


default search action
6th S&P 1985: Oakland, California, USA
- 1985 IEEE Symposium on Security and Privacy, Oakland, CA, USA, April 22-24, 1985. IEEE Computer Society 1985, ISBN 0-8186-0629-0

Structuring Systems for Formal Verification
- Richard B. Neely, James W. Freeman:

Structuring Systems for Formal Verification. 2-13 - Terry C. Vickers Benzel, Deborah A. Tavilla:

Trusted Software Verification: A Case Study. 14-31 - Virgil D. Gligor:

Analysis of the Hardware Verification of the Honeywell SCOMP. 32-45
Verification Tools
- John McHugh, Donald L. Good:

An Information Flow Tool for Gypsy. 46-48 - Norman Proctor:

The Restricted Access Processor An Example of Formal Verification. 49-55
Network Policies
- Deborah Estrin:

Non-Discretionary Controls for Inter-Organization Networks. 56-61 - Stephen T. Walker:

Network Security Overview. 62-76 - James P. Anderson:

A Unification of Computer and Network Security Concepts. 77-91
Applications of Cryptography
- Robert W. Baldwin, Wayne Gramlich:

Cryptographic Protocol for Trustable Match Making. 92-100 - Raymond M. Wong, Thomas A. Berson, Richard J. Feiertag:

Polonium: An Identity Authentication System. 101-107 - Gustavus J. Simmons:

How to (Selectively) Broadcast A Secret. 108-115
Cryptographic Algorithms
- G. R. Blakley, Catherine Meadows:

A Database Encryption Scheme Which Allows the Computation of Statistics Using Encrypted Data. 116-122 - Tatsuski Okamoto, Akira Shibaishi:

A Fast Signature Scheme Based on Quadratic Inequalities. 123-133
Database Security
- Dorothy E. Denning:

Commutative Filters for Reducing Inference Threats in Multilevel Database Systems. 134-146 - Richard D. Graubart, Kevin J. Duffy:

Design Overview for Retrofitting Integrity-Lock Architecture onto a Commercial DBMS. 147-159 - Gultekin Özsoyoglu, Tzong-An Su:

Rounding and Inference Controlin Conceptual Models for Statistical Databases. 160-175
Operating Systems Mechanisms
- William Earl Boebert, R. Y. Kaln, William D. Young, S. A. Hansohn:

Secure Ada Target: Issues, System Design, and Verification. 176-183 - E. R. Anderson:

Ada's Suitability for Trusted Computer Systems. 184-189 - Kishore S. Swaminathan:

Negotiated Access Control. 190-196 - Ravinderpal Singh Sandhu:

Analysis of Acyclic Attenuating Systems for the SSR Protection Model. 197-207
Security Policies I
- Deborah Downs, Jerzy R. Rub, Kenneth C. Kung, Carole S. Jordan:

Issues in Discretionary Access Control. 208-218 - Ben G. Matley:

Computer Privacy in America: Conflicting Practices and Policy Choices. 219-223 - Douglas W. Gage:

Security Considerations for Autonomous Robots. 224-229
Security Policies II
- Burton H. Patkau, David L. Tennenhouse:

The Implementation of Secure Entity-Relationship Databases. 230-236 - Mindy Rudell:

Labeling Screen Output. 237-

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














