default search action
9th S&P 1988: Oakland, California, USA
- Proceedings of the 1988 IEEE Symposium on Security and Privacy, Oakland, California, USA, April 18-21, 1988. IEEE Computer Society 1988, ISBN 0-8186-0850-1
Formal Security Models
- John McLean:
The algebra of security. 2-7 - David Elliott Bell:
Concerning 'modeling' of computer security. 8-13 - Jeremy Jacob:
Security specifications. 14-23
Security in Distributed Systems
- Thomas A. Casey Jr., Stephen T. Vinter, D. G. Weber, Rammohan Varadarajan, David Rosenthal:
A secure distributed operating system. 27-38 - Stephen T. Vinter:
Extended discretionary access controls. 39-49 - Mark K. Joseph, Algirdas Avizienis:
A fault tolerance approach to computer viruses. 52-58 - Teresa F. Lunt, R. Jagannathan:
A prototype real-time intrusion-detection expert system. 59-66
Database Security: ASD-Views
- Jackson Wilson:
Views as the security objects in a multilevel secure relational database management system. 70-84 - Cristi Garvey, Amy Wu:
ASDViews [relational databases]. 85-95 - Thomas H. Hinke:
Inference aggregation detection in database management systems. 96-106
Analysis of Secure Systems
- Chii-Ren Tsai, Virgil D. Gligor:
A bandwidth computation model for covert storage channels and its applications. 108-121 - Janice I. Glasgow, Glenn H. MacEwen:
Reasoning about knowledge in multilevel secure distributed systems. 122-128
Applying and Implementing Integrity Models
- Paul A. Karger:
Implementing commercial data integrity with secure capabilities. 130-139 - Theodore M. P. Lee:
Using mandatory integrity to enforce 'commercial' security. 140-146 - Simon R. Wiseman, Phil Terry, Andrew Wood, Clare Harrold:
The trusted path between SMITE and the user. 146-155 - Karen R. Sollins:
Cascaded authentication. 156-163
Verification
- Stephen D. Crocker, Eve Cohen, Sue Landauer, Hilarie Orman:
Reverification of a microprocessor. 166-176 - Daryl McCullough:
Noninterference and the composability of security properties. 177-186 - Che-Fu Yu, Virgil D. Gligor:
A formal specification and verification method for the prevention of denial of service. 187-202
Models of Secure Distributed Systems
- P. Venkat Rangan:
An axiomatic basis of trust in distributed systems. 204-211 - David Elliott Bell:
Security policy modeling for the next-generation packet switch. 212-216
Secure Databases
- Dorothy E. Denning, Teresa F. Lunt, Roger R. Schell, William R. Shockley, Mark R. Heckman:
The SeaView security model. 218-233 - Teresa F. Lunt, Roger R. Schell, William R. Shockley, Mark R. Heckman, Dan Warren:
A near-term design for the SeaView multilevel database system. 234-244 - Matthew Morgenstern:
Controlling logical inference in multilevel database systems. 245-255
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.