Default Cover Image

Proceedings 1996 IEEE Symposium on Security and Privacy

May 6 1996 to May 8 1996

Oakland, Ca

ISSN: 1540-7993

ISBN: 0-8186-7417-2

Table of Contents

Message from the Program ChairsFreely available from IEEE.pp. vii
Conference CommitteeFreely available from IEEE.pp. viii
Covert Channels
An Analysis of the Timed Z-channelFull-text access may be available. Sign in or learn about subscription options.pp. 0002
Covert Channels
Defining noninterference in the temporal logic of actionsFull-text access may be available. Sign in or learn about subscription options.pp. 0012
Panel: Goals for Computer Security Education
Goals for Computer Security EducationFull-text access may be available. Sign in or learn about subscription options.pp. 0024
Panel: Goals for Computer Security Education
Computer security training and education: a needs analysisFull-text access may be available. Sign in or learn about subscription options.pp. 0026
Domain Specific Security
A security policy model for clinical information systemsFull-text access may be available. Sign in or learn about subscription options.pp. 0030
Protocols
What do we mean by entity authentication?Full-text access may be available. Sign in or learn about subscription options.pp. 0046
Protocols
A fair non-repudiation protocolFull-text access may be available. Sign in or learn about subscription options.pp. 0055
Protocols
Limitations on Design Principles for Public Key ProtocolsFull-text access may be available. Sign in or learn about subscription options.pp. 0062
Databases
Ensuring Atomicity of Multilevel TransactionsFull-text access may be available. Sign in or learn about subscription options.pp. 0074
Databases
View-Based Access Control with High AssuranceFull-text access may be available. Sign in or learn about subscription options.pp. 0085
Databases
Supporting Multiple Access Control Policies in Database SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 0094
Biologically Inspired Topics in Computer Security
An Immunological Approach to Change Detection: Algorithms, Analysis and ImplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 0110
Biologically Inspired Topics in Computer Security
A Sense of Self for Unix ProcessesFull-text access may be available. Sign in or learn about subscription options.pp. 0120
Biologically Inspired Topics in Computer Security
Cryptovirology: Extortion-Based Security Threats and CountermeasuresFull-text access may be available. Sign in or learn about subscription options.pp. 0129
Modeling
A Security Model of Dynamic Labeling Providing a Tiered Approach to VerificationFull-text access may be available. Sign in or learn about subscription options.pp. 0142
Modeling
A Communication Agreement Framework for Access/Action ControlFull-text access may be available. Sign in or learn about subscription options.pp. 0154
Modeling
Decentralized Trust ManagementFull-text access may be available. Sign in or learn about subscription options.pp. 0164
Modeling
Security Properties and CSPFull-text access may be available. Sign in or learn about subscription options.pp. 0174
Networks
Java Security: From HotJava to Netscape and BeyondFull-text access may be available. Sign in or learn about subscription options.pp. 0190
Networks
On two Proposals for On-line Bankcard Payments using Open Networks: Problems and SolutionsFull-text access may be available. Sign in or learn about subscription options.pp. 0201
Networks
Secure Network ObjectsFull-text access may be available. Sign in or learn about subscription options.pp. 0211
Networks
Run-Time Security Evaluation (RTSE) for Distributed ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 0222
Networks
Index of AuthorsFreely available from IEEE.pp. 0233
Showing 26 out of 26