Default Cover Image

Proceedings. 1991 IEEE Computer Society Symposium on Research in Security and Privacy

May 20 1991 to May 22 1991

Oakland, CA

ISSN: 1540-7993

ISBN: 0-8186-2168-0

Table of Contents

Message from the Program ChairFreely available from IEEE.pp. v
Conference CommitteeFreely available from IEEE.pp. vi
Covert Channels I: Chair: D. Kemmerer
An Analysis of Covert Timing ChannelsFull-text access may be available. Sign in or learn about subscription options.pp. 2
Covert Channels I: Chair: D. Kemmerer
Reducing Timing Charmers with Fuzzy TimeFull-text access may be available. Sign in or learn about subscription options.pp. 8
Covert Channels I: Chair: D. Kemmerer
Toward a Mathematical Foundation for Information Flow SecurityFull-text access may be available. Sign in or learn about subscription options.pp. 21
Covert Chanels II - Chair: P. Neumann
Covert Flow Trees: A Technique for Identifying and Analyzing Covert Storage ChannelsFull-text access may be available. Sign in or learn about subscription options.pp. 36
Covert Chanels II - Chair: P. Neumann
Storage Channels in Disk Arm OptimizationFull-text access may be available. Sign in or learn about subscription options.pp. 52
Models - Chair: J. Jacob
Modeling Nondisclosure in Terms of the Subject-Instruction StreamFull-text access may be available. Sign in or learn about subscription options.pp. 64
Models - Chair: J. Jacob
A Separation Model for Virtual Machine MonitorsFull-text access may be available. Sign in or learn about subscription options.pp. 78
Models - Chair: J. Jacob
Safety Analysis for the Extended Schematic Protection ModelFull-text access may be available. Sign in or learn about subscription options.pp. 87
Models - Chair: J. Jacob
A Taxonomy for Information Flow Policies and ModelsFull-text access may be available. Sign in or learn about subscription options.pp. 98
Distributed Systems - Chair: S. Lipner
Intrusion Tolerance in Distributed Computing SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 110
Distributed Systems - Chair: S. Lipner
Verification of Secure Distributed Systems in Higher Order Logic: A Modular Approach Using Generic ComponentsFull-text access may be available. Sign in or learn about subscription options.pp. 122
Distributed Systems - Chair: S. Lipner
Applying a Theory of Modules and Interfaces to Security VerificationFull-text access may be available. Sign in or learn about subscription options.pp. 136
Protocol Verification - Chair: J. McLean
The Use of Logic in the Analysis of Cryptographic ProtocolsFull-text access may be available. Sign in or learn about subscription options.pp. 156
Protocol Verification - Chair: J. McLean
Exploring the BAN Approach to Protocol AnalysisFull-text access may be available. Sign in or learn about subscription options.pp. 171
Protocol Verification - Chair: J. McLean
A System for the Specification and Verification of Key Management ProtocolsFull-text access may be available. Sign in or learn about subscription options.pp. 182
Policy - Chair: E. Boebert
Toward an Approach to Measuring Software TrustFull-text access may be available. Sign in or learn about subscription options.pp. 198
Policy - Chair: E. Boebert
Onthe Buzzword ??Security Policy??Full-text access may be available. Sign in or learn about subscription options.pp. 219
Authentication - Chair: C. Meadows
SPX: Global Authentication Using Public Key CertificatesFull-text access may be available. Sign in or learn about subscription options.pp. 232
Authentication - Chair: C. Meadows
Protecting Security Information in Distributed SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 245
Authentication - Chair: C. Meadows
An Analysis of the Proxy problem in Distributed SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 255
Database Security - Chair: C. Garvey
Microdata Disclosure Limitation in Statistical Databases: Query Sizeand Random Sample Query ControlFull-text access may be available. Sign in or learn about subscription options.pp. 278
Database Security - Chair: C. Garvey
Discretionary Access Controls in a High-Performance Object Management SystemFull-text access may be available. Sign in or learn about subscription options.pp. 288
Database Security - Chair: C. Garvey
A Novel Decomposition of Multilevel Relations into Single-Level RelationsFull-text access may be available. Sign in or learn about subscription options.pp. 300
Intrusion Detection - Chair: T. Lunt
The SRI IDES Statistical Anomaly DetectorFull-text access may be available. Sign in or learn about subscription options.pp. 316
Intrusion Detection - Chair: T. Lunt
A Pattern-Oriented Intrusion-Detection Model and Its ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 327
Intrusion Detection - Chair: T. Lunt
Directed-Graph Epidemiological Models of Computer VirusesFull-text access may be available. Sign in or learn about subscription options.pp. 343
Information Theory - Chair: J. Millen
Variable Noise Effects Upon a Simple Timing ChannelFull-text access may be available. Sign in or learn about subscription options.pp. 362
Information Theory - Chair: J. Millen
The Turing Testand Non-Information FlowFull-text access may be available. Sign in or learn about subscription options.pp. 373
Showing 31 out of 31