Paul A. Karger, A. J. Herbert An Augmented Capability Architecture to Support Lattice Security and Traceability of Access. [Citation Graph (0, 0)][DBLP] IEEE Symposium on Security and Privacy, 1984, pp:2-12 [Conf]
M. Schaefer, Roger R. Schell Toward an Understanding of Extensible Architectures for Evaluated Trusted Computer System Products. [Citation Graph (0, 0)][DBLP] IEEE Symposium on Security and Privacy, 1984, pp:41-51 [Conf]
Dorothy E. Denning Cryptographic Checksums for Multilevel Database Security. [Citation Graph (0, 0)][DBLP] IEEE Symposium on Security and Privacy, 1984, pp:52-61 [Conf]
Richard D. Graubart The Integrity-Lock Approach to Secure Database Management. [Citation Graph (0, 0)][DBLP] IEEE Symposium on Security and Privacy, 1984, pp:62-74 [Conf]
Neal R. Wagner Searching for Public-Key Cryptosystems. [Citation Graph (0, 0)][DBLP] IEEE Symposium on Security and Privacy, 1984, pp:91-98 [Conf]
David Chaum A New Paradigm for Individuals in the Information Age. [Citation Graph (0, 0)][DBLP] IEEE Symposium on Security and Privacy, 1984, pp:99-106 [Conf]
Richard Platek The Use of Ada as an Implementation Language in Formally Specified Systems. [Citation Graph (0, 0)][DBLP] IEEE Symposium on Security and Privacy, 1984, pp:107-110 [Conf]
Lawrence Yelowitz Practical Experience with an Ada-Based Formal Specification/Language on a Large Project. [Citation Graph (0, 0)][DBLP] IEEE Symposium on Security and Privacy, 1984, pp:111-113 [Conf]
Dan Craigen Ottawa Euclid and EVES: A Status Report. [Citation Graph (0, 0)][DBLP] IEEE Symposium on Security and Privacy, 1984, pp:114-124 [Conf]
T. V. Benzel Analysis of a Kernel Verification. [Citation Graph (0, 0)][DBLP] IEEE Symposium on Security and Privacy, 1984, pp:125-133 [Conf]
Jonathan K. Millen The Interrogator: A Tool for Cryptographic Protocol Security. [Citation Graph (0, 0)][DBLP] IEEE Symposium on Security and Privacy, 1984, pp:134-141 [Conf]
Deepinder P. Sidhu Executable Logic Specifications: A New Approach to Computer Security. [Citation Graph (0, 0)][DBLP] IEEE Symposium on Security and Privacy, 1984, pp:142-153 [Conf]
D. E. Britton Formal Verification of a Secure Network with End-to-End Encryption. [Citation Graph (0, 0)][DBLP] IEEE Symposium on Security and Privacy, 1984, pp:154-166 [Conf]
D. Bailey Attacks on Computers: Congressional Hearings and Pending Legislation. [Citation Graph (0, 0)][DBLP] IEEE Symposium on Security and Privacy, 1984, pp:180-187 [Conf]
T. Taylor Comparison Paper between the Bell and LaPadula Model and the SRI Model. [Citation Graph (0, 0)][DBLP] IEEE Symposium on Security and Privacy, 1984, pp:195-203 [Conf]