Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/sp/sp1981.bht:"
@inproceedings{DBLP:conf/sp/Ames81, author = {Stanley R. Ames Jr.}, title = {Security Kernels: {A} Solution or a Problem?}, booktitle = {1981 {IEEE} Symposium on Security and Privacy, Oakland, CA, USA, April 27-29, 1981}, pages = {141}, publisher = {{IEEE} Computer Society}, year = {1981}, url = {https://doi.org/10.1109/SP.1981.10016}, doi = {10.1109/SP.1981.10016}, timestamp = {Thu, 21 Sep 2023 15:57:32 +0200}, biburl = {https://dblp.org/rec/conf/sp/Ames81.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/BlakleyS81, author = {G. R. Blakley and Laif Swanson}, title = {Security Proofs for Information Protection Systems}, booktitle = {1981 {IEEE} Symposium on Security and Privacy, Oakland, CA, USA, April 27-29, 1981}, pages = {75--88}, publisher = {{IEEE} Computer Society}, year = {1981}, url = {https://doi.org/10.1109/SP.1981.10018}, doi = {10.1109/SP.1981.10018}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/BlakleyS81.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/Bonyun81, author = {David A. Bonyun}, title = {The Role of a Well Defined Auditing Process in the Enforcement of Privacy Policy and Data Security}, booktitle = {1981 {IEEE} Symposium on Security and Privacy, Oakland, CA, USA, April 27-29, 1981}, pages = {19--25}, publisher = {{IEEE} Computer Society}, year = {1981}, url = {https://doi.org/10.1109/SP.1981.10002}, doi = {10.1109/SP.1981.10002}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/Bonyun81.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/CoxS81, author = {Lyle A. Cox Jr. and Roger R. Schell}, title = {The Structure of a Security Kernel for the {Z8000} Multiprocessor}, booktitle = {1981 {IEEE} Symposium on Security and Privacy, Oakland, CA, USA, April 27-29, 1981}, pages = {124--132}, publisher = {{IEEE} Computer Society}, year = {1981}, url = {https://doi.org/10.1109/SP.1981.10015}, doi = {10.1109/SP.1981.10015}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/CoxS81.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/DavidaL81, author = {George I. Davida and Jon Livesey}, title = {The Design of Secure CPU-Multiplexed Computer Systems: The Master/Slave Architecture}, booktitle = {1981 {IEEE} Symposium on Security and Privacy, Oakland, CA, USA, April 27-29, 1981}, pages = {133--140}, publisher = {{IEEE} Computer Society}, year = {1981}, url = {https://doi.org/10.1109/SP.1981.10009}, doi = {10.1109/SP.1981.10009}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/DavidaL81.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/Denning81, author = {Dorothy E. Denning}, title = {Restriciting Queries that Might Lead to Compromise}, booktitle = {1981 {IEEE} Symposium on Security and Privacy, Oakland, CA, USA, April 27-29, 1981}, pages = {33--40}, publisher = {{IEEE} Computer Society}, year = {1981}, url = {https://doi.org/10.1109/SP.1981.10000}, doi = {10.1109/SP.1981.10000}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/Denning81.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/Dion81, author = {Luke C. Dion}, title = {A Complete Protection Model}, booktitle = {1981 {IEEE} Symposium on Security and Privacy, Oakland, CA, USA, April 27-29, 1981}, pages = {49--55}, publisher = {{IEEE} Computer Society}, year = {1981}, url = {https://doi.org/10.1109/SP.1981.10006}, doi = {10.1109/SP.1981.10006}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/Dion81.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/MeyerML81, author = {Carl H. Meyer and Stephen M. Matyas and Richard E. Lennon}, title = {Required Cryptographic Authentication Criteria for Electronic Funds Transfer Systems}, booktitle = {1981 {IEEE} Symposium on Security and Privacy, Oakland, CA, USA, April 27-29, 1981}, pages = {89--98}, publisher = {{IEEE} Computer Society}, year = {1981}, url = {https://doi.org/10.1109/SP.1981.10011}, doi = {10.1109/SP.1981.10011}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/MeyerML81.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/Millen81, author = {Jonathan K. Millen}, title = {Information Flow Analysis of Formal Specifications}, booktitle = {1981 {IEEE} Symposium on Security and Privacy, Oakland, CA, USA, April 27-29, 1981}, pages = {3--8}, publisher = {{IEEE} Computer Society}, year = {1981}, url = {https://doi.org/10.1109/SP.1981.10008}, doi = {10.1109/SP.1981.10008}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/Millen81.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/MillerR81, author = {James S. Miller and Robert G. Resnick}, title = {Military Message Systems: Applying a Security Model}, booktitle = {1981 {IEEE} Symposium on Security and Privacy, Oakland, CA, USA, April 27-29, 1981}, pages = {101--112}, publisher = {{IEEE} Computer Society}, year = {1981}, url = {https://doi.org/10.1109/SP.1981.10010}, doi = {10.1109/SP.1981.10010}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/MillerR81.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/Minsky81, author = {Naftaly H. Minsky}, title = {On the Transport of Privileges}, booktitle = {1981 {IEEE} Symposium on Security and Privacy, Oakland, CA, USA, April 27-29, 1981}, pages = {41--48}, publisher = {{IEEE} Computer Society}, year = {1981}, url = {https://doi.org/10.1109/SP.1981.10005}, doi = {10.1109/SP.1981.10005}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/Minsky81.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/ShirleyS81, author = {Lawrence J. Shirley and Roger R. Schell}, title = {Mechanism Sufficiency Validation by Assignment}, booktitle = {1981 {IEEE} Symposium on Security and Privacy, Oakland, CA, USA, April 27-29, 1981}, pages = {26--32}, publisher = {{IEEE} Computer Society}, year = {1981}, url = {https://doi.org/10.1109/SP.1981.10007}, doi = {10.1109/SP.1981.10007}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/ShirleyS81.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/Simmons81, author = {Gustavus J. Simmons}, title = {Half a Loaf is Better than None: Some Novel Message Integrity Problems}, booktitle = {1981 {IEEE} Symposium on Security and Privacy, Oakland, CA, USA, April 27-29, 1981}, pages = {65--69}, publisher = {{IEEE} Computer Society}, year = {1981}, url = {https://doi.org/10.1109/SP.1981.10012}, doi = {10.1109/SP.1981.10012}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/Simmons81.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/Solomon81, author = {Daniel J. Solomon}, title = {Processing Multilevel Secure Objects}, booktitle = {1981 {IEEE} Symposium on Security and Privacy, Oakland, CA, USA, April 27-29, 1981}, pages = {56--64}, publisher = {{IEEE} Computer Society}, year = {1981}, url = {https://doi.org/10.1109/SP.1981.10001}, doi = {10.1109/SP.1981.10001}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/Solomon81.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/Stoughton81, author = {Allen Stoughton}, title = {Access Flow: {A} Protection Model which Integrates Access Control and Information Flow}, booktitle = {1981 {IEEE} Symposium on Security and Privacy, Oakland, CA, USA, April 27-29, 1981}, pages = {9--18}, publisher = {{IEEE} Computer Society}, year = {1981}, url = {https://doi.org/10.1109/SP.1981.10004}, doi = {10.1109/SP.1981.10004}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/Stoughton81.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/Tasker81, author = {Peter S. Tasker}, title = {Trusted Computer Systems}, booktitle = {1981 {IEEE} Symposium on Security and Privacy, Oakland, CA, USA, April 27-29, 1981}, pages = {99--100}, publisher = {{IEEE} Computer Society}, year = {1981}, url = {https://doi.org/10.1109/SP.1981.10020}, doi = {10.1109/SP.1981.10020}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/Tasker81.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/Wood81, author = {Charles Cresson Wood}, title = {Future Applications of Cryptography}, booktitle = {1981 {IEEE} Symposium on Security and Privacy, Oakland, CA, USA, April 27-29, 1981}, pages = {70--74}, publisher = {{IEEE} Computer Society}, year = {1981}, url = {https://doi.org/10.1109/SP.1981.10013}, doi = {10.1109/SP.1981.10013}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/Wood81.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/Wu81, author = {Margaret S. Wu}, title = {Hierarchical Protection Systems}, booktitle = {1981 {IEEE} Symposium on Security and Privacy, Oakland, CA, USA, April 27-29, 1981}, pages = {113--123}, publisher = {{IEEE} Computer Society}, year = {1981}, url = {https://doi.org/10.1109/SP.1981.10017}, doi = {10.1109/SP.1981.10017}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/Wu81.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/sp/1981, title = {1981 {IEEE} Symposium on Security and Privacy, Oakland, CA, USA, April 27-29, 1981}, publisher = {{IEEE} Computer Society}, year = {1981}, url = {https://ieeexplore.ieee.org/xpl/conhome/6234377/proceeding}, isbn = {0-8186-0345-3}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/1981.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.