12. S&P 1991:
Oakland,
California,
USA
Proceedings of the 1991 IEEE Symposium on Security and Privacy,
Oakland,
California,
USA,
May 1991. IEEE Computer Society Press,
1991
- J. C. Wray:
An Analysis of Covert Timing Channels.
2-7 BibTeX
- W.-M. Hu:
Reducing Timing Channels with Fuzzy Time.
8-20 BibTeX
- James W. Gray III:
Toward a Mathematical Foundation for Information Flow Security.
21-35 BibTeX
- Phillip A. Porras, Richard A. Kemmerer:
Covert Flow Trees: A Technique for Identifying and Analyzing Covert Storage Channels.
36-51 BibTeX
- Paul A. Karger, J. C. Wray:
Storage Channels in Disk Arm Optimization.
52-63 BibTeX
- J. G. Williams:
Modeling Nondisclosure in Terms of the Subject-Instruction Stream.
64-77 BibTeX
- N. L. Kelem, Richard J. Feiertag:
A Separation Model for Virtual Machine Monitors.
78-86 BibTeX
- Paul Ammann, Ravi S. Sandhu:
Safety Analysis for the Extended Schematic Protection Model.
87-97 BibTeX
- Simon N. Foley:
A Taxonomy for Information Flow Policies and Models.
98-109 BibTeX
- Yves Deswarte, Laurent Blain, Jean-Charles Fabre:
Intrusion Tolerance in Distributed Computing Systems.
110-121 BibTeX
- Jim Alves-Foss, Karl N. Levitt:
Verification of Secure Distributed Systems in Higher Order Logic: A Modular Approach Using Generic Components.
122-135 BibTeX
- Simon S. Lam, A. Udaya Shankar, Thomas Y. C. Woo:
Applying a Theory of Modules and Interfaces to Security Verification.
136-155 BibTeX
- Paul F. Syverson:
The Use of Logic in the Analysis of Cryptographic Protocols.
156-170 BibTeX
- Einar Snekkenes:
Exploring the BAN Approach to Protocol Analysis.
171-181 BibTeX
- Catherine Meadows:
A System for the Specification and Verification of Key Management Protocols.
182-197 BibTeX
- Edward Amoroso, T. Nguyen, Jonathan Weiss, John Watson, P. Lapiska, T. Starr:
Toward an Approach to Measuring Software Trust.
198-218 BibTeX
- Daniel F. Sterne:
On the Buzzword "Security Policy".
219-231 BibTeX
- Joseph Tardo, K. Alagappan:
SPX: Global Authentication Using Public Key Certificates.
232-244 BibTeX
- C. Fritzner, L. Nilsen, Å. Skomedal:
Protecting Security Information in Distributed Systems.
245-254 BibTeX
- Vijay Varadharajan, Phillip Allen, Stewart Black:
An Analysis of the Proxy Problem in Distributed Systems.
255-277 BibTeX
- George T. Duncan, Sumitra Mukherjee:
Microdata Disclosure Limitation in Statistical Databases: Query Size and Random Sample Query Control.
278-287 BibTeX
- Udo Kelter:
Discretionary Access Controls in a High-Performance Object Management System.
288-299 BibTeX
- Sushil Jajodia, Ravi S. Sandhu:
A Novel Decomposition of Multilevel Relations into Single-Level Relations.
300-315 BibTeX
- H. S. Javitz, A. Valdes:
The SRI IDES Statistical Anomaly Detector.
316-326 BibTeX
- Shiuh-Pyng Shieh, Virgil D. Gligor:
A Pattern-Oriented Intrusion-Detection Model and Its Applications.
327-342 BibTeX
- Jeffrey O. Kephart, Steve R. White:
Directed-Graph Epidemiological Models of Computer Viruses.
343-361 BibTeX
- Ira S. Moskowitz:
Variable Noise Effects Upon a Simple Timing Channel.
362-372 BibTeX
- Randy Brown:
The Turing Test and Non-Information Flow.
373-388 BibTeX
Copyright © Sat May 16 23:42:05 2009
by Michael Ley (ley@uni-trier.de)