Default Cover Image

Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy

May 7 1990 to May 9 1990

Oakland, CA

ISSN: 1540-7993

ISBN: 0-8186-2060-9

Table of Contents

Message fromthe Program ChairsFreely available from IEEE.pp. v
Conference CommitteeFreely available from IEEE.pp. vi
Secure Systems I - Chair: S. Lipner
A VMM Security Kernel for the VAX ArchitectureFull-text access may be available. Sign in or learn about subscription options.pp. 2
Secure Systems I - Chair: S. Lipner
An Architecture for Practical Delegation in a Distributed SystemFull-text access may be available. Sign in or learn about subscription options.pp. 20
Secure Systems I - Chair: S. Lipner
Practical Authentication for Distributed ComputingFull-text access may be available. Sign in or learn about subscription options.pp. 31
Secure Systems I - Chair: S. Lipner
SP3 Peer IdentificationFull-text access may be available. Sign in or learn about subscription options.pp. 41
Secure Systems II - Chair: E Sullivan
The Army Secure Operating SystemFull-text access may be available. Sign in or learn about subscription options.pp. 50
Secure Systems II - Chair: E Sullivan
Specification and Verification of the ASOS KernelFull-text access may be available. Sign in or learn about subscription options.pp. 61
Database I - Chair: T. Lunt
Integrating an Object-Oriented Data Model with Multilevel SecurityFull-text access may be available. Sign in or learn about subscription options.pp. 76
Database I - Chair: T. Lunt
A Little Knowledge Goes a Long Way: Faster Detection of Compromised Data in 2-D TablesFull-text access may be available. Sign in or learn about subscription options.pp. 86
Database I - Chair: T. Lunt
Extending the Brewer-Nash Model to a Multilevel ContextFull-text access may be available. Sign in or learn about subscription options.pp. 95
Database II - Chair: E. Boebert
Polyinstantiation Integrity in Multilevel RelationsFull-text access may be available. Sign in or learn about subscription options.pp. 104
Database II - Chair: E. Boebert
Naming and Grouping Privileges to Simplify Security Management in Large DatabasesFull-text access may be available. Sign in or learn about subscription options.pp. 116
Database II - Chair: E. Boebert
Referential SecrecyFull-text access may be available. Sign in or learn about subscription options.pp. 133
Information Flow - Chair: J. Rushby
Information Flow in Nondeterministic SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 144
Information Flow - Chair: J. Rushby
Constructively Using Noninterference to Analyze SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 162
Information Flow - Chair: J. Rushby
Probabilistic InterferenceFull-text access may be available. Sign in or learn about subscription options.pp. 170
Information Flow - Chair: J. Rushby
Security Models and Information FlowFull-text access may be available. Sign in or learn about subscription options.pp. 180
Access Control and Integrity - Chair: R. Schell
Beyond the Pale of MAC and DAC--Defining New Forms of Access ControlFull-text access may be available. Sign in or learn about subscription options.pp. 190
Access Control and Integrity - Chair: R. Schell
Some Conundrums Concerning Separation of DutyFull-text access may be available. Sign in or learn about subscription options.pp. 201
Authentication - Chair: T. Berson
The Role of Trust in Protected MailFull-text access may be available. Sign in or learn about subscription options.pp. 210
Authentication - Chair: T. Berson
On the Formal Specification and Verification of a Multiparty Session ProtocolFull-text access may be available. Sign in or learn about subscription options.pp. 216
Authentication - Chair: T. Berson
Reasoning about Belief in Cryptographic ProtocolsFull-text access may be available. Sign in or learn about subscription options.pp. 234
Authentication - Chair: T. Berson
A Security Architecture and Mechanism for Data Confidentiality in TCP/IP ProtocolsFull-text access may be available. Sign in or learn about subscription options.pp. 249
Auditing and Intrusion Detection - Chair: J. Anderson
The Auditing Facility fora VMM Security KernelFull-text access may be available. Sign in or learn about subscription options.pp. 262
Auditing and Intrusion Detection - Chair: J. Anderson
Adaptive Real-Time Anomaly Detection Using Inductively Generated Sequential PatternsFull-text access may be available. Sign in or learn about subscription options.pp. 278
Auditing and Intrusion Detection - Chair: J. Anderson
Auditing the Use of Covert Storage Channels in Secure SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 285
Auditing and Intrusion Detection - Chair: J. Anderson
A Network Security MonitorFull-text access may be available. Sign in or learn about subscription options.pp. 296
Verification - Chair: D. Cooper
The Deductive Theory Manager: A Knowledge Based System for Formal VerificationFull-text access may be available. Sign in or learn about subscription options.pp. 306
Verification - Chair: D. Cooper
Formal Construction of Provably Secure Systems with CartesianaFull-text access may be available. Sign in or learn about subscription options.pp. 319
Verification - Chair: D. Cooper
Verifying a hardware Security ArchitectureFull-text access may be available. Sign in or learn about subscription options.pp. 333
Verification - Chair: D. Cooper
A Hierarchical Methodology for Verifying Microprogrammed MicroprocessorsFull-text access may be available. Sign in or learn about subscription options.pp. 345
Database III - Chair: C. Garvey
Transaction Processing in Multilevel-Secure Databases Using Replicated ArchitectureFull-text access may be available. Sign in or learn about subscription options.pp. 360
Database III - Chair: C. Garvey
Multiversion Concurrency Control for Multilevel Secure Database SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 369
Database III - Chair: C. Garvey
Modeling Security-Relevant Data SemanticsFull-text access may be available. Sign in or learn about subscription options.pp. 384
Facing the Challenges of the 90s - Chair: T. Lee
InformationPrivacy Issues forthe1990sFull-text access may be available. Sign in or learn about subscription options.pp. 394
Showing 37 out of 37