Stop the war!
Остановите войну!
for scientists:
default search action
7th S&P 1986: Oakland, California, USA
- Proceedings of the 1986 IEEE Symposium on Security and Privacy, Oakland, California, USA, April 7-9, 1986. IEEE Computer Society 1986, ISBN 0-8186-0716-5
- Jeannette M. Wing, Mark R. Nixon:
Extending Ina Jo with Temporal Logic. 2-13 - J. Thomas Haigh, Richard A. Kemmerer, John McHugh, William D. Young:
An Experience Using Two Covert Channel Analysis Techniques on a Real System Design. 14-24 - J. Daniel Halpern, Sam Owre, Norman Proctor, William F. Wilson:
Muse : A Computer Assisted Verification System. 25-33 - John McHugh, Andrew P. Moore:
A Security Policy and Formal Top Level Specification for a Multi-Level Secure Local Area Network. 34-39 - Virgil D. Gligor, C. Sekar Chandersekaran, W. Cheng, Wen-Der Jiang, Abhai Johri, Gary L. Luckenbaugh, L. Edward Reich:
A New Security Testing Method and Its Application to the Secure Xenix Kernel. 40-59 - J. Thomas Haigh, William D. Young:
Extending the Non-Interference Version of MLS for SAT. 60 - Ravi S. Sandhu, M. E. Share:
Some Owner Based Schemes with Dynamic Groups in the Schematic Protection Model. 61-70 - L. S. Chalmers:
An Analysis of the Differences Between the Computer Security Practices in the Military and Private Sectors. 71-77 - S. A. Rajunas, Norman Hardy, Allen C. Bomberger, William S. Frantz, Charles R. Landau:
Security in KeyKOS™. 78-85 - Simon R. Wiseman:
A Secure Capability Computer System. 86-94 - Richard Y. Kain, Carl E. Landwehr:
On Access Checking in Capability-Based Systems. 95-101 - Virgil D. Gligor, E. L. Burch, C. Sekar Chandersekaran, Robert S. Chapman, Leslie J. Dotterer, Matthew S. Hecht, Wen-Der Jiang, Gary L. Luckenbaugh, N. Vasudevan:
On the Design and the Implementation of Secure Xenix Workstations. 102-117 - Dorothy E. Denning:
An Intrusion-Detection Model. 118-133 - Catherine Meadows:
A More Efficient Cryptographic Matchmaking Protocol for Use in the Absence of a Continuously Available Third Party. 134-137 - Wen-Pai Lu, Malur K. Sundareshan:
A Hierarchical Key Management Scheme for End-to-End Encryption in Internet Environments. 138-147 - Neal R. Wagner, Paul Putter, Marianne R. Cain:
Encrypted Database Design: Specialized Approaches. 148-155 - Dorothy E. Denning, Selim G. Akl, Matthew Morgenstern, Peter G. Neumann, Roger R. Schell, Mark R. Heckman:
Views for Multilevel Database Security. 156-172 - Norman S. Matloff:
Another Look at the Use of Noise Addition for Database Security. 173-181 - R. A. Carlson, Teresa F. Lunt:
The Trusted Domain Machine: A Secure Communication Device for Security Guard Applications. 182-186 - John E. Dobson, Brian Randell:
Building Reliable Secure Computing Systems out of Unreliable Insecure Components. 187-193 - J.-M. Fray, Yves Deswarte, David Powell:
Intrusion-Tolerance Using Fine-Grain Fragmentation-Scattering. 194-203 - Dan M. Nessett:
Factors Affecting Distributed System Security. 204-222 - Andrew Birrell, Butler W. Lampson, Roger M. Needham, Michael D. Schroeder:
A Global Authentication Service without Global Trust. 223-230
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.