The SCEAS System
Navigation Menu

Conferences in DBLP

IEEE Symposium on Security and Privacy (S&P) (sp)
1986 (conf/sp/1986)

  1. Jeannette M. Wing, Mark R. Nixon
    Extending Ina Jo with Temporal Logic. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1986, pp:2-13 [Conf]
  2. J. Thomas Haigh, Richard A. Kemmerer, John McHugh, William D. Young
    An Experience Using Two Covert Channel Analysis Techniques on a Real System Design. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1986, pp:14-24 [Conf]
  3. J. Daniel Halpern, Sam Owre, Norman Proctor, William F. Wilson
    Muse : A Computer Assisted Verification System. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1986, pp:25-33 [Conf]
  4. John McHugh, Andrew P. Moore
    A Security Policy and Formal Top Level Specification for a Multi-Level Secure Local Area Network. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1986, pp:34-39 [Conf]
  5. Virgil D. Gligor, C. Sekar Chandersekaran, W. Cheng, Wen-Der Jiang, Abhai Johri, Gary L. Luckenbaugh, L. Edward Reich
    A New Security Testing Method and Its Application to the Secure Xenix Kernel. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1986, pp:40-59 [Conf]
  6. J. Thomas Haigh, William D. Young
    Extending the Non-Interference Version of MLS for SAT. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1986, pp:60-60 [Conf]
  7. Ravi S. Sandhu, M. E. Share
    Some Owner Based Schemes with Dynamic Groups in the Schematic Protection Model. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1986, pp:61-70 [Conf]
  8. L. S. Chalmers
    An Analysis of the Differences Between the Computer Security Practices in the Military and Private Sectors. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1986, pp:71-77 [Conf]
  9. S. A. Rajunas, Norman Hardy, Allen C. Bomberger, William S. Frantz, Charles R. Landau
    Security in KeyKOS. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1986, pp:78-85 [Conf]
  10. Simon R. Wiseman
    A Secure Capability Computer System. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1986, pp:86-94 [Conf]
  11. Richard Y. Kain, Carl E. Landwehr
    On Access Checking in Capability-Based Systems. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1986, pp:95-101 [Conf]
  12. Virgil D. Gligor, E. L. Burch, C. Sekar Chandersekaran, Robert S. Chapman, Leslie J. Dotterer, Matthew S. Hecht, Wen-Der Jiang, Gary L. Luckenbaugh, N. Vasudevan
    On the Design and the Implementation of Secure Xenix Workstations. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1986, pp:102-117 [Conf]
  13. Dorothy E. Denning
    An Intrusion-Detection Model. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1986, pp:118-133 [Conf]
  14. Catherine Meadows
    A More Efficient Cryptographic Matchmaking Protocol for Use in the Absence of a Continuously Available Third Party. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1986, pp:134-137 [Conf]
  15. Wen-Pai Lu, Malur K. Sundareshan
    A Hierarchical Key Management Scheme for End-to-End Encryption in Internet Environments. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1986, pp:138-147 [Conf]
  16. Neal R. Wagner, Paul Putter, Marianne R. Cain
    Encrypted Database Design: Specialized Approaches. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1986, pp:148-155 [Conf]
  17. Dorothy E. Denning, Selim G. Akl, Matthew Morgenstern, Peter G. Neumann, Roger R. Schell, Mark Heckman
    Views for Multilevel Database Security. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1986, pp:156-172 [Conf]
  18. Norman S. Matloff
    Another Look at the Use of Noise Addition for Database Security. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1986, pp:173-181 [Conf]
  19. R. A. Carlson, Teresa F. Lunt
    The Trusted Domain Machine: A Secure Communication Device for Security Guard Applications. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1986, pp:182-186 [Conf]
  20. John E. Dobson, Brian Randell
    Building Reliable Secure Computing Systems out of Unreliable Insecure Components. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1986, pp:187-193 [Conf]
  21. J.-M. Fray, Yves Deswarte, David Powell
    Intrusion-Tolerance Using Fine-Grain Fragmentation-Scattering. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1986, pp:194-203 [Conf]
  22. Dan M. Nessett
    Factors Affecting Distributed System Security. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1986, pp:204-222 [Conf]
  23. Andrew Birrell, Butler W. Lampson, Roger M. Needham, Michael D. Schroeder
    A Global Authentication Service without Global Trust. [Citation Graph (1, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1986, pp:223-230 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002