![](https://dblp.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
default search action
5th S&P 1984: Oakland, California, USA
- Proceedings of the 1984 IEEE Symposium on Security and Privacy, Oakland, California, USA, April 29 - May 2, 1984. IEEE Computer Society 1984, ISBN 0-8186-0532-4
- Paul A. Karger, A. J. Herbert:
An Augmented Capability Architecture to Support Lattice Security and Traceability of Access. 2-12 - Barry D. Gold, Richard R. Linde, P. F. Cudney:
KVM/37O in Retrospect. 13-23 - S. Kramer:
Linus IV : An Experiment in Computer Security. 24-33 - Carl E. Landwehr, John M. Carroll:
Hardware Requirements for Secure Computer Systems: A Framework. 34-40 - M. Schaefer, Roger R. Schell
:
Toward an Understanding of Extensible Architectures for Evaluated Trusted Computer System Products. 41-51 - Dorothy E. Denning:
Cryptographic Checksums for Multilevel Database Security. 52-61 - Richard D. Graubart:
The Integrity-Lock Approach to Secure Database Management. 62-74 - Joseph A. Goguen, José Meseguer:
Unwinding and Inference Control. 75-87 - Robert S. Winternitz:
A Secure One-Way Hash Function Built from DES. 88-90 - Neal R. Wagner:
Searching for Public-Key Cryptosystems. 91-98 - David Chaum:
A New Paradigm for Individuals in the Information Age. 99-106 - Richard Platek:
The Use of Ada as an Implementation Language in Formally Specified Systems. 107-110 - Lawrence Yelowitz:
Practical Experience with an Ada-Based Formal Specification/Language on a Large Project. 111-113 - Dan Craigen:
Ottawa Euclid and EVES: A Status Report. 114-124 - Terry Benzel:
Analysis of a Kernel Verification. 125-133 - Jonathan K. Millen:
The Interrogator: A Tool for Cryptographic Protocol Security. 134-141 - Deepinder P. Sidhu:
Executable Logic Specifications: A New Approach to Computer Security. 142-153 - D. E. Britton:
Formal Verification of a Secure Network with End-to-End Encryption. 154-166 - Glenn H. MacEwen, Bruce Burwell, Zhuo-Jun Lu:
Multi-Level Security Based on Physical Distribution. 167-179 - David Bailey:
Attacks on Computers: Congressional Hearings and Pending Legislation. 180-187 - John D. McLean, Carl E. Landwehr, Constance L. Heitmeyer
:
A Formal Statement of the MMS Security Model. 188-194 - T. Taylor:
Comparison Paper between the Bell and LaPadula Model and the SRI Model. 195-203 - John O. Neilson, F. E. Wuebker:
Design Experiences from the Multilevel Secure MCF Operating System. 204-208 - Tanya Korelsky, David Sutherland:
Formal Specification of a Multi-Level Secure Operating System. 209-218 - B. A. Hartman:
A Gypsy-Based Kernel. 219-225 - George W. Dinolt, Richard B. Neely, P. C. Baker, James W. Freeman:
Multinet Gateway-Towards A1 Certification. 226
![](https://dblp.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.