coding for a Believable Specification to Implementation Mapping.
140-149 BibTeX
- Glenn H. MacEwen, V. W. W. Poon, Janice I. Glasgow:
A Model for Multilevel Security Based on Operator Nets.
150-160 BibTeX
- Daryl McCullough:
Specifications for Multi-Level Security and a Hook-Up Property.
161-166 BibTeX
- David P. Anderson, P. Venkat Rangan:
A Basis for Secure Communication in Large Distributed Systems.
167-173 BibTeX
- Deborah Estrin, Gene Tsudik:
Visa Scheme for Inter-Organization Network Security.
174-183 BibTeX
- D. D. Clark, D. R. Wilson:
A Comparison of Commercial and Military Computer Security Policies.
184-195 BibTeX
- Selim G. Akl, Dorothy E. Denning:
Checking Classification Constraints for Consistency and Completeness.
196-201 BibTeX
- Tzong-An Su, Gultekin Özsoyoglu:
Data Dependencies and Inference Control in Multilevel Relational Database Systems.
202-211 BibTeX
- Catherine Meadows:
The Integrity Lock Architecture and Its Application to Message Systems: Reducing Covert Channels.
212-219 BibTeX
- Dorothy E. Denning, Teresa F. Lunt, Roger R. Schell, Mark Heckman, William R. Shockley:
A Multilevel Relational Data Model.
220-234 BibTeX
- Thomas A. Berson, Teresa F. Lunt:
Multilevel Security for Knowledge-Based Systems.
235-242 BibTeX
Copyright © Sat May 16 23:42:04 2009
by Michael Ley (ley@uni-trier.de)