Search dblp for Publications

export results for "toc:db/conf/sp/sp1992.bht:"

 download as .bib file

@inproceedings{DBLP:conf/sp/AmmannJJ92,
  author       = {Paul Ammann and
                  Frank Jaeckle and
                  Sushil Jajodia},
  title        = {A two snapshot algorithm for concurrency control in multi-level secure
                  databases},
  booktitle    = {1992 {IEEE} Computer Society Symposium on Research in Security and
                  Privacy, Oakland, CA, USA, May 4-6, 1992},
  pages        = {204--215},
  publisher    = {{IEEE} Computer Society},
  year         = {1992},
  url          = {https://doi.org/10.1109/RISP.1992.213260},
  doi          = {10.1109/RISP.1992.213260},
  timestamp    = {Thu, 21 Sep 2023 15:57:35 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/AmmannJJ92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/BellovinM92,
  author       = {Steven M. Bellovin and
                  Michael Merritt},
  title        = {Encrypted key exchange: password-based protocols secure against dictionary
                  attacks},
  booktitle    = {1992 {IEEE} Computer Society Symposium on Research in Security and
                  Privacy, Oakland, CA, USA, May 4-6, 1992},
  pages        = {72--84},
  publisher    = {{IEEE} Computer Society},
  year         = {1992},
  url          = {https://doi.org/10.1109/RISP.1992.213269},
  doi          = {10.1109/RISP.1992.213269},
  timestamp    = {Thu, 21 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/BellovinM92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/Benson92,
  author       = {Glenn S. Benson},
  title        = {An optimal solution to the secure reader-writer problem},
  booktitle    = {1992 {IEEE} Computer Society Symposium on Research in Security and
                  Privacy, Oakland, CA, USA, May 4-6, 1992},
  pages        = {251--258},
  publisher    = {{IEEE} Computer Society},
  year         = {1992},
  url          = {https://doi.org/10.1109/RISP.1992.213256},
  doi          = {10.1109/RISP.1992.213256},
  timestamp    = {Thu, 21 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/Benson92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/CostichM92,
  author       = {Oliver Costich and
                  John P. McDermott},
  title        = {A multilevel transaction problem for multilevel secure database systems
                  and its solution for the replicated architecture},
  booktitle    = {1992 {IEEE} Computer Society Symposium on Research in Security and
                  Privacy, Oakland, CA, USA, May 4-6, 1992},
  pages        = {192--203},
  publisher    = {{IEEE} Computer Society},
  year         = {1992},
  url          = {https://doi.org/10.1109/RISP.1992.213261},
  doi          = {10.1109/RISP.1992.213261},
  timestamp    = {Thu, 21 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/CostichM92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/CuppensY92,
  author       = {Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Kioumars Yazdanian},
  title        = {A 'natural' decomposition of multi-level relations},
  booktitle    = {1992 {IEEE} Computer Society Symposium on Research in Security and
                  Privacy, Oakland, CA, USA, May 4-6, 1992},
  pages        = {273--284},
  publisher    = {{IEEE} Computer Society},
  year         = {1992},
  url          = {https://doi.org/10.1109/RISP.1992.213254},
  doi          = {10.1109/RISP.1992.213254},
  timestamp    = {Thu, 21 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/CuppensY92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/DebarBS92,
  author       = {Herv{\'{e}} Debar and
                  Monique Becker and
                  Didier Siboni},
  title        = {A neural network component for an intrusion detection system},
  booktitle    = {1992 {IEEE} Computer Society Symposium on Research in Security and
                  Privacy, Oakland, CA, USA, May 4-6, 1992},
  pages        = {240--250},
  publisher    = {{IEEE} Computer Society},
  year         = {1992},
  url          = {https://doi.org/10.1109/RISP.1992.213257},
  doi          = {10.1109/RISP.1992.213257},
  timestamp    = {Thu, 21 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/DebarBS92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/EpsteinMPMROMBD92,
  author       = {Jeremy Epstein and
                  John McHugh and
                  Rita Pascale and
                  Charles R. Martin and
                  D. Rothnie and
                  Hilarie K. Orman and
                  Ann B. Marmor{-}Squires and
                  Martha A. Branstad and
                  Bonnie P. Danner},
  title        = {Evolution of a trusted {B3} window system prototype},
  booktitle    = {1992 {IEEE} Computer Society Symposium on Research in Security and
                  Privacy, Oakland, CA, USA, May 4-6, 1992},
  pages        = {226--239},
  publisher    = {{IEEE} Computer Society},
  year         = {1992},
  url          = {https://doi.org/10.1109/RISP.1992.213258},
  doi          = {10.1109/RISP.1992.213258},
  timestamp    = {Thu, 21 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/EpsteinMPMROMBD92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/GilgorLP92,
  author       = {Virgil D. Gligor and
                  Shyh{-}Wei Luan and
                  Joseph N. Pato},
  title        = {On inter-realm authentication in large distributed systems},
  booktitle    = {1992 {IEEE} Computer Society Symposium on Research in Security and
                  Privacy, Oakland, CA, USA, May 4-6, 1992},
  pages        = {2--17},
  publisher    = {{IEEE} Computer Society},
  year         = {1992},
  url          = {https://doi.org/10.1109/RISP.1992.213274},
  doi          = {10.1109/RISP.1992.213274},
  timestamp    = {Thu, 21 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/GilgorLP92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/GrayS92,
  author       = {James W. Gray III and
                  Paul F. Syverson},
  title        = {A logical approach to multilevel security of probabilistic systems},
  booktitle    = {1992 {IEEE} Computer Society Symposium on Research in Security and
                  Privacy, Oakland, CA, USA, May 4-6, 1992},
  pages        = {164--176},
  publisher    = {{IEEE} Computer Society},
  year         = {1992},
  url          = {https://doi.org/10.1109/RISP.1992.213263},
  doi          = {10.1109/RISP.1992.213263},
  timestamp    = {Thu, 21 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/GrayS92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/Hu92,
  author       = {Wei{-}Ming Hu},
  title        = {Lattice scheduling and covert channels},
  booktitle    = {1992 {IEEE} Computer Society Symposium on Research in Security and
                  Privacy, Oakland, CA, USA, May 4-6, 1992},
  pages        = {52--61},
  publisher    = {{IEEE} Computer Society},
  year         = {1992},
  url          = {https://doi.org/10.1109/RISP.1992.213271},
  doi          = {10.1109/RISP.1992.213271},
  timestamp    = {Thu, 21 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/Hu92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/JajodiaA92,
  author       = {Sushil Jajodia and
                  Vijayalakshmi Atluri},
  title        = {Alternative correctness criteria for concurrent execution of transactions
                  in multilevel secure databases},
  booktitle    = {1992 {IEEE} Computer Society Symposium on Research in Security and
                  Privacy, Oakland, CA, USA, May 4-6, 1992},
  pages        = {216--224},
  publisher    = {{IEEE} Computer Society},
  year         = {1992},
  url          = {https://doi.org/10.1109/RISP.1992.213259},
  doi          = {10.1109/RISP.1992.213259},
  timestamp    = {Thu, 21 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/JajodiaA92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/Meadows92,
  author       = {Catherine Meadows},
  title        = {Using traces based on procedure calls to reason about composability},
  booktitle    = {1992 {IEEE} Computer Society Symposium on Research in Security and
                  Privacy, Oakland, CA, USA, May 4-6, 1992},
  pages        = {177--188},
  publisher    = {{IEEE} Computer Society},
  year         = {1992},
  url          = {https://doi.org/10.1109/RISP.1992.213262},
  doi          = {10.1109/RISP.1992.213262},
  timestamp    = {Thu, 21 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/Meadows92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/Millen92,
  author       = {Jonathan K. Millen},
  title        = {A resource allocation model for denial of service},
  booktitle    = {1992 {IEEE} Computer Society Symposium on Research in Security and
                  Privacy, Oakland, CA, USA, May 4-6, 1992},
  pages        = {137--147},
  publisher    = {{IEEE} Computer Society},
  year         = {1992},
  url          = {https://doi.org/10.1109/RISP.1992.213265},
  doi          = {10.1109/RISP.1992.213265},
  timestamp    = {Thu, 21 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/Millen92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/MillenL92,
  author       = {Jonathan K. Millen and
                  Teresa F. Lunt},
  title        = {Security for object-oriented database systems},
  booktitle    = {1992 {IEEE} Computer Society Symposium on Research in Security and
                  Privacy, Oakland, CA, USA, May 4-6, 1992},
  pages        = {260--272},
  publisher    = {{IEEE} Computer Society},
  year         = {1992},
  url          = {https://doi.org/10.1109/RISP.1992.213255},
  doi          = {10.1109/RISP.1992.213255},
  timestamp    = {Thu, 21 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/MillenL92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/MoskowitzM92,
  author       = {Ira S. Moskowitz and
                  Allen R. Miller},
  title        = {The influence of delay upon an idealized channel's bandwidth},
  booktitle    = {1992 {IEEE} Computer Society Symposium on Research in Security and
                  Privacy, Oakland, CA, USA, May 4-6, 1992},
  pages        = {62--67},
  publisher    = {{IEEE} Computer Society},
  year         = {1992},
  url          = {https://doi.org/10.1109/RISP.1992.213270},
  doi          = {10.1109/RISP.1992.213270},
  timestamp    = {Thu, 21 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/MoskowitzM92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/ReiterBG92,
  author       = {Michael K. Reiter and
                  Kenneth P. Birman and
                  Li Gong},
  title        = {Integrating security in a group oriented distributed system},
  booktitle    = {1992 {IEEE} Computer Society Symposium on Research in Security and
                  Privacy, Oakland, CA, USA, May 4-6, 1992},
  pages        = {18--32},
  publisher    = {{IEEE} Computer Society},
  year         = {1992},
  url          = {https://doi.org/10.1109/RISP.1992.213273},
  doi          = {10.1109/RISP.1992.213273},
  timestamp    = {Thu, 21 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/ReiterBG92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/Sandhu92,
  author       = {Ravi S. Sandhu},
  title        = {The typed access matrix model},
  booktitle    = {1992 {IEEE} Computer Society Symposium on Research in Security and
                  Privacy, Oakland, CA, USA, May 4-6, 1992},
  pages        = {122--136},
  publisher    = {{IEEE} Computer Society},
  year         = {1992},
  url          = {https://doi.org/10.1109/RISP.1992.213266},
  doi          = {10.1109/RISP.1992.213266},
  timestamp    = {Thu, 21 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/Sandhu92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/SandhuS92,
  author       = {Ravi S. Sandhu and
                  Gurpreet S. Suri},
  title        = {Non-monotonic transformation of access rights},
  booktitle    = {1992 {IEEE} Computer Society Symposium on Research in Security and
                  Privacy, Oakland, CA, USA, May 4-6, 1992},
  pages        = {148--161},
  publisher    = {{IEEE} Computer Society},
  year         = {1992},
  url          = {https://doi.org/10.1109/RISP.1992.213264},
  doi          = {10.1109/RISP.1992.213264},
  timestamp    = {Thu, 21 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/SandhuS92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/Snekkenes92,
  author       = {Einar Snekkenes},
  title        = {Roles in cryptographic protocols},
  booktitle    = {1992 {IEEE} Computer Society Symposium on Research in Security and
                  Privacy, Oakland, CA, USA, May 4-6, 1992},
  pages        = {105--119},
  publisher    = {{IEEE} Computer Society},
  year         = {1992},
  url          = {https://doi.org/10.1109/RISP.1992.213267},
  doi          = {10.1109/RISP.1992.213267},
  timestamp    = {Thu, 21 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/Snekkenes92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/StubblebineG92,
  author       = {Stuart G. Stubblebine and
                  Virgil D. Gligor},
  title        = {On message integrity in cryptographic protocols},
  booktitle    = {1992 {IEEE} Computer Society Symposium on Research in Security and
                  Privacy, Oakland, CA, USA, May 4-6, 1992},
  pages        = {85--104},
  publisher    = {{IEEE} Computer Society},
  year         = {1992},
  url          = {https://doi.org/10.1109/RISP.1992.213268},
  doi          = {10.1109/RISP.1992.213268},
  timestamp    = {Thu, 21 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/StubblebineG92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/Weissman92,
  author       = {Clark Weissman},
  title        = {{BLACKER:} security for the {DDN} examples of {A1} security engineering
                  trades},
  booktitle    = {1992 {IEEE} Computer Society Symposium on Research in Security and
                  Privacy, Oakland, CA, USA, May 4-6, 1992},
  pages        = {286--292},
  publisher    = {{IEEE} Computer Society},
  year         = {1992},
  url          = {https://doi.org/10.1109/RISP.1992.213253},
  doi          = {10.1109/RISP.1992.213253},
  timestamp    = {Thu, 21 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/Weissman92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/WooL92,
  author       = {Thomas Y. C. Woo and
                  Simon S. Lam},
  title        = {Authorization in distributed systems: a formal approach},
  booktitle    = {1992 {IEEE} Computer Society Symposium on Research in Security and
                  Privacy, Oakland, CA, USA, May 4-6, 1992},
  pages        = {33--50},
  publisher    = {{IEEE} Computer Society},
  year         = {1992},
  url          = {https://doi.org/10.1109/RISP.1992.213272},
  doi          = {10.1109/RISP.1992.213272},
  timestamp    = {Thu, 21 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/WooL92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sp/1992,
  title        = {1992 {IEEE} Computer Society Symposium on Research in Security and
                  Privacy, Oakland, CA, USA, May 4-6, 1992},
  publisher    = {{IEEE} Computer Society},
  year         = {1992},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/412/proceeding},
  isbn         = {0-8186-2825-1},
  timestamp    = {Thu, 21 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/1992.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics