The Community for Technology Leaders
RSS Icon
Subscribe
2012 IEEE Symposium on Security and Privacy (1983)
Oakland, CA
Apr. 25, 1983 to Apr. 27, 1983
ISBN: 0-8186-0467-0
TABLE OF CONTENTS
Database Security
Fingerprinting (Abstract)
Neal R. Wagner , Drexel University
pp. 18
Dorothy E. Denning , Purdue University
pp. 23
Cryptography
R.R. Jueneman , Computer Sciences Corp.
S.M. Matyas , IBM Corp.
C.H. Meyer , IBM Corp.
pp. 33
Subhash C. Kak , Louisiana State University
pp. 55
Gustavus J. Simmons , Sandia National Laboratories
pp. 61
Stephen MacKinnon , Thousand Islands Secondary School & Queenés University
Selim G. Akl , Queen?s University
pp. 72
Khamis A. Omar , Southern Methodist University
David L. Wells , Southern Methodist University
pp. 79
Security Requirements: DoD and Commercial
ROGER R. SCHELL , DoD Computer Security Center
pp. 89
Paul E. Woodie , DoD Computer Security Center
pp. 96
Secure Networks and Distributed Systems
Bahaa W. Fam , MITRE Corp.
Jonathan K. Millen , MITRE Corp.
pp. 107
Tom Hinke , System Development Corporation
Jose Althouse , System Development Corporation
Richard A. Kemmerer , University of California, Santa Barbara
pp. 113
Dr Derek Barnes , Ministry of Defence
pp. 121
J.M. Rushby , University of Newcastle upon Tyne
B. Randell , University of Newcastle upon Tyne
pp. 127
Operating Systems and Security Models
Brian Marick , Compion Corporation
Virgil D. Gligor , University of Maryland
pp. 150
36 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool