default search action
11th S&P 1990: Oakland, California, USA
- Proceedings of the 1990 IEEE Symposium on Security and Privacy, Oakland, California, USA, May 7-9, 1990. IEEE Computer Society 1990, ISBN 0-8186-2060-9
- Paul A. Karger, Mary Ellen Zurko, Douglas W. Bonin, Andrew H. Mason, Clifford E. Kahn:
A VMM Security Kernel for the VAX Architecture. 2-19 - Morrie Gasser, Ellen McDermott:
An Architecture for Practical Delegation in a Distributed System. 20-30 - J. Linn:
Practical Authentication for Distributed Computing. 31-40 - W. C. Birnbaum:
SP3 Peer Identification. 41-49 - N. A. Waldhart:
The Army Secure Operating System. 50-60 - Ben L. Di Vito, Paul H. Palmquist, Eric R. Anderson, Michael L. Johnston:
Specification and Verification of the ASOS Kernel. 61-75 - Sushil Jajodia, Boris Kogan:
Integrating an Object-Oriented Data Model with Multilevel Security. 76-85 - Dan Gusfield:
A Little Knowledge Goes a Long Way: Faster Detection of Compromised Data in 2-D Tables. 86-94 - Catherine Meadows:
Extending the Brewer-Nash Model to a Multilevel Context. 95-103 - Sushil Jajodia, Ravi S. Sandhu:
Polyinstantiation Integrity in Multilevel Relations. 104-115 - R. W. Baldwin:
Naming and Grouping Privileges to Simplify Security Management in Large Databases. 116-132 - Rae K. Burns:
Referential Secrecy. 133-143 - J. Todd Wittbold, Dale M. Johnson:
Information Flow in Nondeterministic Systems. 144-161 - Todd Fine:
Constructively Using Noninterference to Analyze Systems. 162-169 - James W. Gray III:
Probabilistic Interference. 170-179 - John McLean:
Security Models and Information Flow. 180-189 - Catherine D. McCollum, J. R. Messing, LouAnna Notargiacomo:
Beyond the Pale of MAC and DAC-Defining New Forms of Access Control. 190-200 - Michael J. Nash, K. R. Poland:
Some Conundrums Concerning Separation of Duty. 201-209 - Martha A. Branstad, W. Curtis Barker, Pamela Cochrane:
The Role of Trust in Protected Mail. 210-215 - Pau-Chen Cheng, Virgil D. Gligor:
On the Formal Specification and Verification of a Multiparty Session Protocol. 216-233 - Li Gong, Roger M. Needham, Raphael Yahalom:
Reasoning about Belief in Cryptographic Protocols. 234-248 - Raju Ramaswamy:
A Security Architecture and Mechanism for Data Confidentiality in TCP/IP Protocols. 249-261 - K. F. Seiden, J. P. Melanson:
The Auditing Facility for a VMM Security Kernel. 262-277 - Henry S. Teng, Kaihu Chen, Stephen C. Y. Lu:
Adaptive Real-Time Anomaly Detection Using Inductively Generated Sequential Patterns. 278-284 - Shiuh-Pyng Shieh, Virgil D. Gligor:
Auditing the Use of Covert Storage Channels in Secure Systems. 285-295 - L. Todd Herberlein, Gihan V. Dias, Karl N. Levitt, Biswanath Mukherjee, Jeff Wood, David Wolber:
A Network Security Monitor. 296-305 - Ben L. Di Vito, Cristi Garvey, D. Kwong, A. Murray, Jane Solomon, Amy Wu:
The Deductive Theory Manager: A Knowledge Based System for Formal Verification. 306-318 - H. Brix, Albert Dietl:
Formal Construction of Provably Secure Systems with Cartesiana. 319-332 - Joshua D. Guttman, H.-P. Ko:
Verifying a Hardware Security Architecture. 333-344 - Phillip J. Windley:
A Hierarchical Methodology for Verifying Microprogrammed Microprocessors. 345-359 - Sushil Jajodia, Boris Kogan:
Transaction Processing in Multilevel-Secure Databases Using Replicated Architecture. 360-368 - Thomas F. Keefe, Wei-Tek Tsai:
Multiversion Concurrency Control for Multilevel Secure Database Systems. 369-383 - Gary W. Smith:
Modeling Security-Relevant Data Semantics. 384-393 - Rein Turn:
Information Privacy Issues for the 1990s. 394-400
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.