Thomas J. Parenty The Incorporation of Multi-Level IPC into UNIX. [Citation Graph (0, 0)][DBLP] IEEE Symposium on Security and Privacy, 1989, pp:94-101 [Conf]
Teresa F. Lunt Aggregation and Inference: Facts and Fallacies. [Citation Graph (0, 0)][DBLP] IEEE Symposium on Security and Privacy, 1989, pp:102-109 [Conf]
J. Wilson A Security Policy for an A1DBMS (a Trusted Subject). [Citation Graph (0, 0)][DBLP] IEEE Symposium on Security and Privacy, 1989, pp:116-125 [Conf]
Catherine Meadows Using Narrowing in the Analysis of Key Management Protocols. [Citation Graph (0, 0)][DBLP] IEEE Symposium on Security and Privacy, 1989, pp:138-147 [Conf]
M. R. Cornwell A Software Engineering Approach to Designing Trustworthy Software. [Citation Graph (0, 0)][DBLP] IEEE Symposium on Security and Privacy, 1989, pp:148-156 [Conf]
Lee Badger A Model for Specifying Multi-Granularity Integrity Policies. [Citation Graph (0, 0)][DBLP] IEEE Symposium on Security and Privacy, 1989, pp:269-279 [Conf]
Dan M. Nessett Layering Central Authentication on Existing Distributed System Terminal Services. [Citation Graph (0, 0)][DBLP] IEEE Symposium on Security and Privacy, 1989, pp:290-299 [Conf]
Lein Harn, Thomas Kiesler Authenticated Group Key Distribution Scheme for a Large Distributed Network. [Citation Graph (0, 0)][DBLP] IEEE Symposium on Security and Privacy, 1989, pp:300-311 [Conf]
S. Crocker, M. Pozzo A Proposal for a Verification-Based Virus Filter. [Citation Graph (0, 0)][DBLP] IEEE Symposium on Security and Privacy, 1989, pp:319-325 [Conf]
Mark W. Eichin, Jon A. Rochlis With Microscope and Tweezers: An Analysis of the Internet Virus of November 1988. [Citation Graph (0, 0)][DBLP] IEEE Symposium on Security and Privacy, 1989, pp:326-344 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP