Default Cover Image

1985 IEEE Symposium on Security and Privacy

April 22 1985 to April 24 1985

Oakland, CA, USA

Table of Contents

Program CommitteeFreely available from IEEE.pp. iii-iii
PrefaceFull-text access may be available. Sign in or learn about subscription options.pp. iv-iv
Structuring Systems for Formal VerificationFull-text access may be available. Sign in or learn about subscription options.pp. 2-2
Trusted Software Verification: A Case StudyFull-text access may be available. Sign in or learn about subscription options.pp. 14-14
Analysis of the Hardware Verification of the Honeywell SCOMPFull-text access may be available. Sign in or learn about subscription options.pp. 32-32
An Information Flow Tool for GypsyFull-text access may be available. Sign in or learn about subscription options.pp. 46-46
The Restricted Access Processor An Example of Formal VerificationFull-text access may be available. Sign in or learn about subscription options.pp. 49-49
Non-Discretionary Controls for Inter-Organization NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 56-56
Network Security OverviewFull-text access may be available. Sign in or learn about subscription options.pp. 62-62
A Unification of Computer and Network Security ConceptsFull-text access may be available. Sign in or learn about subscription options.pp. 77-77
Cryptographic Protocol for Trustable Match MakingFull-text access may be available. Sign in or learn about subscription options.pp. 92-92
Polonius: An Identity Authentication SystemFull-text access may be available. Sign in or learn about subscription options.pp. 101-101
How to (Selectively) Broadcast A SecretFull-text access may be available. Sign in or learn about subscription options.pp. 108-108
A Database Encryption Scheme Which Allows the Computation of Statistics Using Encrypted DataFull-text access may be available. Sign in or learn about subscription options.pp. 116-116
A Fast Signature Scheme Based on Quadratic InequalitiesFull-text access may be available. Sign in or learn about subscription options.pp. 123-123
Commutative Filters for Reducing Inference Threats in Multilevel Database SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 134-134
Design Overview for Retrofitting Integrity-Lock Architecture onto a Commercial DBMSFull-text access may be available. Sign in or learn about subscription options.pp. 147-147
Rounding and Inference Controlin Conceptual Models for Statistical DatabasesFull-text access may be available. Sign in or learn about subscription options.pp. 160-160
Secure Ada Target: Issues, System Design, and VerificationFull-text access may be available. Sign in or learn about subscription options.pp. 176-176
Ada's Suitability for Trusted Computer SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 184-184
Negotiated Access ControlFull-text access may be available. Sign in or learn about subscription options.pp. 190-190
Analysis of Acyclic Attenuating Systems for the SSR Protection ModelFull-text access may be available. Sign in or learn about subscription options.pp. 197-197
Issues in Discretionary Access ControlFull-text access may be available. Sign in or learn about subscription options.pp. 208-208
Computer Privacy in America: Conflicting Practices and Policy ChoicesFull-text access may be available. Sign in or learn about subscription options.pp. 219-219
Security Considerations for Autonomous RobotsFull-text access may be available. Sign in or learn about subscription options.pp. 224-224
The Implementation of Secure Entity-Relationship DatabasesFull-text access may be available. Sign in or learn about subscription options.pp. 230-230
Labeling Screen OutputFull-text access may be available. Sign in or learn about subscription options.pp. 237-237
Showing 27 out of 27