default search action
Search dblp for Publications
export results for "toc:db/conf/sp/sp1984.bht:"
@inproceedings{DBLP:conf/sp/Bailey84, author = {David Bailey}, title = {Attacks on Computers: Congressional Hearings and Pending Legislation}, booktitle = {Proceedings of the 1984 {IEEE} Symposium on Security and Privacy, Oakland, California, USA, April 29 - May 2, 1984}, pages = {180--187}, publisher = {{IEEE} Computer Society}, year = {1984}, url = {https://doi.org/10.1109/SP.1984.10012}, doi = {10.1109/SP.1984.10012}, timestamp = {Thu, 21 Sep 2023 15:57:32 +0200}, biburl = {https://dblp.org/rec/conf/sp/Bailey84.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/Benzel84, author = {Terry Benzel}, title = {Analysis of a Kernel Verification}, booktitle = {Proceedings of the 1984 {IEEE} Symposium on Security and Privacy, Oakland, California, USA, April 29 - May 2, 1984}, pages = {125--133}, publisher = {{IEEE} Computer Society}, year = {1984}, url = {https://doi.org/10.1109/SP.1984.10015}, doi = {10.1109/SP.1984.10015}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/Benzel84.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/Britton84, author = {D. E. Britton}, title = {Formal Verification of a Secure Network with End-to-End Encryption}, booktitle = {Proceedings of the 1984 {IEEE} Symposium on Security and Privacy, Oakland, California, USA, April 29 - May 2, 1984}, pages = {154--166}, publisher = {{IEEE} Computer Society}, year = {1984}, url = {https://doi.org/10.1109/SP.1984.10009}, doi = {10.1109/SP.1984.10009}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/Britton84.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/Chaum84, author = {David Chaum}, title = {A New Paradigm for Individuals in the Information Age}, booktitle = {Proceedings of the 1984 {IEEE} Symposium on Security and Privacy, Oakland, California, USA, April 29 - May 2, 1984}, pages = {99--106}, publisher = {{IEEE} Computer Society}, year = {1984}, url = {https://doi.org/10.1109/SP.1984.10025}, doi = {10.1109/SP.1984.10025}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/Chaum84.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/Craigen84, author = {Dan Craigen}, title = {Ottawa Euclid and {EVES:} {A} Status Report}, booktitle = {Proceedings of the 1984 {IEEE} Symposium on Security and Privacy, Oakland, California, USA, April 29 - May 2, 1984}, pages = {114--124}, publisher = {{IEEE} Computer Society}, year = {1984}, url = {https://doi.org/10.1109/SP.1984.10006}, doi = {10.1109/SP.1984.10006}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/Craigen84.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/Denning84, author = {Dorothy E. Denning}, title = {Cryptographic Checksums for Multilevel Database Security}, booktitle = {Proceedings of the 1984 {IEEE} Symposium on Security and Privacy, Oakland, California, USA, April 29 - May 2, 1984}, pages = {52--61}, publisher = {{IEEE} Computer Society}, year = {1984}, url = {https://doi.org/10.1109/SP.1984.10011}, doi = {10.1109/SP.1984.10011}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/Denning84.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/DinoltNBF84, author = {George W. Dinolt and Richard B. Neely and P. C. Baker and James W. Freeman}, title = {Multinet Gateway-Towards {A1} Certification}, booktitle = {Proceedings of the 1984 {IEEE} Symposium on Security and Privacy, Oakland, California, USA, April 29 - May 2, 1984}, pages = {226}, publisher = {{IEEE} Computer Society}, year = {1984}, url = {https://doi.org/10.1109/SP.1984.10005}, doi = {10.1109/SP.1984.10005}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/DinoltNBF84.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/GoguenM84, author = {Joseph A. Goguen and Jos{\'{e}} Meseguer}, title = {Unwinding and Inference Control}, booktitle = {Proceedings of the 1984 {IEEE} Symposium on Security and Privacy, Oakland, California, USA, April 29 - May 2, 1984}, pages = {75--87}, publisher = {{IEEE} Computer Society}, year = {1984}, url = {https://doi.org/10.1109/SP.1984.10019}, doi = {10.1109/SP.1984.10019}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/GoguenM84.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/GoldLC84, author = {Barry D. Gold and Richard R. Linde and P. F. Cudney}, title = {{KVM/37O} in Retrospect}, booktitle = {Proceedings of the 1984 {IEEE} Symposium on Security and Privacy, Oakland, California, USA, April 29 - May 2, 1984}, pages = {13--23}, publisher = {{IEEE} Computer Society}, year = {1984}, url = {https://doi.org/10.1109/SP.1984.10002}, doi = {10.1109/SP.1984.10002}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/GoldLC84.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/Graubart84, author = {Richard D. Graubart}, title = {The Integrity-Lock Approach to Secure Database Management}, booktitle = {Proceedings of the 1984 {IEEE} Symposium on Security and Privacy, Oakland, California, USA, April 29 - May 2, 1984}, pages = {62--74}, publisher = {{IEEE} Computer Society}, year = {1984}, url = {https://doi.org/10.1109/SP.1984.10017}, doi = {10.1109/SP.1984.10017}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/Graubart84.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/Hartman84, author = {B. A. Hartman}, title = {A Gypsy-Based Kernel}, booktitle = {Proceedings of the 1984 {IEEE} Symposium on Security and Privacy, Oakland, California, USA, April 29 - May 2, 1984}, pages = {219--225}, publisher = {{IEEE} Computer Society}, year = {1984}, url = {https://doi.org/10.1109/SP.1984.10004}, doi = {10.1109/SP.1984.10004}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/Hartman84.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/KargerH84, author = {Paul A. Karger and A. J. Herbert}, title = {An Augmented Capability Architecture to Support Lattice Security and Traceability of Access}, booktitle = {Proceedings of the 1984 {IEEE} Symposium on Security and Privacy, Oakland, California, USA, April 29 - May 2, 1984}, pages = {2--12}, publisher = {{IEEE} Computer Society}, year = {1984}, url = {https://doi.org/10.1109/SP.1984.10001}, doi = {10.1109/SP.1984.10001}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/KargerH84.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/KorelskyS84, author = {Tanya Korelsky and David Sutherland}, title = {Formal Specification of a Multi-Level Secure Operating System}, booktitle = {Proceedings of the 1984 {IEEE} Symposium on Security and Privacy, Oakland, California, USA, April 29 - May 2, 1984}, pages = {209--218}, publisher = {{IEEE} Computer Society}, year = {1984}, url = {https://doi.org/10.1109/SP.1984.10016}, doi = {10.1109/SP.1984.10016}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/KorelskyS84.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/Kramer84, author = {S. Kramer}, title = {Linus {IV} : An Experiment in Computer Security}, booktitle = {Proceedings of the 1984 {IEEE} Symposium on Security and Privacy, Oakland, California, USA, April 29 - May 2, 1984}, pages = {24--33}, publisher = {{IEEE} Computer Society}, year = {1984}, url = {https://doi.org/10.1109/SP.1984.10000}, doi = {10.1109/SP.1984.10000}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/Kramer84.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/LandwehrC84, author = {Carl E. Landwehr and John M. Carroll}, title = {Hardware Requirements for Secure Computer Systems: {A} Framework}, booktitle = {Proceedings of the 1984 {IEEE} Symposium on Security and Privacy, Oakland, California, USA, April 29 - May 2, 1984}, pages = {34--40}, publisher = {{IEEE} Computer Society}, year = {1984}, url = {https://doi.org/10.1109/SP.1984.10023}, doi = {10.1109/SP.1984.10023}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/LandwehrC84.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/MacEwenBL84, author = {Glenn H. MacEwen and Bruce Burwell and Zhuo{-}Jun Lu}, title = {Multi-Level Security Based on Physical Distribution}, booktitle = {Proceedings of the 1984 {IEEE} Symposium on Security and Privacy, Oakland, California, USA, April 29 - May 2, 1984}, pages = {167--179}, publisher = {{IEEE} Computer Society}, year = {1984}, url = {https://doi.org/10.1109/SP.1984.10013}, doi = {10.1109/SP.1984.10013}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/MacEwenBL84.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/McLeanLH84, author = {John D. McLean and Carl E. Landwehr and Constance L. Heitmeyer}, title = {A Formal Statement of the {MMS} Security Model}, booktitle = {Proceedings of the 1984 {IEEE} Symposium on Security and Privacy, Oakland, California, USA, April 29 - May 2, 1984}, pages = {188--194}, publisher = {{IEEE} Computer Society}, year = {1984}, url = {https://doi.org/10.1109/SP.1984.10022}, doi = {10.1109/SP.1984.10022}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/McLeanLH84.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/Millen84, author = {Jonathan K. Millen}, title = {The Interrogator: {A} Tool for Cryptographic Protocol Security}, booktitle = {Proceedings of the 1984 {IEEE} Symposium on Security and Privacy, Oakland, California, USA, April 29 - May 2, 1984}, pages = {134--141}, publisher = {{IEEE} Computer Society}, year = {1984}, url = {https://doi.org/10.1109/SP.1984.10003}, doi = {10.1109/SP.1984.10003}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/Millen84.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/NeilsonW84, author = {John O. Neilson and F. E. Wuebker}, title = {Design Experiences from the Multilevel Secure {MCF} Operating System}, booktitle = {Proceedings of the 1984 {IEEE} Symposium on Security and Privacy, Oakland, California, USA, April 29 - May 2, 1984}, pages = {204--208}, publisher = {{IEEE} Computer Society}, year = {1984}, url = {https://doi.org/10.1109/SP.1984.10018}, doi = {10.1109/SP.1984.10018}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/NeilsonW84.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/Platek84, author = {Richard Platek}, title = {The Use of Ada as an Implementation Language in Formally Specified Systems}, booktitle = {Proceedings of the 1984 {IEEE} Symposium on Security and Privacy, Oakland, California, USA, April 29 - May 2, 1984}, pages = {107--110}, publisher = {{IEEE} Computer Society}, year = {1984}, url = {https://doi.org/10.1109/SP.1984.10007}, doi = {10.1109/SP.1984.10007}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/Platek84.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/SchaeferS84, author = {M. Schaefer and Roger R. Schell}, title = {Toward an Understanding of Extensible Architectures for Evaluated Trusted Computer System Products}, booktitle = {Proceedings of the 1984 {IEEE} Symposium on Security and Privacy, Oakland, California, USA, April 29 - May 2, 1984}, pages = {41--51}, publisher = {{IEEE} Computer Society}, year = {1984}, url = {https://doi.org/10.1109/SP.1984.10024}, doi = {10.1109/SP.1984.10024}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/SchaeferS84.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/Sidhu84, author = {Deepinder P. Sidhu}, title = {Executable Logic Specifications: {A} New Approach to Computer Security}, booktitle = {Proceedings of the 1984 {IEEE} Symposium on Security and Privacy, Oakland, California, USA, April 29 - May 2, 1984}, pages = {142--153}, publisher = {{IEEE} Computer Society}, year = {1984}, url = {https://doi.org/10.1109/SP.1984.10020}, doi = {10.1109/SP.1984.10020}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/Sidhu84.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/Taylor84, author = {T. Taylor}, title = {Comparison Paper between the Bell and LaPadula Model and the {SRI} Model}, booktitle = {Proceedings of the 1984 {IEEE} Symposium on Security and Privacy, Oakland, California, USA, April 29 - May 2, 1984}, pages = {195--203}, publisher = {{IEEE} Computer Society}, year = {1984}, url = {https://doi.org/10.1109/SP.1984.10021}, doi = {10.1109/SP.1984.10021}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/Taylor84.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/Wagner84, author = {Neal R. Wagner}, title = {Searching for Public-Key Cryptosystems}, booktitle = {Proceedings of the 1984 {IEEE} Symposium on Security and Privacy, Oakland, California, USA, April 29 - May 2, 1984}, pages = {91--98}, publisher = {{IEEE} Computer Society}, year = {1984}, url = {https://doi.org/10.1109/SP.1984.10026}, doi = {10.1109/SP.1984.10026}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/Wagner84.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/Winternitz84, author = {Robert S. Winternitz}, title = {A Secure One-Way Hash Function Built from {DES}}, booktitle = {Proceedings of the 1984 {IEEE} Symposium on Security and Privacy, Oakland, California, USA, April 29 - May 2, 1984}, pages = {88--90}, publisher = {{IEEE} Computer Society}, year = {1984}, url = {https://doi.org/10.1109/SP.1984.10027}, doi = {10.1109/SP.1984.10027}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/Winternitz84.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/Yelowitz84, author = {Lawrence Yelowitz}, title = {Practical Experience with an Ada-Based Formal Specification/Language on a Large Project}, booktitle = {Proceedings of the 1984 {IEEE} Symposium on Security and Privacy, Oakland, California, USA, April 29 - May 2, 1984}, pages = {111--113}, publisher = {{IEEE} Computer Society}, year = {1984}, url = {https://doi.org/10.1109/SP.1984.10008}, doi = {10.1109/SP.1984.10008}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/Yelowitz84.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/sp/1984, title = {Proceedings of the 1984 {IEEE} Symposium on Security and Privacy, Oakland, California, USA, April 29 - May 2, 1984}, publisher = {{IEEE} Computer Society}, year = {1984}, url = {https://ieeexplore.ieee.org/xpl/conhome/6234786/proceeding}, isbn = {0-8186-0532-4}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/1984.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.