default search action
8th S&P 1987: Oakland, California, USA
- Proceedings of the 1987 IEEE Symposium on Security and Privacy, Oakland, California, USA, April 27-29, 1987. IEEE Computer Society 1987, ISBN 0-8186-0771-8
- Paul T. Cummings, D. A. Fullam, M. J. Goldstein, M. J. Gosselin, Jeffrey Picciotto, John P. L. Woodward, J. Wynn:
Compartimented Mode Workstation: Results Through Prototyping. 2-12 - Jeffrey Picciotto:
The Design of an Effective Auditing Subsystem. 13-22 - John P. L. Woodward:
Exploiting the Dual Nature of Sensitivity Labels. 23-31 - Paul A. Karger:
Limiting the Damage Potential of Discretionary Trojan Horses. 32-37 - Steve R. White, Liam Comerford:
ABYSS: A Trusted Architecture for Software Protection. 38-51 - Steve H. Weingart:
Physical Security for the µABYSS System. 52-59 - Jonathan K. Millen:
Covert Channel Capacity. 60-66 - Joshua D. Guttman:
Information Flow and Invariance. 67-73 - Chii-Ren Tsai, Virgil D. Gligor, C. Sekar Chandersekaran:
A Formal Method for the Identification of Covert Storage Channels in Source Code. 74-87 - Louise E. Moser:
Graph Homomorphisms and the Design of Secure Computer Systems. 88-96 - J. C. Williams, George W. Dinolt:
A Graph-Theoretic Formulation of Multilevel Secure Distributed Systems: An Overview. 97-105 - William R. Bevier, Warren A. Hunt Jr., William D. Young:
Toward Verified Execution Environments. 106-115 - Simon N. Foley:
A Universal Theory of Information Flow. 116-122 - John McLean:
Reasoning About Security Models. 123-133 - Richard A. Kemmerer:
Using Formal Verification Techniques to Analyze Encryption Protocols. 134-139 - William D. Young, John McHugh:
Coding for a Believable Specification to Implementation Mapping. 140-149 - Glenn H. MacEwen, V. W. W. Poon, Janice I. Glasgow:
A Model for Multilevel Security Based on Operator Nets. 150-160 - Daryl McCullough:
Specifications for Multi-Level Security and a Hook-Up Property. 161-166 - David P. Anderson, P. Venkat Rangan:
A Basis for Secure Communication in Large Distributed Systems. 167-173 - Deborah Estrin, Gene Tsudik:
Visa Scheme for Inter-Organization Network Security. 174-183 - David D. Clark, D. R. Wilson:
A Comparison of Commercial and Military Computer Security Policies. 184-195 - Selim G. Akl, Dorothy E. Denning:
Checking Classification Constraints for Consistency and Completeness. 196-201 - Tzong-An Su, Gultekin Özsoyoglu:
Data Dependencies and Inference Control in Multilevel Relational Database Systems. 202-211 - Catherine Meadows:
The Integrity Lock Architecture and Its Application to Message Systems: Reducing Covert Channels. 212-219 - Dorothy E. Denning, Teresa F. Lunt, Roger R. Schell, Mark R. Heckman, William R. Shockley:
A Multilevel Relational Data Model. 220-234 - Thomas A. Berson, Teresa F. Lunt:
Multilevel Security for Knowledge-Based Systems. 235-242
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.