default search action
13th S&P 1992: Oakland, California, USA
- 1992 IEEE Computer Society Symposium on Research in Security and Privacy, Oakland, CA, USA, May 4-6, 1992. IEEE Computer Society 1992, ISBN 0-8186-2825-1
- Virgil D. Gligor, Shyh-Wei Luan, Joseph N. Pato:
On inter-realm authentication in large distributed systems. 2-17 - Michael K. Reiter, Kenneth P. Birman, Li Gong:
Integrating security in a group oriented distributed system. 18-32 - Thomas Y. C. Woo, Simon S. Lam:
Authorization in distributed systems: a formal approach. 33-50 - Wei-Ming Hu:
Lattice scheduling and covert channels. 52-61 - Ira S. Moskowitz, Allen R. Miller:
The influence of delay upon an idealized channel's bandwidth. 62-67 - Steven M. Bellovin, Michael Merritt:
Encrypted key exchange: password-based protocols secure against dictionary attacks. 72-84 - Stuart G. Stubblebine, Virgil D. Gligor:
On message integrity in cryptographic protocols. 85-104 - Einar Snekkenes:
Roles in cryptographic protocols. 105-119 - Ravi S. Sandhu:
The typed access matrix model. 122-136 - Jonathan K. Millen:
A resource allocation model for denial of service. 137-147 - Ravi S. Sandhu, Gurpreet S. Suri:
Non-monotonic transformation of access rights. 148-161 - James W. Gray III, Paul F. Syverson:
A logical approach to multilevel security of probabilistic systems. 164-176 - Catherine Meadows:
Using traces based on procedure calls to reason about composability. 177-188 - Oliver Costich, John P. McDermott:
A multilevel transaction problem for multilevel secure database systems and its solution for the replicated architecture. 192-203 - Paul Ammann, Frank Jaeckle, Sushil Jajodia:
A two snapshot algorithm for concurrency control in multi-level secure databases. 204-215 - Sushil Jajodia, Vijayalakshmi Atluri:
Alternative correctness criteria for concurrent execution of transactions in multilevel secure databases. 216-224 - Jeremy Epstein, John McHugh, Rita Pascale, Charles R. Martin, D. Rothnie, Hilarie K. Orman, Ann B. Marmor-Squires, Martha A. Branstad, Bonnie P. Danner:
Evolution of a trusted B3 window system prototype. 226-239 - Hervé Debar, Monique Becker, Didier Siboni:
A neural network component for an intrusion detection system. 240-250 - Glenn S. Benson:
An optimal solution to the secure reader-writer problem. 251-258 - Jonathan K. Millen, Teresa F. Lunt:
Security for object-oriented database systems. 260-272 - Frédéric Cuppens, Kioumars Yazdanian:
A 'natural' decomposition of multi-level relations. 273-284 - Clark Weissman:
BLACKER: security for the DDN examples of A1 security engineering trades. 286-292
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.