The SCEAS System
Navigation Menu

Conferences in DBLP

IEEE Symposium on Security and Privacy (S&P) (sp)
1987 (conf/sp/1987)

  1. Paul T. Cummings, D. A. Fullam, M. J. Goldstein, M. J. Gosselin, Jeffrey Picciotto, John P. L. Woodward, J. Wynn
    Compartimented Mode Workstation: Results Through Prototyping. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1987, pp:2-12 [Conf]
  2. Jeffrey Picciotto
    The Design of an Effective Auditing Subsystem. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1987, pp:13-22 [Conf]
  3. John P. L. Woodward
    Exploiting the Dual Nature of Sensitivity Labels. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1987, pp:23-31 [Conf]
  4. Paul A. Karger
    Limiting the Damage Potential of Discretionary Trojan Horses. [Citation Graph (1, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1987, pp:32-37 [Conf]
  5. Steve R. White, Liam Comerford
    ABYSS: A Trusted Architecture for Software Protection. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1987, pp:38-51 [Conf]
  6. Steve H. Weingart
    Physical Security for the µABYSS System. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1987, pp:52-59 [Conf]
  7. Jonathan K. Millen
    Covert Channel Capacity. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1987, pp:60-66 [Conf]
  8. J. Guttman
    Information Flow and Invariance. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1987, pp:67-73 [Conf]
  9. Chii-Ren Tsai, Virgil D. Gligor, C. Sekar Chandersekaran
    A Formal Method for the Identification of Covert Storage Channels in Source Code. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1987, pp:74-87 [Conf]
  10. Louise E. Moser
    Graph Homomorphisms and the Design of Secure Computer Systems. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1987, pp:88-96 [Conf]
  11. J. C. Williams, George W. Dinolt
    A Graph-Theoretic Formulation of Multilevel Secure Distributed Systems: An Overview. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1987, pp:97-105 [Conf]
  12. William R. Bevier, Warren A. Hunt Jr., William D. Young
    Toward Verified Execution Environments. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1987, pp:106-115 [Conf]
  13. Simon N. Foley
    A Universal Theory of Information Flow. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1987, pp:116-122 [Conf]
  14. John McLean
    Reasoning About Security Models. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1987, pp:123-133 [Conf]
  15. Richard A. Kemmerer
    Using Formal Verification Techniques to Analyze Encryption Protocols. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1987, pp:134-139 [Conf]
  16. William D. Young, John McHugh
    Coding for a Believable Specification to Implementation Mapping. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1987, pp:140-149 [Conf]
  17. Glenn H. MacEwen, V. W. W. Poon, Janice I. Glasgow
    A Model for Multilevel Security Based on Operator Nets. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1987, pp:150-160 [Conf]
  18. Daryl McCullough
    Specifications for Multi-Level Security and a Hook-Up Property. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1987, pp:161-166 [Conf]
  19. David P. Anderson, P. Venkat Rangan
    A Basis for Secure Communication in Large Distributed Systems. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1987, pp:167-173 [Conf]
  20. Deborah Estrin, Gene Tsudik
    Visa Scheme for Inter-Organization Network Security. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1987, pp:174-183 [Conf]
  21. D. D. Clark, D. R. Wilson
    A Comparison of Commercial and Military Computer Security Policies. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1987, pp:184-195 [Conf]
  22. Selim G. Akl, Dorothy E. Denning
    Checking Classification Constraints for Consistency and Completeness. [Citation Graph (1, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1987, pp:196-201 [Conf]
  23. Tzong-An Su, Gultekin Özsoyoglu
    Data Dependencies and Inference Control in Multilevel Relational Database Systems. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1987, pp:202-211 [Conf]
  24. Catherine Meadows
    The Integrity Lock Architecture and Its Application to Message Systems: Reducing Covert Channels. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1987, pp:212-219 [Conf]
  25. Dorothy E. Denning, Teresa F. Lunt, Roger R. Schell, Mark Heckman, William R. Shockley
    A Multilevel Relational Data Model. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1987, pp:220-234 [Conf]
  26. Thomas A. Berson, Teresa F. Lunt
    Multilevel Security for Knowledge-Based Systems. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1987, pp:235-242 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002