


default search action
11th S&P 1990: Oakland, California, USA
- Proceedings of the 1990 IEEE Symposium on Security and Privacy, Oakland, California, USA, May 7-9, 1990. IEEE Computer Society 1990, ISBN 0-8186-2060-9

- Paul A. Karger, Mary Ellen Zurko, Douglas W. Bonin, Andrew H. Mason, Clifford E. Kahn:

A VMM Security Kernel for the VAX Architecture. 2-19 - Morrie Gasser, Ellen McDermott:

An Architecture for Practical Delegation in a Distributed System. 20-30 - J. Linn:

Practical Authentication for Distributed Computing. 31-40 - W. C. Birnbaum:

SP3 Peer Identification. 41-49 - N. A. Waldhart:

The Army Secure Operating System. 50-60 - Ben L. Di Vito, Paul H. Palmquist, Eric R. Anderson, Michael L. Johnston:

Specification and Verification of the ASOS Kernel. 61-75 - Sushil Jajodia, Boris Kogan:

Integrating an Object-Oriented Data Model with Multilevel Security. 76-85 - Dan Gusfield:

A Little Knowledge Goes a Long Way: Faster Detection of Compromised Data in 2-D Tables. 86-94 - Catherine Meadows:

Extending the Brewer-Nash Model to a Multilevel Context. 95-103 - Sushil Jajodia, Ravi S. Sandhu:

Polyinstantiation Integrity in Multilevel Relations. 104-115 - R. W. Baldwin:

Naming and Grouping Privileges to Simplify Security Management in Large Databases. 116-132 - Rae K. Burns:

Referential Secrecy. 133-143 - J. Todd Wittbold, Dale M. Johnson:

Information Flow in Nondeterministic Systems. 144-161 - Todd Fine:

Constructively Using Noninterference to Analyze Systems. 162-169 - James W. Gray III:

Probabilistic Interference. 170-179 - John McLean:

Security Models and Information Flow. 180-189 - Catherine D. McCollum, J. R. Messing, LouAnna Notargiacomo:

Beyond the Pale of MAC and DAC-Defining New Forms of Access Control. 190-200 - Michael J. Nash, K. R. Poland:

Some Conundrums Concerning Separation of Duty. 201-209 - Martha A. Branstad, W. Curtis Barker, Pamela Cochrane:

The Role of Trust in Protected Mail. 210-215 - Pau-Chen Cheng, Virgil D. Gligor:

On the Formal Specification and Verification of a Multiparty Session Protocol. 216-233 - Li Gong, Roger M. Needham, Raphael Yahalom:

Reasoning about Belief in Cryptographic Protocols. 234-248 - Raju Ramaswamy:

A Security Architecture and Mechanism for Data Confidentiality in TCP/IP Protocols. 249-261 - K. F. Seiden, J. P. Melanson:

The Auditing Facility for a VMM Security Kernel. 262-277 - Henry S. Teng, Kaihu Chen, Stephen C. Y. Lu:

Adaptive Real-Time Anomaly Detection Using Inductively Generated Sequential Patterns. 278-284 - Shiuh-Pyng Shieh, Virgil D. Gligor:

Auditing the Use of Covert Storage Channels in Secure Systems. 285-295 - L. Todd Herberlein, Gihan V. Dias, Karl N. Levitt, Biswanath Mukherjee, Jeff Wood, David Wolber:

A Network Security Monitor. 296-305 - Ben L. Di Vito, Cristi Garvey, D. Kwong, A. Murray, Jane Solomon, Amy Wu:

The Deductive Theory Manager: A Knowledge Based System for Formal Verification. 306-318 - H. Brix, Albert Dietl:

Formal Construction of Provably Secure Systems with Cartesiana. 319-332 - Joshua D. Guttman

, H.-P. Ko:
Verifying a Hardware Security Architecture. 333-344 - Phillip J. Windley:

A Hierarchical Methodology for Verifying Microprogrammed Microprocessors. 345-359 - Sushil Jajodia, Boris Kogan:

Transaction Processing in Multilevel-Secure Databases Using Replicated Architecture. 360-368 - Thomas F. Keefe, Wei-Tek Tsai:

Multiversion Concurrency Control for Multilevel Secure Database Systems. 369-383 - Gary W. Smith:

Modeling Security-Relevant Data Semantics. 384-393 - Rein Turn:

Information Privacy Issues for the 1990s. 394-400

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














