


default search action
3rd S&P 1982: Oakland, California, USA
- 1982 IEEE Symposium on Security and Privacy, Oakland, CA, USA, April 26-28, 1982. IEEE Computer Society 1982, ISBN 0-8186-0410-7

Security Models
- Steven B. Lipner:

Non-Discretionery Controls for Commercial Applications. 2-10 - Joseph A. Goguen, José Meseguer:

Security Policies and Security Models. 11-20 - Richard D. Graubart, John P. L. Woodward:

A Preliminary Neval Surveillance OBMS Sacurity. 21-37 - Dorothy E. Denning, Jan Schlörer, Elisabeth Wehrle:

Memoryless Inference Controls for Statistical Databases. 38-45
Systems and their Analysis
- Klaus R. Dittrich, Karlheinz Hug, Peter Kammerer, Dieter Lienert, Hans Mau, Klaus Wachsmuth:

Protection in the OSKAR Operating System: Goals, Concepts, Conseqeuences. 46-56 - Jonathan K. Millen:

Kernel Isolation for the PDP-11/70. 57-65 - Richard A. Kemmerer:

A Practical Approach to Identifying Storage and Timing Channels. 66-73 - Christopher Landauer, Stephen D. Crocker:

Precise Information Flow Analysis by Program Verification. 74-80 - Jane Solomon:

Specification-to-Code Correlation. 81-85
Privacy, Progress, and Reality
- Rein Turn:

Privacy Protection in the 1980s. 86-89 - Deepinder P. Sidhu:

Specification of Key Distribution Protocols for Networks. 90 - James P. Anderson:

Accelerating Computer Security Innovation. 91-98
Cryptography
- George B. Purdy, Gustavus J. Simmons, James Studier:

A Software Protection Scheme. 99-103 - Neal R. Wagner:

Shared Database Access using Composed Encryption Functions. 104-110 - George I. Davida, Yi-Shiung Yeh:

Cryptographic Relational Algebra. 111-116 - Gustavus J. Simmons, Diane B. Holdridge:

Forward Search as a Cryptanalytic Tool Against a Public Key. 117-128 - Selim G. Akl:

Digital Signitures with Blindfolded Arbitrators Who Cannot Form Alliances. 129-136
Secure Networks and Communications
- Deepinder P. Sidhu, Morrie Gasser:

A Multilevel Secure Local Area Network. 137-143 - Gary Grossman:

A Practical Executive for Secure Communications. 144-155 - C. A. Asmuth, G. R. Blakley:

Pooling, Splitting, and Restituting Information to Overcome Total Failure of Some Channels of Communication. 156-

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














