John McHugh, Andrew P. Moore A Security Policy and Formal Top Level Specification for a Multi-Level Secure Local Area Network. [Citation Graph (0, 0)][DBLP] IEEE Symposium on Security and Privacy, 1986, pp:34-39 [Conf]
Ravi S. Sandhu, M. E. Share Some Owner Based Schemes with Dynamic Groups in the Schematic Protection Model. [Citation Graph (0, 0)][DBLP] IEEE Symposium on Security and Privacy, 1986, pp:61-70 [Conf]
L. S. Chalmers An Analysis of the Differences Between the Computer Security Practices in the Military and Private Sectors. [Citation Graph (0, 0)][DBLP] IEEE Symposium on Security and Privacy, 1986, pp:71-77 [Conf]
Catherine Meadows A More Efficient Cryptographic Matchmaking Protocol for Use in the Absence of a Continuously Available Third Party. [Citation Graph (0, 0)][DBLP] IEEE Symposium on Security and Privacy, 1986, pp:134-137 [Conf]
Wen-Pai Lu, Malur K. Sundareshan A Hierarchical Key Management Scheme for End-to-End Encryption in Internet Environments. [Citation Graph (0, 0)][DBLP] IEEE Symposium on Security and Privacy, 1986, pp:138-147 [Conf]
Norman S. Matloff Another Look at the Use of Noise Addition for Database Security. [Citation Graph (0, 0)][DBLP] IEEE Symposium on Security and Privacy, 1986, pp:173-181 [Conf]
R. A. Carlson, Teresa F. Lunt The Trusted Domain Machine: A Secure Communication Device for Security Guard Applications. [Citation Graph (0, 0)][DBLP] IEEE Symposium on Security and Privacy, 1986, pp:182-186 [Conf]
John E. Dobson, Brian Randell Building Reliable Secure Computing Systems out of Unreliable Insecure Components. [Citation Graph (0, 0)][DBLP] IEEE Symposium on Security and Privacy, 1986, pp:187-193 [Conf]
Dan M. Nessett Factors Affecting Distributed System Security. [Citation Graph (0, 0)][DBLP] IEEE Symposium on Security and Privacy, 1986, pp:204-222 [Conf]