J. Linn Practical Authentication for Distributed Computing. [Citation Graph (0, 0)][DBLP] IEEE Symposium on Security and Privacy, 1990, pp:31-40 [Conf]
Dan Gusfield A Little Knowledge Goes a Long Way: Faster Detection of Compromised Data in 2-D Tables. [Citation Graph (1, 0)][DBLP] IEEE Symposium on Security and Privacy, 1990, pp:86-94 [Conf]
Catherine Meadows Extending the Brewer-Nash Model to a Multilevel Context. [Citation Graph (0, 0)][DBLP] IEEE Symposium on Security and Privacy, 1990, pp:95-103 [Conf]
R. W. Baldwin Naming and Grouping Privileges to Simplify Security Management in Large Databases. [Citation Graph (1, 0)][DBLP] IEEE Symposium on Security and Privacy, 1990, pp:116-132 [Conf]
T. Fine Constructively Using Noninterference to Analyze Systems. [Citation Graph (0, 0)][DBLP] IEEE Symposium on Security and Privacy, 1990, pp:162-169 [Conf]
P.-C. Cheng, Virgil D. Gligor On the Formal Specification and Verification of a Multiparty Session Protocol. [Citation Graph (0, 0)][DBLP] IEEE Symposium on Security and Privacy, 1990, pp:216-233 [Conf]
R. Ramaswamy A Security Architecture and Mechanism for Data Confidentiality in TCP/IP Protocols. [Citation Graph (0, 0)][DBLP] IEEE Symposium on Security and Privacy, 1990, pp:249-261 [Conf]
H. S. Teng, K. Chen, S. C. Y. Lu Adaptive Real-Time Anomaly Detection Using Inductively Generated Sequential Patterns. [Citation Graph (1, 0)][DBLP] IEEE Symposium on Security and Privacy, 1990, pp:278-284 [Conf]
H. Brix, A. Dietl Formal Construction of Provably Secure Systems with Cartesiana. [Citation Graph (0, 0)][DBLP] IEEE Symposium on Security and Privacy, 1990, pp:319-332 [Conf]
Phillip J. Windley A Hierarchical Methodology for Verifying Microprogrammed Microprocessors. [Citation Graph (0, 0)][DBLP] IEEE Symposium on Security and Privacy, 1990, pp:345-359 [Conf]
Sushil Jajodia, Boris Kogan Transaction Processing in Multilevel-Secure Databases Using Replicated Architecture. [Citation Graph (2, 0)][DBLP] IEEE Symposium on Security and Privacy, 1990, pp:360-368 [Conf]
Thomas F. Keefe, Wei-Tek Tsai Multiversion Concurrency Control for Multilevel Secure Database Systems. [Citation Graph (2, 0)][DBLP] IEEE Symposium on Security and Privacy, 1990, pp:369-383 [Conf]
Gary W. Smith Modeling Security-Relevant Data Semantics. [Citation Graph (1, 0)][DBLP] IEEE Symposium on Security and Privacy, 1990, pp:384-393 [Conf]
Rein Turn Information Privacy Issues for the 1990s. [Citation Graph (0, 0)][DBLP] IEEE Symposium on Security and Privacy, 1990, pp:394-400 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP