The SCEAS System
Navigation Menu

Conferences in DBLP

IEEE Symposium on Security and Privacy (S&P) (sp)
1984 (conf/sp/1984)

  1. Paul A. Karger, A. J. Herbert
    An Augmented Capability Architecture to Support Lattice Security and Traceability of Access. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1984, pp:2-12 [Conf]
  2. B. D. Gold, R. Linde, P. F. Cudney
    KVM/37O in Retrospect. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1984, pp:13-23 [Conf]
  3. S. Kramer
    Linus IV : An Experiment in Computer Security. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1984, pp:24-33 [Conf]
  4. Carl E. Landwehr, John M. Carroll
    Hardware Requirements for Secure Computer Systems: A Framework. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1984, pp:34-40 [Conf]
  5. M. Schaefer, Roger R. Schell
    Toward an Understanding of Extensible Architectures for Evaluated Trusted Computer System Products. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1984, pp:41-51 [Conf]
  6. Dorothy E. Denning
    Cryptographic Checksums for Multilevel Database Security. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1984, pp:52-61 [Conf]
  7. Richard D. Graubart
    The Integrity-Lock Approach to Secure Database Management. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1984, pp:62-74 [Conf]
  8. Joseph A. Goguen, José Meseguer
    Unwinding and Inference Control. [Citation Graph (1, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1984, pp:75-87 [Conf]
  9. Robert S. Winternitz
    A Secure One-Way Hash Function Built from DES. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1984, pp:88-90 [Conf]
  10. Neal R. Wagner
    Searching for Public-Key Cryptosystems. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1984, pp:91-98 [Conf]
  11. David Chaum
    A New Paradigm for Individuals in the Information Age. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1984, pp:99-106 [Conf]
  12. Richard Platek
    The Use of Ada as an Implementation Language in Formally Specified Systems. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1984, pp:107-110 [Conf]
  13. Lawrence Yelowitz
    Practical Experience with an Ada-Based Formal Specification/Language on a Large Project. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1984, pp:111-113 [Conf]
  14. Dan Craigen
    Ottawa Euclid and EVES: A Status Report. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1984, pp:114-124 [Conf]
  15. T. V. Benzel
    Analysis of a Kernel Verification. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1984, pp:125-133 [Conf]
  16. Jonathan K. Millen
    The Interrogator: A Tool for Cryptographic Protocol Security. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1984, pp:134-141 [Conf]
  17. Deepinder P. Sidhu
    Executable Logic Specifications: A New Approach to Computer Security. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1984, pp:142-153 [Conf]
  18. D. E. Britton
    Formal Verification of a Secure Network with End-to-End Encryption. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1984, pp:154-166 [Conf]
  19. Glenn H. MacEwen, B. Burwell, Z.-J. Lu
    Multi-Level Security Based on Physical Distribution. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1984, pp:167-179 [Conf]
  20. D. Bailey
    Attacks on Computers: Congressional Hearings and Pending Legislation. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1984, pp:180-187 [Conf]
  21. John D. McLean, Carl E. Landwehr, Constance L. Heitmeyer
    A Formal Statement of the MMS Security Model. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1984, pp:188-194 [Conf]
  22. T. Taylor
    Comparison Paper between the Bell and LaPadula Model and the SRI Model. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1984, pp:195-203 [Conf]
  23. J. O. Neilson, F. E. Wuebker
    Design Experiences from the Multilevel Secure MCF Operating System. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1984, pp:204-208 [Conf]
  24. Tanya Korelsky, David Sutherland
    Formal Specification of a Multi-Level Secure Operating System. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1984, pp:209-218 [Conf]
  25. B. A. Hartman
    A Gypsy-Based Kernel. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1984, pp:219-225 [Conf]
  26. George W. Dinolt, Richard B. Neely, P. C. Baker, J. Freeman
    Multinet Gateway-Towards A1 Certification. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1984, pp:226-226 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002