Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
SP
SP 1983
Generate Citations
1983 IEEE Symposium on Security and Privacy
April 25 1983 to April 27 1983
Oakland, CA, USA
Table of Contents
General Chairman's Message
Full-text access may be available. Sign in or learn about subscription options.
pp. iii-iii
Program Chairman's Message
Full-text access may be available. Sign in or learn about subscription options.
pp. v-v
General Chairman?s Message
Freely available from IEEE.
pp. iii
Program Chairman?s Message
Freely available from IEEE.
pp. v
Using Views in a Multilevel Secure Database Management System
Full-text access may be available. Sign in or learn about subscription options.
pp. 4-4
by
Billy G. Claybrook
Fingerprinting
Full-text access may be available. Sign in or learn about subscription options.
pp. 18-18
by
Neal R. Wagner
The Many-Time Pad: Theme and Variations
Full-text access may be available. Sign in or learn about subscription options.
pp. 23-23
by
Dorothy E. Denning
Message Authentication with Manipulation Detection Code
Full-text access may be available. Sign in or learn about subscription options.
pp. 33-33
by
R.R. Jueneman
,
S.M. Matyas
,
C.H. Meyer
Joint Encryption and Error-Correction Coding
Full-text access may be available. Sign in or learn about subscription options.
pp. 55-55
by
Subhash C. Kak
Verification of Treaty Compliance -- Revisited
Full-text access may be available. Sign in or learn about subscription options.
pp. 61-61
by
Gustavus J. Simmons
Recent Advances in the design and implementation of Large Integer Factorization Algorithms
Full-text access may be available. Sign in or learn about subscription options.
pp. 67-67
by
M.C. Wunderlich
New Key Generation Algorithms for Multilevel Security
Full-text access may be available. Sign in or learn about subscription options.
pp. 72-72
by
Stephen MacKinnon
,
Selim G. Akl
Modified Architecture for the Sub-Keys Model
Full-text access may be available. Sign in or learn about subscription options.
pp. 79-79
by
Khamis A. Omar
,
David L. Wells
Evaluating Security Properties of Computer Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 89-89
by
ROGER R. SCHELL
Security Enhancement through Product Evaluation
Full-text access may be available. Sign in or learn about subscription options.
pp. 96-96
by
Paul E. Woodie
An Approach to Identification of Minimum TCB Requirements for Various Threat/Risk Environments
Full-text access may be available. Sign in or learn about subscription options.
pp. 102-102
by
James P. Anderson
The Channel Assignment Problem
Full-text access may be available. Sign in or learn about subscription options.
pp. 107-107
by
Bahaa W. Fam
,
Jonathan K. Millen
SDC Secure Release Terminal Project
Full-text access may be available. Sign in or learn about subscription options.
pp. 113-113
by
Tom Hinke
,
Jose Althouse
,
Richard A. Kemmerer
Processor-per-Domain Guard Architecture
Full-text access may be available. Sign in or learn about subscription options.
pp. 120-120
by
Thomas A Berson
,
Richard J. Feiertag
,
R. Kenneth Bauer
Packet Switched Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 121-121
by
Dr Derek Barnes
A Distributed Secure System
Full-text access may be available. Sign in or learn about subscription options.
pp. 127-127
by
J.M. Rushby
,
B. Randell
Securing Networks: End-to-End Encrpytion vs. Link Encryption and Trusted Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 136-136
by
Whitfield Diffie
Operating Systems and Security Models
A Note on the Denial-of-Service Problem
Full-text access may be available. Sign in or learn about subscription options.
pp. 139
The VERUS™ Design Verification System
Full-text access may be available. Sign in or learn about subscription options.
pp. 150-150
by
Brian Marick
,
Virgil D. Gligor
Secure Computer Systems: A Retrospective
Full-text access may be available. Sign in or learn about subscription options.
pp. 161-161
by
D. Elliott Bell
Showing 25 out of 25