default search action
16th S&P 1995: Oakland, California, USA
- Proceedings of the 1995 IEEE Symposium on Security and Privacy, Oakland, California, USA, May 8-10, 1995. IEEE Computer Society 1995, ISBN 0-8186-7015-0
Secure Commerce
- Matthew K. Franklin, Michael K. Reiter:
The design and implementation of a secure auction service. 2-14 - Ross J. Anderson, S. Johann Bezuidenhoudt:
Cryptographic credit control in pre-payment metering systems. 15-23
Network Security
- David A. Cooper, Kenneth P. Birman:
Preserving privacy in a network of mobile computers. 26-38 - Stuart Staniford-Chen, Todd L. Heberlein:
Holding intruders accountable on the Internet. 39-49 - Robert H. Deng, Shailendra K. Bhonsle, Weiguo Wang, Aurel A. Lazar:
Integrating security in CORBA based object architectures. 50-61
Secure Operating Systems
- Lee Badger, Daniel F. Sterne, David L. Sherman, Kenneth M. Walker, Sheila A. Haghighat:
Practical Domain and Type Enforcement for UNIX. 66-77 - Cynthia E. Irvine:
A multilevel file system for high assurance. 78-87 - Mike Seager, David Guaspari, Matthew Stillerman, Carla Marceau:
Formal methods in the THETA kernel. 88-100
Formal Models for Multilevel Security
- Sylvan Pinsky:
Absorbing covers and intransitive non-interference. 102-113 - A. W. Roscoe:
CSP and determinism in security modelling. 114-127 - Fang Chen, Ravi S. Sandhu:
The semantics and expressive power of the MLR data model. 128-142
Covert Channel Control
- Myong H. Kang, Ira S. Moskowitz, Daniel C. Lee:
A network version of the Pump. 144-154 - Randy Browne:
An architecture for covert channel control in realtime networks and multiprocessors. 155-168 - Andrew Warner, Thomas F. Keefe:
Version pool management in a multilevel secure multiversion transaction manager. 169-182
Analysis of Security Vulnerabilities
- Balaji R. Venkatraman, Richard E. Newman-Wolfe:
Capacity estimation and auditability of network covert channels. 186-198 - Rasikan David, Sang Hyuk Son, Ravi Mukkamala:
Supporting security requirements in multilevel real-time databases. 199-210 - Olin Sibert, Phillip A. Porras, Robert Lindell:
The Intel 80×86 processor architecture: pitfalls for secure systems. 211-222
Protocol Analysis
- Stuart G. Stubblebine:
Recent-secure authentication: enforcing revocation in distributed systems. 224-235 - Rajashekar Kailar:
Reasoning about accountability in protocols for electronic commerce. 236-250 - Jonathan K. Millen:
The Interrogator model. 251-260
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.