The SCEAS System
Navigation Menu

Conferences in DBLP

IEEE Symposium on Security and Privacy (S&P) (sp)
1997 (conf/sp/1997)


  1. Conference Committee. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1997, pp:- [Conf]

  2. Message from the Program Chairs. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1997, pp:- [Conf]
  3. John D. McLean
    Is the Trusted Computing Base Concept Fundamentally Flawed? [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1997, pp:2- [Conf]
  4. Bob Blakley, Darrell M. Kienzle
    Some weaknesses of the TCB model. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1997, pp:3-5 [Conf]
  5. William R. Shockley, James P. Downey
    Is the Reference Monitor Concept Fatally Flawed? The Case for the Negative. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1997, pp:6-7 [Conf]
  6. Michael K. Reiter, Stuart G. Stubblebine
    Toward Acceptable Metrics of Authentication. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1997, pp:10-20 [Conf]
  7. Vincent Nicomette, Yves Deswarte
    An Authorization Scheme For Distributed Object Systems. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1997, pp:21-30 [Conf]
  8. Sushil Jajodia, Pierangela Samarati, V. S. Subrahmanian
    A Logical Language for Expressing Authorizations. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1997, pp:31-42 [Conf]
  9. Paul F. Syverson, David M. Goldschlag, Michael G. Reed
    Anonymous Connections and Onion Routing. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1997, pp:44-54 [Conf]
  10. V. R. Pesati, T. E. Keefe, S. Pal
    The Design and Implementation of a Multilevel Secure Log Manager. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1997, pp:55-64 [Conf]
  11. William A. Arbaugh, David J. Farber, Jonathan M. Smith
    A Secure and Reliable Bootstrap Architecture. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1997, pp:65-71 [Conf]
  12. Kelly Djahandari, Daniel F. Sterne
    An MBone Proxy for an Application Gateway Firewall. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1997, pp:72-81 [Conf]
  13. Mark Moriconi, Xiaolei Qian, Robert A. Riemenschneider, Li Gong
    Secure Software Architectures. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1997, pp:84-93 [Conf]
  14. Aris Zakinthinos, E. Stewart Lee
    A General Theory of Security Properties. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1997, pp:94-102 [Conf]
  15. Laurence Cholvy, Frédéric Cuppens
    Analyzing Consistency of Security Policies. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1997, pp:103-112 [Conf]
  16. Marvin Schaefer, Sylvan Pinsky, Drew Dean, Li Gong, Jim Roskind, Barbara Fox
    Ensuring Assurance in Mobile Computing. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1997, pp:114-118 [Conf]
  17. Joshua D. Guttman
    Filtering Postures: Local Enforcement for Global Policies. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1997, pp:120-129 [Conf]
  18. Elena Ferrari, Pierangela Samarati, Elisa Bertino, Sushil Jajodia
    Providing flexibility in information flow control for object oriented systems. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1997, pp:130-140 [Conf]
  19. John C. Mitchell, Mark Mitchell, Ulrich Stern
    Automated analysis of cryptographic protocols using Mur-phi. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1997, pp:141-151 [Conf]
  20. Ulf Lindqvist, Erland Jonsson
    How to Systematically Classify Computer Security Intrusions. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1997, pp:154-163 [Conf]
  21. Paul Ammann, Sushil Jajodia, Catherine D. McCollum, Barbara T. Blaustein
    Surviving information warfare attacks on databases. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1997, pp:164-174 [Conf]
  22. Calvin Ko, Manfred Ruschitzka, Karl N. Levitt
    Execution Monitoring of Security-Critical Programs in Distributed Systems: A Specification-Based Approach. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1997, pp:175-187 [Conf]
  23. John Hale, Sujeet Shenoi
    Catalytic Inference Analysis: Detecting Inference Threats due to Knowledge Discovery. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1997, pp:188-199 [Conf]
  24. Cynthia E. Irvine
    Security in Innovative New Operating Systems. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1997, pp:202-203 [Conf]
  25. George C. Necula, Peter Lee
    Research on Proof-Carrying Code for Untrusted-Code Security. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1997, pp:204- [Conf]
  26. Robert Grimm, Brian N. Bershad
    Access Control for the SPIN Extensible Operating System. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1997, pp:205- [Conf]
  27. Oliver Spatscheck, Larry L. Peterson
    Escort: Securing Scout Paths. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1997, pp:206- [Conf]
  28. Christoph L. Schuba, Ivan Krsul, Markus G. Kuhn, Eugene H. Spafford, Aurobindo Sundaram, Diego Zamboni
    Analysis of a Denial of Service Attack on TCP. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1997, pp:208-223 [Conf]
  29. Adam Young, Moti Yung
    Deniable Password Snatching: On the Possibility of Evasive Electronic Espionage. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1997, pp:224-235 [Conf]
  30. Sarvar Patel
    Number Theoretic Attacks on Secure Password Schemes. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1997, pp:236-247 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002