


default search action
3rd S&P 1982: Oakland, California, USA
- 1982 IEEE Symposium on Security and Privacy, Oakland, CA, USA, April 26-28, 1982. IEEE Computer Society 1982, ISBN 0-8186-0410-7
Security Models
- Steven B. Lipner:
Non-Discretionery Controls for Commercial Applications. 2-10 - Joseph A. Goguen, José Meseguer:
Security Policies and Security Models. 11-20 - Richard D. Graubart, John P. L. Woodward:
A Preliminary Neval Surveillance OBMS Sacurity. 21-37 - Dorothy E. Denning, Jan Schlörer, Elisabeth Wehrle:
Memoryless Inference Controls for Statistical Databases. 38-45
Systems and their Analysis
- Klaus R. Dittrich, Karlheinz Hug, Peter Kammerer, Dieter Lienert, Hans Mau, Klaus Wachsmuth:
Protection in the OSKAR Operating System: Goals, Concepts, Conseqeuences. 46-56 - Jonathan K. Millen:
Kernel Isolation for the PDP-11/70. 57-65 - Richard A. Kemmerer:
A Practical Approach to Identifying Storage and Timing Channels. 66-73 - Christopher Landauer, Stephen D. Crocker:
Precise Information Flow Analysis by Program Verification. 74-80 - Jane Solomon:
Specification-to-Code Correlation. 81-85
Privacy, Progress, and Reality
- Rein Turn:
Privacy Protection in the 1980s. 86-89 - Deepinder P. Sidhu:
Specification of Key Distribution Protocols for Networks. 90 - James P. Anderson:
Accelerating Computer Security Innovation. 91-98
Cryptography
- George B. Purdy, Gustavus J. Simmons, James Studier:
A Software Protection Scheme. 99-103 - Neal R. Wagner:
Shared Database Access using Composed Encryption Functions. 104-110 - George I. Davida, Yi-Shiung Yeh:
Cryptographic Relational Algebra. 111-116 - Gustavus J. Simmons, Diane B. Holdridge:
Forward Search as a Cryptanalytic Tool Against a Public Key. 117-128 - Selim G. Akl:
Digital Signitures with Blindfolded Arbitrators Who Cannot Form Alliances. 129-136
Secure Networks and Communications
- Deepinder P. Sidhu, Morrie Gasser:
A Multilevel Secure Local Area Network. 137-143 - Gary Grossman:
A Practical Executive for Secure Communications. 144-155 - C. A. Asmuth, G. R. Blakley:
Pooling, Splitting, and Restituting Information to Overcome Total Failure of Some Channels of Communication. 156-

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.