Default Cover Image

Proceedings. 1988 IEEE Symposium on Security and Privacy

Apr. 18 1988 to Apr. 21 1988

Oakland, CA

ISSN: 1540-7993

ISBN: 0-8186-0850-1

Table of Contents

Conference CommitteesFreely available from IEEE.pp. iii
The algebra of securityFull-text access may be available. Sign in or learn about subscription options.pp. 2-7
Formal Security Models - Chair: D. Kemmerer
Concerning "Modeling'' of Computer SecurityFull-text access may be available. Sign in or learn about subscription options.pp. 8
Formal Security Models - Chair: D. Kemmerer
Security SpecificationsFull-text access may be available. Sign in or learn about subscription options.pp. 14
Security in Distributed Systems - Chair: D. Nessett
Extended discretionary access controlsFull-text access may be available. Sign in or learn about subscription options.pp. 39-49
Emerging Issues - Chair: T.Berson
A Fault Tolerance Approach to Computer VirusesFull-text access may be available. Sign in or learn about subscription options.pp. 52
Emerging Issues - Chair: T.Berson
A Prototype Real-Time Intrusion-Detection Expert SystemFull-text access may be available. Sign in or learn about subscription options.pp. 59
Database Security: ASD-Views - Chair: T.Lunt
Views as the Security Objects in a Multilevel Secure Relational Database Management SystemFull-text access may be available. Sign in or learn about subscription options.pp. 70
Database Security: ASD-Views - Chair: T.Lunt
ASD-ViewsFull-text access may be available. Sign in or learn about subscription options.pp. 85
Database Security: ASD-Views - Chair: T.Lunt
Inference Aggregation Detection in Database Management SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 96
Analysis of Secure Systems - Chair: D. Cooper
A Bandwidth Computation Model for Covert Storage Channels and Its ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 108
Analysis of Secure Systems - Chair: D. Cooper
Reasoning About Knowledge in Multilevel Secure Distributed SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 122
Applying and Implementing Integrity Models - Chair: S. Lipner
Implementing Commercial Data Integrity with Secure CapabilitiesFull-text access may be available. Sign in or learn about subscription options.pp. 130
Applying and Implementing Integrity Models - Chair: S. Lipner
Using Mandatory Integrity to Enforce "Commercial" SecurityFull-text access may be available. Sign in or learn about subscription options.pp. 140
Applying and Implementing Integrity Models - Chair: S. Lipner
The Trusted Path between SMITE and the UserFull-text access may be available. Sign in or learn about subscription options.pp. 147
Applying and Implementing Integrity Models - Chair: S. Lipner
Cascaded AuthenticationFull-text access may be available. Sign in or learn about subscription options.pp. 156
Verification - Chair: T.V. Benzel
Reverification of a MicroprocessorFull-text access may be available. Sign in or learn about subscription options.pp. 166
Verification - Chair: T.V. Benzel
Noninterference and the Composability of Security PropertiesFull-text access may be available. Sign in or learn about subscription options.pp. 177
Verification - Chair: T.V. Benzel
A Formal Specification and Verification Method forthe Prevention of Denial of ServiceFull-text access may be available. Sign in or learn about subscription options.pp. 187
Models of Secure Distributed Systems - Chair: E. Boebert
An Axiomatic Basis of Trust in Distributed SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 204
Models of Secure Distributed Systems - Chair: E. Boebert
Security Policy Modeling for the Next-Generation Packet SwitchFull-text access may be available. Sign in or learn about subscription options.pp. 212
Secure Databases - Chair: P. Cudney
The SeaView Security ModelFull-text access may be available. Sign in or learn about subscription options.pp. 218
Secure Databases - Chair: P. Cudney
A Near-Term Design for the SeaView Multilevel Database SystemFull-text access may be available. Sign in or learn about subscription options.pp. 234
Secure Databases - Chair: P. Cudney
Controlling Logical Inference in Multilevel Database SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 245
Showing 24 out of 24