11. S&P 1990:
Oakland,
California,
USA
Proceedings of the 1990 IEEE Symposium on Security and Privacy,
Oakland,
California,
USA,
May 1990. IEEE Computer Society Press,
1990
- Paul A. Karger, Mary Ellen Zurko, Douglas W. Bonin, Andrew H. Mason, Clifford E. Kahn:
A VMM Security Kernel for the VAX Architecture.
2-19 BibTeX
- Morrie Gasser, E. McDermott:
An Architecture for Practical Delegation in a Distributed System.
20-30 BibTeX
- J. Linn:
Practical Authentication for Distributed Computing.
31-40 BibTeX
- W. C. Birnbaum:
SP3 Peer Identification.
41-49 BibTeX
- N. A. Waldhart:
The Army Secure Operating System.
50-60 BibTeX
- Benedetto L. DiVito, P. H. Palmquist, E. R. Anderson, M. L. Johnston:
Specification and Verification of the ASOS Kernel.
61-75 BibTeX
- Sushil Jajodia, Boris Kogan:
Integrating an Object-Oriented Data Model with Multilevel Security.
76-85 BibTeX
- Dan Gusfield:
A Little Knowledge Goes a Long Way: Faster Detection of Compromised Data in 2-D Tables.
86-94 BibTeX
- Catherine Meadows:
Extending the Brewer-Nash Model to a Multilevel Context.
95-103 BibTeX
- Sushil Jajodia, Ravi S. Sandhu:
Polyinstantiation Integrity in Multilevel Relations.
104-115 BibTeX
- R. W. Baldwin:
Naming and Grouping Privileges to Simplify Security Management in Large Databases.
116-132 BibTeX
- Rae K. Burns:
Referential Secrecy.
133-143 BibTeX
- J. Todd Wittbold, Dale M. Johnson:
Information Flow in Nondeterministic Systems.
144-161 BibTeX
- T. Fine:
Constructively Using Noninterference to Analyze Systems.
162-169 BibTeX
- James W. Gray III:
Probabilistic Interference.
170-179 BibTeX
- John McLean:
Security Models and Information Flow.
180-189 BibTeX
- Catherine D. McCollum, J. R. Messing, LouAnna Notargiacomo:
Beyond the Pale of MAC and DAC-Defining New Forms of Access Control.
190-200 BibTeX
- M. J. Nash, K. R. Poland:
Some Conundrums Concerning Separation of Duty.
201-209 BibTeX
- M. Branstad, W. C. Barker, P. Cochrane:
The Role of Trust in Protected Mail.
210-215 BibTeX
- P.-C. Cheng, Virgil D. Gligor:
On the Formal Specification and Verification of a Multiparty Session Protocol.
216-233 BibTeX
- Li Gong, Roger M. Needham, Raphael Yahalom:
Reasoning about Belief in Cryptographic Protocols.
234-248 BibTeX
- R. Ramaswamy:
A Security Architecture and Mechanism for Data Confidentiality in TCP/IP Protocols.
249-261 BibTeX
- K. F. Seiden, J. P. Melanson:
The Auditing Facility for a VMM Security Kernel.
262-277 BibTeX
- H. S. Teng, K. Chen, S. C. Y. Lu:
Adaptive Real-Time Anomaly Detection Using Inductively Generated Sequential Patterns.
278-284 BibTeX
- Shiuh-Pyng Shieh, Virgil D. Gligor:
Auditing the Use of Covert Storage Channels in Secure Systems.
285-295 BibTeX
- L. Todd Herberlein, Gihan V. Dias, Karl N. Levitt, Biswanath Mukherjee, Jeff Wood, David Wolber:
A Network Security Monitor.
296-305 BibTeX
- Benedetto L. DiVito, Cristi Garvey, D. Kwong, A. Murray, Jane Solomon, Amy Wu:
The Deductive Theory Manager: A Knowledge Based System for Formal Verification.
306-318 BibTeX
- H. Brix, A. Dietl:
Formal Construction of Provably Secure Systems with Cartesiana.
319-332 BibTeX
- Joshua D. Guttman, H.-P. Ko:
Verifying a Hardware Security Architecture.
333-344 BibTeX
- Phillip J. Windley:
A Hierarchical Methodology for Verifying Microprogrammed Microprocessors.
345-359 BibTeX
- Sushil Jajodia, Boris Kogan:
Transaction Processing in Multilevel-Secure Databases Using Replicated Architecture.
360-368 BibTeX
- Thomas F. Keefe, Wei-Tek Tsai:
Multiversion Concurrency Control for Multilevel Secure Database Systems.
369-383 BibTeX
- Gary W. Smith:
Modeling Security-Relevant Data Semantics.
384-393 BibTeX
- Rein Turn:
Information Privacy Issues for the 1990s.
394-400 BibTeX
Copyright © Sat May 16 23:42:04 2009
by Michael Ley (ley@uni-trier.de)