The SCEAS System
Navigation Menu

Conferences in DBLP

IEEE Symposium on Security and Privacy (S&P) (sp)
1996 (conf/sp/1996)


  1. Conference Committee. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1996, pp:- [Conf]

  2. Message from the Program Chairs. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1996, pp:- [Conf]
  3. Ira S. Moskowitz, Steven J. Greenwald, Myong H. Kang
    An Analysis of the Timed Z-channel. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1996, pp:2-11 [Conf]
  4. Todd Fine
    Defining Noninterference in the Temporal Logic of Actions. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1996, pp:12-21 [Conf]
  5. Cynthia E. Irvine
    Goals for Computer Security Education. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1996, pp:24-25 [Conf]
  6. Stephen F. Burnett
    Computer Security Training and Education: A Needs Analysis. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1996, pp:26-27 [Conf]
  7. Ross J. Anderson
    A Security Policy Model for Clinical Information Systems. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1996, pp:30-43 [Conf]
  8. Dieter Gollmann
    What do We Mean by Entity Authentication? [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1996, pp:46-54 [Conf]
  9. Jianying Zhou, Dieter Gollmann
    A Fair Non-repudiation Protocol. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1996, pp:55-61 [Conf]
  10. Paul F. Syverson
    Limitations on Design Principles for Public Key Protocols. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1996, pp:62-72 [Conf]
  11. Paul Ammann, Sushil Jajodia, Indrakshi Ray
    Ensuring Atomicity of Multilevel Transactions. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1996, pp:74-84 [Conf]
  12. Xiaolei Qian
    View-Based Access Control with High Assurance. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1996, pp:85-93 [Conf]
  13. Elisa Bertino, Sushil Jajodia, Pierangela Samarati
    Supporting Multiple Access Control Policies in Database Systems. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1996, pp:94-107 [Conf]
  14. Patrik D'haeseleer, Stephanie Forrest, Paul Helman
    An Immunological Approach to Change Detection: Algorithms, Analysis and Implications. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1996, pp:110-119 [Conf]
  15. Stephanie Forrest, Steven A. Hofmeyr, Anil Somayaji, Thomas A. Longstaff
    A Sense of Self for Unix Processes. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1996, pp:120-128 [Conf]
  16. Adam Young, Moti Yung
    Cryptovirology: Extortion-Based Security Threats and Countermeasures. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1996, pp:129-140 [Conf]
  17. Simon N. Foley, Li Gong, Xiaolei Qian
    A Security Model of Dynamic Labeling Providing a Tiered Approach to Verification. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1996, pp:142-153 [Conf]
  18. Martin Röscheisen, Terry Winograd
    A Communication Agreement Framework for Access/Action Control. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1996, pp:154-163 [Conf]
  19. Matt Blaze, Joan Feigenbaum, Jack Lacy
    Decentralized Trust Management. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1996, pp:164-173 [Conf]
  20. Steve Schneider
    Security Properties and CSP. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1996, pp:174-187 [Conf]
  21. Drew Dean, Edward W. Felten, Dan S. Wallach
    Java Security: From HotJava to Netscape and Beyond. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1996, pp:190-200 [Conf]
  22. Wenbo Mao
    On two Proposals for On-line Bankcard Payments using Open Networks: Problems and Solutions. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1996, pp:201-210 [Conf]
  23. Leendert van Doorn, Martín Abadi, Michael Burrows, Edward Wobber
    Secure Network Objects. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1996, pp:211-221 [Conf]
  24. Cristina Serban, Bruce M. McMillin
    Run-Time Security Evaluation (RTSE) for Distributed Applications. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1996, pp:222-237 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002