default search action
5th S&P 1984: Oakland, California, USA
- Proceedings of the 1984 IEEE Symposium on Security and Privacy, Oakland, California, USA, April 29 - May 2, 1984. IEEE Computer Society 1984, ISBN 0-8186-0532-4
- Paul A. Karger, A. J. Herbert:
An Augmented Capability Architecture to Support Lattice Security and Traceability of Access. 2-12 - Barry D. Gold, Richard R. Linde, P. F. Cudney:
KVM/37O in Retrospect. 13-23 - S. Kramer:
Linus IV : An Experiment in Computer Security. 24-33 - Carl E. Landwehr, John M. Carroll:
Hardware Requirements for Secure Computer Systems: A Framework. 34-40 - M. Schaefer, Roger R. Schell:
Toward an Understanding of Extensible Architectures for Evaluated Trusted Computer System Products. 41-51 - Dorothy E. Denning:
Cryptographic Checksums for Multilevel Database Security. 52-61 - Richard D. Graubart:
The Integrity-Lock Approach to Secure Database Management. 62-74 - Joseph A. Goguen, José Meseguer:
Unwinding and Inference Control. 75-87 - Robert S. Winternitz:
A Secure One-Way Hash Function Built from DES. 88-90 - Neal R. Wagner:
Searching for Public-Key Cryptosystems. 91-98 - David Chaum:
A New Paradigm for Individuals in the Information Age. 99-106 - Richard Platek:
The Use of Ada as an Implementation Language in Formally Specified Systems. 107-110 - Lawrence Yelowitz:
Practical Experience with an Ada-Based Formal Specification/Language on a Large Project. 111-113 - Dan Craigen:
Ottawa Euclid and EVES: A Status Report. 114-124 - Terry Benzel:
Analysis of a Kernel Verification. 125-133 - Jonathan K. Millen:
The Interrogator: A Tool for Cryptographic Protocol Security. 134-141 - Deepinder P. Sidhu:
Executable Logic Specifications: A New Approach to Computer Security. 142-153 - D. E. Britton:
Formal Verification of a Secure Network with End-to-End Encryption. 154-166 - Glenn H. MacEwen, Bruce Burwell, Zhuo-Jun Lu:
Multi-Level Security Based on Physical Distribution. 167-179 - David Bailey:
Attacks on Computers: Congressional Hearings and Pending Legislation. 180-187 - John D. McLean, Carl E. Landwehr, Constance L. Heitmeyer:
A Formal Statement of the MMS Security Model. 188-194 - T. Taylor:
Comparison Paper between the Bell and LaPadula Model and the SRI Model. 195-203 - John O. Neilson, F. E. Wuebker:
Design Experiences from the Multilevel Secure MCF Operating System. 204-208 - Tanya Korelsky, David Sutherland:
Formal Specification of a Multi-Level Secure Operating System. 209-218 - B. A. Hartman:
A Gypsy-Based Kernel. 219-225 - George W. Dinolt, Richard B. Neely, P. C. Baker, James W. Freeman:
Multinet Gateway-Towards A1 Certification. 226
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.