The SCEAS System
Navigation Menu

Conferences in DBLP

IEEE Symposium on Security and Privacy (S&P) (sp)
1991 (conf/sp/1991)

  1. J. C. Wray
    An Analysis of Covert Timing Channels. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1991, pp:2-7 [Conf]
  2. W.-M. Hu
    Reducing Timing Channels with Fuzzy Time. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1991, pp:8-20 [Conf]
  3. James W. Gray III
    Toward a Mathematical Foundation for Information Flow Security. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1991, pp:21-35 [Conf]
  4. Phillip A. Porras, Richard A. Kemmerer
    Covert Flow Trees: A Technique for Identifying and Analyzing Covert Storage Channels. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1991, pp:36-51 [Conf]
  5. Paul A. Karger, J. C. Wray
    Storage Channels in Disk Arm Optimization. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1991, pp:52-63 [Conf]
  6. J. G. Williams
    Modeling Nondisclosure in Terms of the Subject-Instruction Stream. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1991, pp:64-77 [Conf]
  7. N. L. Kelem, Richard J. Feiertag
    A Separation Model for Virtual Machine Monitors. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1991, pp:78-86 [Conf]
  8. Paul Ammann, Ravi S. Sandhu
    Safety Analysis for the Extended Schematic Protection Model. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1991, pp:87-97 [Conf]
  9. Simon N. Foley
    A Taxonomy for Information Flow Policies and Models. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1991, pp:98-109 [Conf]
  10. Yves Deswarte, Laurent Blain, Jean-Charles Fabre
    Intrusion Tolerance in Distributed Computing Systems. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1991, pp:110-121 [Conf]
  11. Jim Alves-Foss, Karl N. Levitt
    Verification of Secure Distributed Systems in Higher Order Logic: A Modular Approach Using Generic Components. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1991, pp:122-135 [Conf]
  12. Simon S. Lam, A. Udaya Shankar, Thomas Y. C. Woo
    Applying a Theory of Modules and Interfaces to Security Verification. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1991, pp:136-155 [Conf]
  13. Paul F. Syverson
    The Use of Logic in the Analysis of Cryptographic Protocols. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1991, pp:156-170 [Conf]
  14. Einar Snekkenes
    Exploring the BAN Approach to Protocol Analysis. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1991, pp:171-181 [Conf]
  15. Catherine Meadows
    A System for the Specification and Verification of Key Management Protocols. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1991, pp:182-197 [Conf]
  16. Edward Amoroso, T. Nguyen, Jonathan Weiss, John Watson, P. Lapiska, T. Starr
    Toward an Approach to Measuring Software Trust. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1991, pp:198-218 [Conf]
  17. Daniel F. Sterne
    On the Buzzword "Security Policy". [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1991, pp:219-231 [Conf]
  18. Joseph Tardo, K. Alagappan
    SPX: Global Authentication Using Public Key Certificates. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1991, pp:232-244 [Conf]
  19. C. Fritzner, L. Nilsen, Å. Skomedal
    Protecting Security Information in Distributed Systems. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1991, pp:245-254 [Conf]
  20. Vijay Varadharajan, Phillip Allen, Stewart Black
    An Analysis of the Proxy Problem in Distributed Systems. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1991, pp:255-277 [Conf]
  21. George T. Duncan, Sumitra Mukherjee
    Microdata Disclosure Limitation in Statistical Databases: Query Size and Random Sample Query Control. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1991, pp:278-287 [Conf]
  22. Udo Kelter
    Discretionary Access Controls in a High-Performance Object Management System. [Citation Graph (2, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1991, pp:288-299 [Conf]
  23. Sushil Jajodia, Ravi S. Sandhu
    A Novel Decomposition of Multilevel Relations into Single-Level Relations. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1991, pp:300-315 [Conf]
  24. H. S. Javitz, A. Valdes
    The SRI IDES Statistical Anomaly Detector. [Citation Graph (1, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1991, pp:316-326 [Conf]
  25. Shiuh-Pyng Shieh, Virgil D. Gligor
    A Pattern-Oriented Intrusion-Detection Model and Its Applications. [Citation Graph (1, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1991, pp:327-342 [Conf]
  26. Jeffrey O. Kephart, Steve R. White
    Directed-Graph Epidemiological Models of Computer Viruses. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1991, pp:343-361 [Conf]
  27. Ira S. Moskowitz
    Variable Noise Effects Upon a Simple Timing Channel. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1991, pp:362-372 [Conf]
  28. Randy Brown
    The Turing Test and Non-Information Flow. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1991, pp:373-388 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002