12. S&P 1991:
Oakland,
California,
USA
Proceedings of the 1991 IEEE Symposium on Security and Privacy,
Oakland,
California,
USA,
May 1991. IEEE Computer Society Press,
1991
- J. C. Wray:
An Analysis of Covert Timing Channels.
2-7
- W.-M. Hu:
Reducing Timing Channels with Fuzzy Time.
8-20
- James W. Gray III:
Toward a Mathematical Foundation for Information Flow Security.
21-35
- Phillip A. Porras, Richard A. Kemmerer:
Covert Flow Trees: A Technique for Identifying and Analyzing Covert Storage Channels.
36-51
- Paul A. Karger, J. C. Wray:
Storage Channels in Disk Arm Optimization.
52-63
- J. G. Williams:
Modeling Nondisclosure in Terms of the Subject-Instruction Stream.
64-77
- N. L. Kelem, Richard J. Feiertag:
A Separation Model for Virtual Machine Monitors.
78-86
- Paul Ammann, Ravi S. Sandhu:
Safety Analysis for the Extended Schematic Protection Model.
87-97
- Simon N. Foley:
A Taxonomy for Information Flow Policies and Models.
98-109
- Yves Deswarte, Laurent Blain, Jean-Charles Fabre:
Intrusion Tolerance in Distributed Computing Systems.
110-121
- Jim Alves-Foss, Karl N. Levitt:
Verification of Secure Distributed Systems in Higher Order Logic: A Modular Approach Using Generic Components.
122-135
- Simon S. Lam, A. Udaya Shankar, Thomas Y. C. Woo:
Applying a Theory of Modules and Interfaces to Security Verification.
136-155
- Paul F. Syverson:
The Use of Logic in the Analysis of Cryptographic Protocols.
156-170
- Einar Snekkenes:
Exploring the BAN Approach to Protocol Analysis.
171-181
- Catherine Meadows:
A System for the Specification and Verification of Key Management Protocols.
182-197
- Edward Amoroso, T. Nguyen, Jonathan Weiss, John Watson, P. Lapiska, T. Starr:
Toward an Approach to Measuring Software Trust.
198-218
- Daniel F. Sterne:
On the Buzzword "Security Policy".
219-231
- Joseph Tardo, K. Alagappan:
SPX: Global Authentication Using Public Key Certificates.
232-244
- C. Fritzner, L. Nilsen, Å. Skomedal:
Protecting Security Information in Distributed Systems.
245-254
- Vijay Varadharajan, Phillip Allen, Stewart Black:
An Analysis of the Proxy Problem in Distributed Systems.
255-277
- George T. Duncan, Sumitra Mukherjee:
Microdata Disclosure Limitation in Statistical Databases: Query Size and Random Sample Query Control.
278-287
- Udo Kelter:
Discretionary Access Controls in a High-Performance Object Management System.
288-299
- Sushil Jajodia, Ravi S. Sandhu:
A Novel Decomposition of Multilevel Relations into Single-Level Relations.
300-315
- H. S. Javitz, A. Valdes:
The SRI IDES Statistical Anomaly Detector.
316-326
- Shiuh-Pyng Shieh, Virgil D. Gligor:
A Pattern-Oriented Intrusion-Detection Model and Its Applications.
327-342
- Jeffrey O. Kephart, Steve R. White:
Directed-Graph Epidemiological Models of Computer Viruses.
343-361
- Ira S. Moskowitz:
Variable Noise Effects Upon a Simple Timing Channel.
362-372
- Randy Brown:
The Turing Test and Non-Information Flow.
373-388
Copyright © Sun Mar 14 23:26:56 2010
by Michael Ley (ley@uni-trier.de)