The SCEAS System
Navigation Menu

Conferences in DBLP

IEEE Symposium on Security and Privacy (S&P) (sp)
1990 (conf/sp/1990)

  1. Paul A. Karger, Mary Ellen Zurko, Douglas W. Bonin, Andrew H. Mason, Clifford E. Kahn
    A VMM Security Kernel for the VAX Architecture. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1990, pp:2-19 [Conf]
  2. Morrie Gasser, E. McDermott
    An Architecture for Practical Delegation in a Distributed System. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1990, pp:20-30 [Conf]
  3. J. Linn
    Practical Authentication for Distributed Computing. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1990, pp:31-40 [Conf]
  4. W. C. Birnbaum
    SP3 Peer Identification. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1990, pp:41-49 [Conf]
  5. N. A. Waldhart
    The Army Secure Operating System. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1990, pp:50-60 [Conf]
  6. Benedetto L. DiVito, P. H. Palmquist, E. R. Anderson, M. L. Johnston
    Specification and Verification of the ASOS Kernel. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1990, pp:61-75 [Conf]
  7. Sushil Jajodia, Boris Kogan
    Integrating an Object-Oriented Data Model with Multilevel Security. [Citation Graph (1, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1990, pp:76-85 [Conf]
  8. Dan Gusfield
    A Little Knowledge Goes a Long Way: Faster Detection of Compromised Data in 2-D Tables. [Citation Graph (1, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1990, pp:86-94 [Conf]
  9. Catherine Meadows
    Extending the Brewer-Nash Model to a Multilevel Context. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1990, pp:95-103 [Conf]
  10. Sushil Jajodia, Ravi S. Sandhu
    Polyinstantiation Integrity in Multilevel Relations. [Citation Graph (1, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1990, pp:104-115 [Conf]
  11. R. W. Baldwin
    Naming and Grouping Privileges to Simplify Security Management in Large Databases. [Citation Graph (1, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1990, pp:116-132 [Conf]
  12. Rae K. Burns
    Referential Secrecy. [Citation Graph (1, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1990, pp:133-143 [Conf]
  13. J. Todd Wittbold, Dale M. Johnson
    Information Flow in Nondeterministic Systems. [Citation Graph (1, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1990, pp:144-161 [Conf]
  14. T. Fine
    Constructively Using Noninterference to Analyze Systems. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1990, pp:162-169 [Conf]
  15. James W. Gray III
    Probabilistic Interference. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1990, pp:170-179 [Conf]
  16. John McLean
    Security Models and Information Flow. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1990, pp:180-189 [Conf]
  17. Catherine D. McCollum, J. R. Messing, LouAnna Notargiacomo
    Beyond the Pale of MAC and DAC-Defining New Forms of Access Control. [Citation Graph (1, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1990, pp:190-200 [Conf]
  18. M. J. Nash, K. R. Poland
    Some Conundrums Concerning Separation of Duty. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1990, pp:201-209 [Conf]
  19. M. Branstad, W. C. Barker, P. Cochrane
    The Role of Trust in Protected Mail. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1990, pp:210-215 [Conf]
  20. P.-C. Cheng, Virgil D. Gligor
    On the Formal Specification and Verification of a Multiparty Session Protocol. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1990, pp:216-233 [Conf]
  21. Li Gong, Roger M. Needham, Raphael Yahalom
    Reasoning about Belief in Cryptographic Protocols. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1990, pp:234-248 [Conf]
  22. R. Ramaswamy
    A Security Architecture and Mechanism for Data Confidentiality in TCP/IP Protocols. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1990, pp:249-261 [Conf]
  23. K. F. Seiden, J. P. Melanson
    The Auditing Facility for a VMM Security Kernel. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1990, pp:262-277 [Conf]
  24. H. S. Teng, K. Chen, S. C. Y. Lu
    Adaptive Real-Time Anomaly Detection Using Inductively Generated Sequential Patterns. [Citation Graph (1, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1990, pp:278-284 [Conf]
  25. Shiuh-Pyng Shieh, Virgil D. Gligor
    Auditing the Use of Covert Storage Channels in Secure Systems. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1990, pp:285-295 [Conf]
  26. L. Todd Herberlein, Gihan V. Dias, Karl N. Levitt, Biswanath Mukherjee, Jeff Wood, David Wolber
    A Network Security Monitor. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1990, pp:296-305 [Conf]
  27. Benedetto L. DiVito, Cristi Garvey, D. Kwong, A. Murray, Jane Solomon, Amy Wu
    The Deductive Theory Manager: A Knowledge Based System for Formal Verification. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1990, pp:306-318 [Conf]
  28. H. Brix, A. Dietl
    Formal Construction of Provably Secure Systems with Cartesiana. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1990, pp:319-332 [Conf]
  29. Joshua D. Guttman, H.-P. Ko
    Verifying a Hardware Security Architecture. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1990, pp:333-344 [Conf]
  30. Phillip J. Windley
    A Hierarchical Methodology for Verifying Microprogrammed Microprocessors. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1990, pp:345-359 [Conf]
  31. Sushil Jajodia, Boris Kogan
    Transaction Processing in Multilevel-Secure Databases Using Replicated Architecture. [Citation Graph (2, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1990, pp:360-368 [Conf]
  32. Thomas F. Keefe, Wei-Tek Tsai
    Multiversion Concurrency Control for Multilevel Secure Database Systems. [Citation Graph (2, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1990, pp:369-383 [Conf]
  33. Gary W. Smith
    Modeling Security-Relevant Data Semantics. [Citation Graph (1, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1990, pp:384-393 [Conf]
  34. Rein Turn
    Information Privacy Issues for the 1990s. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1990, pp:394-400 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002