11. S&P 1990:
Oakland,
California,
USA
Proceedings of the 1990 IEEE Symposium on Security and Privacy,
Oakland,
California,
USA,
May 1990. IEEE Computer Society Press,
1990
- Paul A. Karger, Mary Ellen Zurko, Douglas W. Bonin, Andrew H. Mason, Clifford E. Kahn:
A VMM Security Kernel for the VAX Architecture.
2-19
- Morrie Gasser, E. McDermott:
An Architecture for Practical Delegation in a Distributed System.
20-30
- J. Linn:
Practical Authentication for Distributed Computing.
31-40
- W. C. Birnbaum:
SP3 Peer Identification.
41-49
- N. A. Waldhart:
The Army Secure Operating System.
50-60
- Benedetto L. DiVito, P. H. Palmquist, E. R. Anderson, M. L. Johnston:
Specification and Verification of the ASOS Kernel.
61-75
- Sushil Jajodia, Boris Kogan:
Integrating an Object-Oriented Data Model with Multilevel Security.
76-85
- Dan Gusfield:
A Little Knowledge Goes a Long Way: Faster Detection of Compromised Data in 2-D Tables.
86-94
- Catherine Meadows:
Extending the Brewer-Nash Model to a Multilevel Context.
95-103
- Sushil Jajodia, Ravi S. Sandhu:
Polyinstantiation Integrity in Multilevel Relations.
104-115
- R. W. Baldwin:
Naming and Grouping Privileges to Simplify Security Management in Large Databases.
116-132
- Rae K. Burns:
Referential Secrecy.
133-143
- J. Todd Wittbold, Dale M. Johnson:
Information Flow in Nondeterministic Systems.
144-161
- T. Fine:
Constructively Using Noninterference to Analyze Systems.
162-169
- James W. Gray III:
Probabilistic Interference.
170-179
- John McLean:
Security Models and Information Flow.
180-189
- Catherine D. McCollum, J. R. Messing, LouAnna Notargiacomo:
Beyond the Pale of MAC and DAC-Defining New Forms of Access Control.
190-200
- M. J. Nash, K. R. Poland:
Some Conundrums Concerning Separation of Duty.
201-209
- M. Branstad, W. C. Barker, P. Cochrane:
The Role of Trust in Protected Mail.
210-215
- P.-C. Cheng, Virgil D. Gligor:
On the Formal Specification and Verification of a Multiparty Session Protocol.
216-233
- Li Gong, Roger M. Needham, Raphael Yahalom:
Reasoning about Belief in Cryptographic Protocols.
234-248
- R. Ramaswamy:
A Security Architecture and Mechanism for Data Confidentiality in TCP/IP Protocols.
249-261
- K. F. Seiden, J. P. Melanson:
The Auditing Facility for a VMM Security Kernel.
262-277
- H. S. Teng, K. Chen, S. C. Y. Lu:
Adaptive Real-Time Anomaly Detection Using Inductively Generated Sequential Patterns.
278-284
- Shiuh-Pyng Shieh, Virgil D. Gligor:
Auditing the Use of Covert Storage Channels in Secure Systems.
285-295
- L. Todd Herberlein, Gihan V. Dias, Karl N. Levitt, Biswanath Mukherjee, Jeff Wood, David Wolber:
A Network Security Monitor.
296-305
- Benedetto L. DiVito, Cristi Garvey, D. Kwong, A. Murray, Jane Solomon, Amy Wu:
The Deductive Theory Manager: A Knowledge Based System for Formal Verification.
306-318
- H. Brix, A. Dietl:
Formal Construction of Provably Secure Systems with Cartesiana.
319-332
- Joshua D. Guttman, H.-P. Ko:
Verifying a Hardware Security Architecture.
333-344
- Phillip J. Windley:
A Hierarchical Methodology for Verifying Microprogrammed Microprocessors.
345-359
- Sushil Jajodia, Boris Kogan:
Transaction Processing in Multilevel-Secure Databases Using Replicated Architecture.
360-368
- Thomas F. Keefe, Wei-Tek Tsai:
Multiversion Concurrency Control for Multilevel Secure Database Systems.
369-383
- Gary W. Smith:
Modeling Security-Relevant Data Semantics.
384-393
- Rein Turn:
Information Privacy Issues for the 1990s.
394-400
Copyright © Sun Mar 14 23:26:56 2010
by Michael Ley (ley@uni-trier.de)