


default search action
18th S&P 1997: Oakland, California, USA
- 1997 IEEE Symposium on Security and Privacy, May 4-7, 1997, Oakland, CA, USA. IEEE Computer Society 1997, ISBN 0-8186-7828-3

- Message from the Program Chairs.

- Conference Committee.

Panel/Debate
- John D. McLean:

Is the Trusted Computing Base Concept Fundamentally Flawed? 2 - Bob Blakley, Darrell M. Kienzle:

Some weaknesses of the TCB model. 3-5 - William R. Shockley, James P. Downey:

Is the Reference Monitor Concept Fatally Flawed? The Case for the Negative. 6-7
Authorization and Authentication
- Michael K. Reiter, Stuart G. Stubblebine:

Toward Acceptable Metrics of Authentication. 10-20 - Vincent Nicomette, Yves Deswarte:

An Authorization Scheme For Distributed Object Systems. 21-30 - Sushil Jajodia, Pierangela Samarati, V. S. Subrahmanian:

A Logical Language for Expressing Authorizations. 31-42
Applications
- Paul F. Syverson, David M. Goldschlag, Michael G. Reed:

Anonymous Connections and Onion Routing. 44-54 - Vikram R. Pesati, Thomas E. Keefe, Shankar Pal:

The Design and Implementation of a Multilevel Secure Log Manager. 55-64 - William A. Arbaugh, David J. Farber, Jonathan M. Smith:

A Secure and Reliable Bootstrap Architecture. 65-71 - Kelly Djahandari, Daniel F. Sterne:

An MBone Proxy for an Application Gateway Firewall. 72-81
Security Theory
- Mark Moriconi, Xiaolei Qian, Robert A. Riemenschneider, Li Gong:

Secure Software Architectures. 84-93 - Aris Zakinthinos, E. Stewart Lee:

A General Theory of Security Properties. 94-102 - Laurence Cholvy, Frédéric Cuppens:

Analyzing Consistency of Security Policies. 103-112
Panel
- Marvin Schaefer, Sylvan Pinsky, Drew Dean, Li Gong, Jim Roskind, Barbara Fox:

Ensuring Assurance in Mobile Computing. 114-118
Architectures
- Joshua D. Guttman:

Filtering Postures: Local Enforcement for Global Policies. 120-129 - Elena Ferrari, Pierangela Samarati, Elisa Bertino, Sushil Jajodia:

Providing flexibility in information flow control for object oriented systems. 130-140 - John C. Mitchell, Mark Mitchell, Ulrich Stern:

Automated analysis of cryptographic protocols using Mur-phi. 141-151
Intrusion Detection and Beyond
- Ulf Lindqvist

, Erland Jonsson:
How to Systematically Classify Computer Security Intrusions. 154-163 - Paul Ammann, Sushil Jajodia, Catherine D. McCollum, Barbara T. Blaustein:

Surviving information warfare attacks on databases. 164-174 - Calvin Ko, Manfred Ruschitzka, Karl N. Levitt:

Execution Monitoring of Security-Critical Programs in Distributed Systems: A Specification-Based Approach. 175-187 - John Hale, Sujeet Shenoi:

Catalytic Inference Analysis: Detecting Inference Threats due to Knowledge Discovery. 188-199
Panel
- Cynthia E. Irvine:

Security in Innovative New Operating Systems. 202-203 - George C. Necula, Peter Lee:

Research on Proof-Carrying Code for Untrusted-Code Security. 204 - Robert Grimm, Brian N. Bershad:

Access Control for the SPIN Extensible Operating System. 205 - Oliver Spatscheck, Larry L. Peterson:

Escort: Securing Scout Paths. 206
System Vulnerabilities
- Christoph L. Schuba, Ivan Krsul, Markus G. Kuhn, Eugene H. Spafford, Aurobindo Sundaram, Diego Zamboni:

Analysis of a Denial of Service Attack on TCP. 208-223 - Adam L. Young, Moti Yung:

Deniable Password Snatching: On the Possibility of Evasive Electronic Espionage. 224-235 - Sarvar Patel:

Number Theoretic Attacks on Secure Password Schemes. 236-247

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














