


default search action
8th S&P 1987: Oakland, California, USA
- Proceedings of the 1987 IEEE Symposium on Security and Privacy, Oakland, California, USA, April 27-29, 1987. IEEE Computer Society 1987, ISBN 0-8186-0771-8

- Paul T. Cummings, D. A. Fullam, M. J. Goldstein, M. J. Gosselin, Jeffrey Picciotto, John P. L. Woodward, J. Wynn:

Compartimented Mode Workstation: Results Through Prototyping. 2-12 - Jeffrey Picciotto:

The Design of an Effective Auditing Subsystem. 13-22 - John P. L. Woodward:

Exploiting the Dual Nature of Sensitivity Labels. 23-31 - Paul A. Karger:

Limiting the Damage Potential of Discretionary Trojan Horses. 32-37 - Steve R. White, Liam Comerford:

ABYSS: A Trusted Architecture for Software Protection. 38-51 - Steve H. Weingart:

Physical Security for the µABYSS System. 52-59 - Jonathan K. Millen:

Covert Channel Capacity. 60-66 - Joshua D. Guttman

:
Information Flow and Invariance. 67-73 - Chii-Ren Tsai, Virgil D. Gligor, C. Sekar Chandersekaran:

A Formal Method for the Identification of Covert Storage Channels in Source Code. 74-87 - Louise E. Moser:

Graph Homomorphisms and the Design of Secure Computer Systems. 88-96 - J. C. Williams, George W. Dinolt:

A Graph-Theoretic Formulation of Multilevel Secure Distributed Systems: An Overview. 97-105 - William R. Bevier, Warren A. Hunt Jr., William D. Young:

Toward Verified Execution Environments. 106-115 - Simon N. Foley:

A Universal Theory of Information Flow. 116-122 - John McLean:

Reasoning About Security Models. 123-133 - Richard A. Kemmerer:

Using Formal Verification Techniques to Analyze Encryption Protocols. 134-139 - William D. Young, John McHugh:

Coding for a Believable Specification to Implementation Mapping. 140-149 - Glenn H. MacEwen, V. W. W. Poon, Janice I. Glasgow:

A Model for Multilevel Security Based on Operator Nets. 150-160 - Daryl McCullough:

Specifications for Multi-Level Security and a Hook-Up Property. 161-166 - David P. Anderson, P. Venkat Rangan:

A Basis for Secure Communication in Large Distributed Systems. 167-173 - Deborah Estrin, Gene Tsudik:

Visa Scheme for Inter-Organization Network Security. 174-183 - David D. Clark, D. R. Wilson:

A Comparison of Commercial and Military Computer Security Policies. 184-195 - Selim G. Akl, Dorothy E. Denning:

Checking Classification Constraints for Consistency and Completeness. 196-201 - Tzong-An Su, Gultekin Özsoyoglu:

Data Dependencies and Inference Control in Multilevel Relational Database Systems. 202-211 - Catherine Meadows:

The Integrity Lock Architecture and Its Application to Message Systems: Reducing Covert Channels. 212-219 - Dorothy E. Denning, Teresa F. Lunt, Roger R. Schell, Mark R. Heckman, William R. Shockley:

A Multilevel Relational Data Model. 220-234 - Thomas A. Berson, Teresa F. Lunt:

Multilevel Security for Knowledge-Based Systems. 235-242

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














