The SCEAS System
Navigation Menu

Conferences in DBLP

IEEE Symposium on Security and Privacy (S&P) (sp)
1989 (conf/sp/1989)

  1. S. T. Walker
    Network Security: The Parts of the Sum. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1989, pp:2-9 [Conf]
  2. T. M. P. Lee
    Statistical Models of Trust: TCBs vs. People. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1989, pp:10-19 [Conf]
  3. M. Schaefer
    Symbol Security Condition Considered Harmful. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1989, pp:20-47 [Conf]
  4. Paul A. Karger
    New Methods for Immediate Revocation. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1989, pp:48-55 [Conf]
  5. Li Gong
    A Secure Identity-Based Capability System. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1989, pp:56-65 [Conf]
  6. M. Branstad, Homayoon Tajalli, F. Mayer, D. Dalva
    Access Mediation in a Message Passing Kernel. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1989, pp:66-72 [Conf]
  7. Timothy E. Levin, S. J. Padilla, Cynthia E. Irvine
    A Formal Model for UNIX Setuid. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1989, pp:73-83 [Conf]
  8. G.-L. Grenier, Richard C. Holt, M. Funkenhauser
    Policy vs. Mechanism in the Secure TUNIS Operating System. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1989, pp:84-93 [Conf]
  9. Thomas J. Parenty
    The Incorporation of Multi-Level IPC into UNIX. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1989, pp:94-101 [Conf]
  10. Teresa F. Lunt
    Aggregation and Inference: Facts and Fallacies. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1989, pp:102-109 [Conf]
  11. Eduardo B. Fernández, Ehud Gudes, Haiyan Song
    A Security Model for Object-Oriented Databases. [Citation Graph (1, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1989, pp:110-115 [Conf]
  12. J. Wilson
    A Security Policy for an A1DBMS (a Trusted Subject). [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1989, pp:116-125 [Conf]
  13. Tzong-An Su, JiYoung Chung, Gultekin Özsoyoglu
    On the Cell Suppression by Merging Technique in the Lattice Model of Summary Tables. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1989, pp:126-137 [Conf]
  14. Catherine Meadows
    Using Narrowing in the Analysis of Key Management Protocols. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1989, pp:138-147 [Conf]
  15. M. R. Cornwell
    A Software Engineering Approach to Designing Trustworthy Software. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1989, pp:148-156 [Conf]
  16. J. C. Williams, George W. Dinolt
    Formal Model of a Trusted File Server. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1989, pp:157-166 [Conf]
  17. O. Sami Saydjari, J. M. Beckman, J. R. Leaman
    LOCK Trak: Navigating Uncharted Space. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1989, pp:167-177 [Conf]
  18. M. Schaefer, W. C. Barker, Charles P. Pfleeger
    Tea and I: An Allergy. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1989, pp:178-182 [Conf]
  19. Deborah Estrin, Gene Tsudik
    Security Issues in Policy Routing. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1989, pp:183-193 [Conf]
  20. Glenn S. Benson, William F. Appelbe, Ian F. Akyildiz
    The Hierarchical Model of Distributed System Security. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1989, pp:194-205 [Conf]
  21. D. F. C. Brewer, M. J. Nash
    The Chinese Wall Security Policy. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1989, pp:206-214 [Conf]
  22. P. Terry, Simon R. Wiseman
    A "New" Security Policy Model. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1989, pp:215-228 [Conf]
  23. John E. Dobson, John A. McDermid
    A Framework for Expressing Models of Security Policy. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1989, pp:229-241 [Conf]
  24. J. Jacob
    On the Derivation of Secure Components. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1989, pp:242-247 [Conf]
  25. Simon N. Foley
    A Model for Secure Information Flow. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1989, pp:248-258 [Conf]
  26. Ravi S. Sandhu
    Transformation of Access Rights. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1989, pp:259-268 [Conf]
  27. Lee Badger
    A Model for Specifying Multi-Granularity Integrity Policies. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1989, pp:269-279 [Conf]
  28. H. S. Vaccaro, Gunar E. Liepins
    Detection of Anomalous Computer Session Activity. [Citation Graph (1, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1989, pp:280-289 [Conf]
  29. Dan M. Nessett
    Layering Central Authentication on Existing Distributed System Terminal Services. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1989, pp:290-299 [Conf]
  30. Lein Harn, Thomas Kiesler
    Authenticated Group Key Distribution Scheme for a Large Distributed Network. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1989, pp:300-311 [Conf]
  31. George I. Davida, Yvo Desmedt, Brian J. Matt
    Defending Systems against Viruses through Cryptographic Authentication. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1989, pp:312-318 [Conf]
  32. S. Crocker, M. Pozzo
    A Proposal for a Verification-Based Virus Filter. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1989, pp:319-325 [Conf]
  33. Mark W. Eichin, Jon A. Rochlis
    With Microscope and Tweezers: An Analysis of the Internet Virus of November 1988. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1989, pp:326-344 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002