The SCEAS System
Navigation Menu

Conferences in DBLP

IEEE Symposium on Security and Privacy (S&P) (sp)
1982 (conf/sp/1982)

  1. Steven B. Lipner
    Non-Discretionary Controls for Commercial Applications. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1982, pp:2-10 [Conf]
  2. Joseph A. Goguen, José Meseguer
    Security Policies and Security Models. [Citation Graph (1, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1982, pp:11-20 [Conf]
  3. Richard D. Graubart, John P. L. Woodward
    A Preliminary Naval Surveillance DBMS Security Model. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1982, pp:21-37 [Conf]
  4. Dorothy E. Denning, Jan Schlörer, Elisabeth Wehrle
    Memoryless Inference Controls for Statistical Databases. [Citation Graph (1, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1982, pp:38-45 [Conf]
  5. Klaus R. Dittrich, Karlheinz Hug, Peter Kammerer, Dieter Lienert, Hans Mau, Klaus Wachsmuth
    Protection in the OSKAR Operating System: Goals, Concepts, Consequences. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1982, pp:46-56 [Conf]
  6. Jonathan K. Millen
    Kernel Isolation for the PDP-11/70. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1982, pp:57-65 [Conf]
  7. Richard A. Kemmerer
    A Practical Approach to Identifying Storage and Timing Channels. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1982, pp:66-73 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002