


default search action
13th S&P 1992: Oakland, California, USA
- 1992 IEEE Computer Society Symposium on Research in Security and Privacy, Oakland, CA, USA, May 4-6, 1992. IEEE Computer Society 1992, ISBN 0-8186-2825-1

- Virgil D. Gligor, Shyh-Wei Luan, Joseph N. Pato:

On inter-realm authentication in large distributed systems. 2-17 - Michael K. Reiter, Kenneth P. Birman, Li Gong:

Integrating security in a group oriented distributed system. 18-32 - Thomas Y. C. Woo, Simon S. Lam:

Authorization in distributed systems: a formal approach. 33-50 - Wei-Ming Hu:

Lattice scheduling and covert channels. 52-61 - Ira S. Moskowitz, Allen R. Miller:

The influence of delay upon an idealized channel's bandwidth. 62-67 - Steven M. Bellovin, Michael Merritt:

Encrypted key exchange: password-based protocols secure against dictionary attacks. 72-84 - Stuart G. Stubblebine, Virgil D. Gligor:

On message integrity in cryptographic protocols. 85-104 - Einar Snekkenes:

Roles in cryptographic protocols. 105-119 - Ravi S. Sandhu:

The typed access matrix model. 122-136 - Jonathan K. Millen:

A resource allocation model for denial of service. 137-147 - Ravi S. Sandhu, Gurpreet S. Suri:

Non-monotonic transformation of access rights. 148-161 - James W. Gray III, Paul F. Syverson:

A logical approach to multilevel security of probabilistic systems. 164-176 - Catherine Meadows:

Using traces based on procedure calls to reason about composability. 177-188 - Oliver Costich, John P. McDermott:

A multilevel transaction problem for multilevel secure database systems and its solution for the replicated architecture. 192-203 - Paul Ammann, Frank Jaeckle, Sushil Jajodia:

A two snapshot algorithm for concurrency control in multi-level secure databases. 204-215 - Sushil Jajodia, Vijayalakshmi Atluri:

Alternative correctness criteria for concurrent execution of transactions in multilevel secure databases. 216-224 - Jeremy Epstein, John McHugh, Rita Pascale, Charles R. Martin, D. Rothnie, Hilarie K. Orman, Ann B. Marmor-Squires, Martha A. Branstad, Bonnie P. Danner:

Evolution of a trusted B3 window system prototype. 226-239 - Hervé Debar, Monique Becker, Didier Siboni:

A neural network component for an intrusion detection system. 240-250 - Glenn S. Benson:

An optimal solution to the secure reader-writer problem. 251-258 - Jonathan K. Millen, Teresa F. Lunt:

Security for object-oriented database systems. 260-272 - Frédéric Cuppens, Kioumars Yazdanian:

A 'natural' decomposition of multi-level relations. 273-284 - Clark Weissman:

BLACKER: security for the DDN examples of A1 security engineering trades. 286-292

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














