default search action
6th S&P 1985: Oakland, California, USA
- 1985 IEEE Symposium on Security and Privacy, Oakland, CA, USA, April 22-24, 1985. IEEE Computer Society 1985, ISBN 0-8186-0629-0
Structuring Systems for Formal Verification
- Richard B. Neely, James W. Freeman:
Structuring Systems for Formal Verification. 2-13 - Terry C. Vickers Benzel, Deborah A. Tavilla:
Trusted Software Verification: A Case Study. 14-31 - Virgil D. Gligor:
Analysis of the Hardware Verification of the Honeywell SCOMP. 32-45
Verification Tools
- John McHugh, Donald L. Good:
An Information Flow Tool for Gypsy. 46-48 - Norman Proctor:
The Restricted Access Processor An Example of Formal Verification. 49-55
Network Policies
- Deborah Estrin:
Non-Discretionary Controls for Inter-Organization Networks. 56-61 - Stephen T. Walker:
Network Security Overview. 62-76 - James P. Anderson:
A Unification of Computer and Network Security Concepts. 77-91
Applications of Cryptography
- Robert W. Baldwin, Wayne Gramlich:
Cryptographic Protocol for Trustable Match Making. 92-100 - Raymond M. Wong, Thomas A. Berson, Richard J. Feiertag:
Polonium: An Identity Authentication System. 101-107 - Gustavus J. Simmons:
How to (Selectively) Broadcast A Secret. 108-115
Cryptographic Algorithms
- G. R. Blakley, Catherine Meadows:
A Database Encryption Scheme Which Allows the Computation of Statistics Using Encrypted Data. 116-122 - Tatsuski Okamoto, Akira Shibaishi:
A Fast Signature Scheme Based on Quadratic Inequalities. 123-133
Database Security
- Dorothy E. Denning:
Commutative Filters for Reducing Inference Threats in Multilevel Database Systems. 134-146 - Richard D. Graubart, Kevin J. Duffy:
Design Overview for Retrofitting Integrity-Lock Architecture onto a Commercial DBMS. 147-159 - Gultekin Özsoyoglu, Tzong-An Su:
Rounding and Inference Controlin Conceptual Models for Statistical Databases. 160-175
Operating Systems Mechanisms
- William Earl Boebert, R. Y. Kaln, William D. Young, S. A. Hansohn:
Secure Ada Target: Issues, System Design, and Verification. 176-183 - E. R. Anderson:
Ada's Suitability for Trusted Computer Systems. 184-189 - Kishore S. Swaminathan:
Negotiated Access Control. 190-196 - Ravinderpal Singh Sandhu:
Analysis of Acyclic Attenuating Systems for the SSR Protection Model. 197-207
Security Policies I
- Deborah Downs, Jerzy R. Rub, Kenneth C. Kung, Carole S. Jordan:
Issues in Discretionary Access Control. 208-218 - Ben G. Matley:
Computer Privacy in America: Conflicting Practices and Policy Choices. 219-223 - Douglas W. Gage:
Security Considerations for Autonomous Robots. 224-229
Security Policies II
- Burton H. Patkau, David L. Tennenhouse:
The Implementation of Secure Entity-Relationship Databases. 230-236 - Mindy Rudell:
Labeling Screen Output. 237-
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.