![](https://dblp.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
default search action
Search dblp for Publications
export results for "toc:db/conf/sp/sp1992.bht:"
@inproceedings{DBLP:conf/sp/AmmannJJ92, author = {Paul Ammann and Frank Jaeckle and Sushil Jajodia}, title = {A two snapshot algorithm for concurrency control in multi-level secure databases}, booktitle = {1992 {IEEE} Computer Society Symposium on Research in Security and Privacy, Oakland, CA, USA, May 4-6, 1992}, pages = {204--215}, publisher = {{IEEE} Computer Society}, year = {1992}, url = {https://doi.org/10.1109/RISP.1992.213260}, doi = {10.1109/RISP.1992.213260}, timestamp = {Thu, 21 Sep 2023 15:57:35 +0200}, biburl = {https://dblp.org/rec/conf/sp/AmmannJJ92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/BellovinM92, author = {Steven M. Bellovin and Michael Merritt}, title = {Encrypted key exchange: password-based protocols secure against dictionary attacks}, booktitle = {1992 {IEEE} Computer Society Symposium on Research in Security and Privacy, Oakland, CA, USA, May 4-6, 1992}, pages = {72--84}, publisher = {{IEEE} Computer Society}, year = {1992}, url = {https://doi.org/10.1109/RISP.1992.213269}, doi = {10.1109/RISP.1992.213269}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/BellovinM92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/Benson92, author = {Glenn S. Benson}, title = {An optimal solution to the secure reader-writer problem}, booktitle = {1992 {IEEE} Computer Society Symposium on Research in Security and Privacy, Oakland, CA, USA, May 4-6, 1992}, pages = {251--258}, publisher = {{IEEE} Computer Society}, year = {1992}, url = {https://doi.org/10.1109/RISP.1992.213256}, doi = {10.1109/RISP.1992.213256}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/Benson92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/CostichM92, author = {Oliver Costich and John P. McDermott}, title = {A multilevel transaction problem for multilevel secure database systems and its solution for the replicated architecture}, booktitle = {1992 {IEEE} Computer Society Symposium on Research in Security and Privacy, Oakland, CA, USA, May 4-6, 1992}, pages = {192--203}, publisher = {{IEEE} Computer Society}, year = {1992}, url = {https://doi.org/10.1109/RISP.1992.213261}, doi = {10.1109/RISP.1992.213261}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/CostichM92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/CuppensY92, author = {Fr{\'{e}}d{\'{e}}ric Cuppens and Kioumars Yazdanian}, title = {A 'natural' decomposition of multi-level relations}, booktitle = {1992 {IEEE} Computer Society Symposium on Research in Security and Privacy, Oakland, CA, USA, May 4-6, 1992}, pages = {273--284}, publisher = {{IEEE} Computer Society}, year = {1992}, url = {https://doi.org/10.1109/RISP.1992.213254}, doi = {10.1109/RISP.1992.213254}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/CuppensY92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/DebarBS92, author = {Herv{\'{e}} Debar and Monique Becker and Didier Siboni}, title = {A neural network component for an intrusion detection system}, booktitle = {1992 {IEEE} Computer Society Symposium on Research in Security and Privacy, Oakland, CA, USA, May 4-6, 1992}, pages = {240--250}, publisher = {{IEEE} Computer Society}, year = {1992}, url = {https://doi.org/10.1109/RISP.1992.213257}, doi = {10.1109/RISP.1992.213257}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/DebarBS92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/EpsteinMPMROMBD92, author = {Jeremy Epstein and John McHugh and Rita Pascale and Charles R. Martin and D. Rothnie and Hilarie K. Orman and Ann B. Marmor{-}Squires and Martha A. Branstad and Bonnie P. Danner}, title = {Evolution of a trusted {B3} window system prototype}, booktitle = {1992 {IEEE} Computer Society Symposium on Research in Security and Privacy, Oakland, CA, USA, May 4-6, 1992}, pages = {226--239}, publisher = {{IEEE} Computer Society}, year = {1992}, url = {https://doi.org/10.1109/RISP.1992.213258}, doi = {10.1109/RISP.1992.213258}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/EpsteinMPMROMBD92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/GilgorLP92, author = {Virgil D. Gligor and Shyh{-}Wei Luan and Joseph N. Pato}, title = {On inter-realm authentication in large distributed systems}, booktitle = {1992 {IEEE} Computer Society Symposium on Research in Security and Privacy, Oakland, CA, USA, May 4-6, 1992}, pages = {2--17}, publisher = {{IEEE} Computer Society}, year = {1992}, url = {https://doi.org/10.1109/RISP.1992.213274}, doi = {10.1109/RISP.1992.213274}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/GilgorLP92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/GrayS92, author = {James W. Gray III and Paul F. Syverson}, title = {A logical approach to multilevel security of probabilistic systems}, booktitle = {1992 {IEEE} Computer Society Symposium on Research in Security and Privacy, Oakland, CA, USA, May 4-6, 1992}, pages = {164--176}, publisher = {{IEEE} Computer Society}, year = {1992}, url = {https://doi.org/10.1109/RISP.1992.213263}, doi = {10.1109/RISP.1992.213263}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/GrayS92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/Hu92, author = {Wei{-}Ming Hu}, title = {Lattice scheduling and covert channels}, booktitle = {1992 {IEEE} Computer Society Symposium on Research in Security and Privacy, Oakland, CA, USA, May 4-6, 1992}, pages = {52--61}, publisher = {{IEEE} Computer Society}, year = {1992}, url = {https://doi.org/10.1109/RISP.1992.213271}, doi = {10.1109/RISP.1992.213271}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/Hu92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/JajodiaA92, author = {Sushil Jajodia and Vijayalakshmi Atluri}, title = {Alternative correctness criteria for concurrent execution of transactions in multilevel secure databases}, booktitle = {1992 {IEEE} Computer Society Symposium on Research in Security and Privacy, Oakland, CA, USA, May 4-6, 1992}, pages = {216--224}, publisher = {{IEEE} Computer Society}, year = {1992}, url = {https://doi.org/10.1109/RISP.1992.213259}, doi = {10.1109/RISP.1992.213259}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/JajodiaA92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/Meadows92, author = {Catherine Meadows}, title = {Using traces based on procedure calls to reason about composability}, booktitle = {1992 {IEEE} Computer Society Symposium on Research in Security and Privacy, Oakland, CA, USA, May 4-6, 1992}, pages = {177--188}, publisher = {{IEEE} Computer Society}, year = {1992}, url = {https://doi.org/10.1109/RISP.1992.213262}, doi = {10.1109/RISP.1992.213262}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/Meadows92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/Millen92, author = {Jonathan K. Millen}, title = {A resource allocation model for denial of service}, booktitle = {1992 {IEEE} Computer Society Symposium on Research in Security and Privacy, Oakland, CA, USA, May 4-6, 1992}, pages = {137--147}, publisher = {{IEEE} Computer Society}, year = {1992}, url = {https://doi.org/10.1109/RISP.1992.213265}, doi = {10.1109/RISP.1992.213265}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/Millen92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/MillenL92, author = {Jonathan K. Millen and Teresa F. Lunt}, title = {Security for object-oriented database systems}, booktitle = {1992 {IEEE} Computer Society Symposium on Research in Security and Privacy, Oakland, CA, USA, May 4-6, 1992}, pages = {260--272}, publisher = {{IEEE} Computer Society}, year = {1992}, url = {https://doi.org/10.1109/RISP.1992.213255}, doi = {10.1109/RISP.1992.213255}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/MillenL92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/MoskowitzM92, author = {Ira S. Moskowitz and Allen R. Miller}, title = {The influence of delay upon an idealized channel's bandwidth}, booktitle = {1992 {IEEE} Computer Society Symposium on Research in Security and Privacy, Oakland, CA, USA, May 4-6, 1992}, pages = {62--67}, publisher = {{IEEE} Computer Society}, year = {1992}, url = {https://doi.org/10.1109/RISP.1992.213270}, doi = {10.1109/RISP.1992.213270}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/MoskowitzM92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/ReiterBG92, author = {Michael K. Reiter and Kenneth P. Birman and Li Gong}, title = {Integrating security in a group oriented distributed system}, booktitle = {1992 {IEEE} Computer Society Symposium on Research in Security and Privacy, Oakland, CA, USA, May 4-6, 1992}, pages = {18--32}, publisher = {{IEEE} Computer Society}, year = {1992}, url = {https://doi.org/10.1109/RISP.1992.213273}, doi = {10.1109/RISP.1992.213273}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/ReiterBG92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/Sandhu92, author = {Ravi S. Sandhu}, title = {The typed access matrix model}, booktitle = {1992 {IEEE} Computer Society Symposium on Research in Security and Privacy, Oakland, CA, USA, May 4-6, 1992}, pages = {122--136}, publisher = {{IEEE} Computer Society}, year = {1992}, url = {https://doi.org/10.1109/RISP.1992.213266}, doi = {10.1109/RISP.1992.213266}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/Sandhu92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/SandhuS92, author = {Ravi S. Sandhu and Gurpreet S. Suri}, title = {Non-monotonic transformation of access rights}, booktitle = {1992 {IEEE} Computer Society Symposium on Research in Security and Privacy, Oakland, CA, USA, May 4-6, 1992}, pages = {148--161}, publisher = {{IEEE} Computer Society}, year = {1992}, url = {https://doi.org/10.1109/RISP.1992.213264}, doi = {10.1109/RISP.1992.213264}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/SandhuS92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/Snekkenes92, author = {Einar Snekkenes}, title = {Roles in cryptographic protocols}, booktitle = {1992 {IEEE} Computer Society Symposium on Research in Security and Privacy, Oakland, CA, USA, May 4-6, 1992}, pages = {105--119}, publisher = {{IEEE} Computer Society}, year = {1992}, url = {https://doi.org/10.1109/RISP.1992.213267}, doi = {10.1109/RISP.1992.213267}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/Snekkenes92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/StubblebineG92, author = {Stuart G. Stubblebine and Virgil D. Gligor}, title = {On message integrity in cryptographic protocols}, booktitle = {1992 {IEEE} Computer Society Symposium on Research in Security and Privacy, Oakland, CA, USA, May 4-6, 1992}, pages = {85--104}, publisher = {{IEEE} Computer Society}, year = {1992}, url = {https://doi.org/10.1109/RISP.1992.213268}, doi = {10.1109/RISP.1992.213268}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/StubblebineG92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/Weissman92, author = {Clark Weissman}, title = {{BLACKER:} security for the {DDN} examples of {A1} security engineering trades}, booktitle = {1992 {IEEE} Computer Society Symposium on Research in Security and Privacy, Oakland, CA, USA, May 4-6, 1992}, pages = {286--292}, publisher = {{IEEE} Computer Society}, year = {1992}, url = {https://doi.org/10.1109/RISP.1992.213253}, doi = {10.1109/RISP.1992.213253}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/Weissman92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/WooL92, author = {Thomas Y. C. Woo and Simon S. Lam}, title = {Authorization in distributed systems: a formal approach}, booktitle = {1992 {IEEE} Computer Society Symposium on Research in Security and Privacy, Oakland, CA, USA, May 4-6, 1992}, pages = {33--50}, publisher = {{IEEE} Computer Society}, year = {1992}, url = {https://doi.org/10.1109/RISP.1992.213272}, doi = {10.1109/RISP.1992.213272}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/WooL92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/sp/1992, title = {1992 {IEEE} Computer Society Symposium on Research in Security and Privacy, Oakland, CA, USA, May 4-6, 1992}, publisher = {{IEEE} Computer Society}, year = {1992}, url = {https://ieeexplore.ieee.org/xpl/conhome/412/proceeding}, isbn = {0-8186-2825-1}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/1992.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
![](https://dblp.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.