10. S&P 1989:
Oakland,
California,
USA
Proceedings of the 1989 IEEE Symposium on Security and Privacy,
Oakland,
California,
USA,
May 1989. IEEE Computer Society Press,
1989
- S. T. Walker:
Network Security: The Parts of the Sum.
2-9 BibTeX
- T. M. P. Lee:
Statistical Models of Trust: TCBs vs. People.
10-19 BibTeX
- M. Schaefer:
Symbol Security Condition Considered Harmful.
20-47 BibTeX
- Paul A. Karger:
New Methods for Immediate Revocation.
48-55 BibTeX
- Li Gong:
A Secure Identity-Based Capability System.
56-65 BibTeX
- M. Branstad, Homayoon Tajalli, F. Mayer, D. Dalva:
Access Mediation in a Message Passing Kernel.
66-72 BibTeX
- Timothy E. Levin, S. J. Padilla, Cynthia E. Irvine:
A Formal Model for UNIX Setuid.
73-83 BibTeX
- G.-L. Grenier, Richard C. Holt, M. Funkenhauser:
Policy vs. Mechanism in the Secure TUNIS Operating System.
84-93 BibTeX
- Thomas J. Parenty:
The Incorporation of Multi-Level IPC into UNIX.
94-101 BibTeX
- Teresa F. Lunt:
Aggregation and Inference: Facts and Fallacies.
102-109 BibTeX
- Eduardo B. Fernández, Ehud Gudes, Haiyan Song:
A Security Model for Object-Oriented Databases.
110-115 BibTeX
- J. Wilson:
A Security Policy for an A1DBMS (a Trusted Subject).
116-125 BibTeX
- Tzong-An Su, JiYoung Chung, Gultekin Özsoyoglu:
On the Cell Suppression by Merging Technique in the Lattice Model of Summary Tables.
126-137 BibTeX
- Catherine Meadows:
Using Narrowing in the Analysis of Key Management Protocols.
138-147 BibTeX
- M. R. Cornwell:
A Software Engineering Approach to Designing Trustworthy Software.
148-156 BibTeX
- J. C. Williams, George W. Dinolt:
Formal Model of a Trusted File Server.
157-166 BibTeX
- O. Sami Saydjari, J. M. Beckman, J. R. Leaman:
LOCK Trak: Navigating Uncharted Space.
167-177 BibTeX
- M. Schaefer, W. C. Barker, Charles P. Pfleeger:
Tea and I: An Allergy.
178-182 BibTeX
- Deborah Estrin, Gene Tsudik:
Security Issues in Policy Routing.
183-193 BibTeX
- Glenn S. Benson, William F. Appelbe, Ian F. Akyildiz:
The Hierarchical Model of Distributed System Security.
194-205 BibTeX
- D. F. C. Brewer, M. J. Nash:
The Chinese Wall Security Policy.
206-214 BibTeX
- P. Terry, Simon R. Wiseman:
A "New" Security Policy Model.
215-228 BibTeX
- John E. Dobson, John A. McDermid:
A Framework for Expressing Models of Security Policy.
229-241 BibTeX
- J. Jacob:
On the Derivation of Secure Components.
242-247 BibTeX
- Simon N. Foley:
A Model for Secure Information Flow.
248-258 BibTeX
- Ravi S. Sandhu:
Transformation of Access Rights.
259-268 BibTeX
- Lee Badger:
A Model for Specifying Multi-Granularity Integrity Policies.
269-279 BibTeX
- H. S. Vaccaro, Gunar E. Liepins:
Detection of Anomalous Computer Session Activity.
280-289 BibTeX
- Dan M. Nessett:
Layering Central Authentication on Existing Distributed System Terminal Services.
290-299 BibTeX
- Lein Harn, Thomas Kiesler:
Authenticated Group Key Distribution Scheme for a Large Distributed Network.
300-311 BibTeX
- George I. Davida, Yvo Desmedt, Brian J. Matt:
Defending Systems against Viruses through Cryptographic Authentication.
312-318 BibTeX
- S. Crocker, M. Pozzo:
A Proposal for a Verification-Based Virus Filter.
319-325 BibTeX
- Mark W. Eichin, Jon A. Rochlis:
With Microscope and Tweezers: An Analysis of the Internet Virus of November 1988.
326-344 BibTeX
Copyright © Sat May 16 23:42:04 2009
by Michael Ley (ley@uni-trier.de)