Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
SP
SP 1985
Generate Citations
1985 IEEE Symposium on Security and Privacy
April 22 1985 to April 24 1985
Oakland, CA, USA
Table of Contents
Program Committee
Freely available from IEEE.
pp. iii-iii
Preface
Full-text access may be available. Sign in or learn about subscription options.
pp. iv-iv
Structuring Systems for Formal Verification
Full-text access may be available. Sign in or learn about subscription options.
pp. 2-2
by
Richard B. Neely
,
James W. Freeman
Trusted Software Verification: A Case Study
Full-text access may be available. Sign in or learn about subscription options.
pp. 14-14
by
Terry C. Vickers Benzel
,
Deborah A. Tavilla
Analysis of the Hardware Verification of the Honeywell SCOMP
Full-text access may be available. Sign in or learn about subscription options.
pp. 32-32
by
Virgil D. Gligor
An Information Flow Tool for Gypsy
Full-text access may be available. Sign in or learn about subscription options.
pp. 46-46
by
John McHugh
,
Donald L. Good
The Restricted Access Processor An Example of Formal Verification
Full-text access may be available. Sign in or learn about subscription options.
pp. 49-49
by
Norman Proctor
Non-Discretionary Controls for Inter-Organization Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 56-56
by
Deborah Estrin
Network Security Overview
Full-text access may be available. Sign in or learn about subscription options.
pp. 62-62
by
Stephen T. Walker
A Unification of Computer and Network Security Concepts
Full-text access may be available. Sign in or learn about subscription options.
pp. 77-77
by
James P. Anderson
Cryptographic Protocol for Trustable Match Making
Full-text access may be available. Sign in or learn about subscription options.
pp. 92-92
by
Robert W. Baldwin
,
Wayne C. Gramlich
Polonius: An Identity Authentication System
Full-text access may be available. Sign in or learn about subscription options.
pp. 101-101
by
Raymond M. Wong
,
Thomas A. Berson
,
Richard J. Feiertag
How to (Selectively) Broadcast A Secret
Full-text access may be available. Sign in or learn about subscription options.
pp. 108-108
by
Gustavus J. Simmons
A Database Encryption Scheme Which Allows the Computation of Statistics Using Encrypted Data
Full-text access may be available. Sign in or learn about subscription options.
pp. 116-116
by
G.R. Blakley
,
Catherine Meadows
A Fast Signature Scheme Based on Quadratic Inequalities
Full-text access may be available. Sign in or learn about subscription options.
pp. 123-123
by
Tatsuski Okamoto
,
Akira Shibaishi
Commutative Filters for Reducing Inference Threats in Multilevel Database Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 134-134
by
Dorothy E. Denning
Design Overview for Retrofitting Integrity-Lock Architecture onto a Commercial DBMS
Full-text access may be available. Sign in or learn about subscription options.
pp. 147-147
by
Richard D. Graubart
,
Kevin J. Duffy
Rounding and Inference Controlin Conceptual Models for Statistical Databases
Full-text access may be available. Sign in or learn about subscription options.
pp. 160-160
by
Gultekin Ozsoyoglu
,
Tzong-An Su
Secure Ada Target: Issues, System Design, and Verification
Full-text access may be available. Sign in or learn about subscription options.
pp. 176-176
by
W.E. Boebert
,
R.Y. Kaln
,
W.D. Young
,
S.A. Hansohn
Ada's Suitability for Trusted Computer Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 184-184
by
Eric R. Anderson
Negotiated Access Control
Full-text access may be available. Sign in or learn about subscription options.
pp. 190-190
by
Kishore Swaminathan
Analysis of Acyclic Attenuating Systems for the SSR Protection Model
Full-text access may be available. Sign in or learn about subscription options.
pp. 197-197
by
Ravinderpal Singh Sandhu
Issues in Discretionary Access Control
Full-text access may be available. Sign in or learn about subscription options.
pp. 208-208
by
Deborah D. Downs
,
Jerzy R. Rub
,
Kenneth C. Kung
,
Carole S. Jordan
Computer Privacy in America: Conflicting Practices and Policy Choices
Full-text access may be available. Sign in or learn about subscription options.
pp. 219-219
by
Ben G. Matley
Security Considerations for Autonomous Robots
Full-text access may be available. Sign in or learn about subscription options.
pp. 224-224
by
Douglas M. Gage
The Implementation of Secure Entity-Relationship Databases
Full-text access may be available. Sign in or learn about subscription options.
pp. 230-230
by
Burton H. Patkau
,
David L. Tennenhouse
Labeling Screen Output
Full-text access may be available. Sign in or learn about subscription options.
pp. 237-237
by
Mindy E. Rudell
Showing 27 out of 27