Todd Fine Defining Noninterference in the Temporal Logic of Actions. [Citation Graph (0, 0)][DBLP] IEEE Symposium on Security and Privacy, 1996, pp:12-21 [Conf]
Stephen F. Burnett Computer Security Training and Education: A Needs Analysis. [Citation Graph (0, 0)][DBLP] IEEE Symposium on Security and Privacy, 1996, pp:26-27 [Conf]
Ross J. Anderson A Security Policy Model for Clinical Information Systems. [Citation Graph (0, 0)][DBLP] IEEE Symposium on Security and Privacy, 1996, pp:30-43 [Conf]
Dieter Gollmann What do We Mean by Entity Authentication? [Citation Graph (0, 0)][DBLP] IEEE Symposium on Security and Privacy, 1996, pp:46-54 [Conf]
Paul F. Syverson Limitations on Design Principles for Public Key Protocols. [Citation Graph (0, 0)][DBLP] IEEE Symposium on Security and Privacy, 1996, pp:62-72 [Conf]
Xiaolei Qian View-Based Access Control with High Assurance. [Citation Graph (0, 0)][DBLP] IEEE Symposium on Security and Privacy, 1996, pp:85-93 [Conf]
Wenbo Mao On two Proposals for On-line Bankcard Payments using Open Networks: Problems and Solutions. [Citation Graph (0, 0)][DBLP] IEEE Symposium on Security and Privacy, 1996, pp:201-210 [Conf]