default search action
10th S&P 1989: Oakland, California, USA
- Proceedings of the 1989 IEEE Symposium on Security and Privacy, Oakland, California, USA, May 1-3, 1989. IEEE Computer Society 1989, ISBN 0-8186-1939-2
- S. T. Walker:
Network Security: The Parts of the Sum. 2-9 - Theodore M. P. Lee:
Statistical Models of Trust: TCBs vs. People. 10-19 - M. Schaefer:
Symbol Security Condition Considered Harmful. 20-46 - Paul A. Karger:
New Methods for Immediate Revocation. 48-55 - Li Gong:
A Secure Identity-Based Capability System. 56-63 - Martha A. Branstad, Homayoon Tajalli, Frank Mayer, David Dalva:
Access Mediation in a Message Passing Kernel. 66-72 - Timothy E. Levin, S. J. Padilla, Cynthia E. Irvine:
A Formal Model for UNIX Setuid. 73-83 - G.-L. Grenier, Richard C. Holt, M. Funkenhauser:
Policy vs. Mechanism in the Secure TUNIS Operating System. 84-93 - Thomas J. Parenty:
The Incorporation of Multi-Level IPC into UNIX. 94-99 - Teresa F. Lunt:
Aggregation and Inference: Facts and Fallacies. 102-109 - Eduardo B. Fernández, Ehud Gudes, Haiyan Song:
A Security Model for Object-Oriented Databases. 110-115 - J. Wilson:
A Security Policy for an A1DBMS (a Trusted Subject). 116-125 - Tzong-An Su, JiYoung Chung, Gultekin Özsoyoglu:
On the Cell Suppression by Merging Technique in the Lattice Model of Summary Tables. 126-135 - Catherine Meadows:
Using Narrowing in the Analysis of Key Management Protocols. 138-147 - M. R. Cornwell:
A Software Engineering Approach to Designing Trustworthy Software. 148-156 - J. C. Williams, George W. Dinolt:
Formal Model of a Trusted File Server. 157-166 - O. Sami Saydjari, J. M. Beckman, J. R. Leaman:
LOCK Trak: Navigating Uncharted Space. 167-175 - M. Schaefer, W. C. Barker, Charles P. Pfleeger:
Tea and I: An Allergy. 178-182 - Deborah Estrin, Gene Tsudik:
Security Issues in Policy Routing. 183-193 - Glenn S. Benson, William F. Appelbe, Ian F. Akyildiz:
The Hierarchical Model of Distributed System Security. 194-203 - D. F. C. Brewer, Michael J. Nash:
The Chinese Wall Security Policy. 206-214 - Phil Terry, Simon R. Wiseman:
A "New" Security Policy Model. 215-228 - John E. Dobson, John A. McDermid:
A Framework for Expressing Models of Security Policy. 229-239 - Jeremy Jacob:
On the Derivation of Secure Components. 242-247 - Simon N. Foley:
A Model for Secure Information Flow. 248-258 - Ravi S. Sandhu:
Transformation of Access Rights. 259-268 - Lee Badger:
A Model for Specifying Multi-Granularity Integrity Policies. 269-277 - H. S. Vaccaro, Gunar E. Liepins:
Detection of Anomalous Computer Session Activity. 280-289 - Dan M. Nessett:
Layering Central Authentication on Existing Distributed System Terminal Services. 290-299 - Lein Harn, Thomas Kiesler:
Authenticated Group Key Distribution Scheme for a Large Distributed Network. 300-309 - George I. Davida, Yvo Desmedt, Brian J. Matt:
Defending Systems against Viruses through Cryptographic Authentication. 312-318 - Stephen D. Crocker, Maria Pozzo:
A Proposal for a Verification-Based Virus Filter. 319-324 - Mark W. Eichin, Jon A. Rochlis:
With Microscope and Tweezers: An Analysis of the Internet Virus of November 1988. 326-343
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.