The Community for Technology Leaders
RSS Icon
Subscribe
2012 IEEE Symposium on Security and Privacy (1985)
Oakland, CA
Apr. 22, 1985 to Apr. 24, 1985
ISBN: 0-8186-0629-0
TABLE OF CONTENTS
pp. iii
Preface (PDF)
pp. iv
Structuring Systems for Formal Verification
Richard B. Neely , Ford Aerospace and Communications Corporation
James W. Freeman , Ford Aerospace and Communications Corporation
pp. 2
Verification Tools
John McHugh , Research Triangle Institute
Donald L. Good , University of Texas
pp. 46
Network Policies
Deborah Estrin , M.I.T. Laboratory for Computer Science
pp. 56
Stephen T. Walker , Trusted Information Systems, lnc.
pp. 62
DoD Trusted Computer Systems Evaulation Criteria
Applications of Cryptography
Robert W. Baldwin , Massachusetts Institute of Technology
Wayne C. Gramlich , Massachusetts Institute of Technology
pp. 92
Raymond M. Wong , Sytek, Inc.
Thomas A. Berson , Sytek, Inc.
Richard J. Feiertag , Sytek, Inc.
pp. 101
Gustavus J. Simmons , Sandia National Laboratories
pp. 108
Cryptographic Algorithms
Tatsuski Okamoto , Yokosuka Electrical Communication Laboratory
Akira Shibaishi , Yokosuka Electrical Communication Laboratory
pp. 123
Database Security
Gultekin Ozsoyoglu , Case Western Reserve University
Tzong-An Su , Case Western Reserve University
pp. 160
Operating Systems Mechanisms
W.E. Boebert , Honeywell Secure Computing Technology
R.Y. Kaln , University of Minnesota
W.D. Young , University of Texas
S.A. Hansohn , S.A. Hansohn
pp. 176
Eric R. Anderson , TRW Defense Systems Group
pp. 184
Kishore Swaminathan , Motorola Inc. and University of Massachusetts
pp. 190
Security Policies I
Ben G. Matley , Ventura College and West Coast University
pp. 219
Douglas M. Gage , Naval Ocean Systems Center
pp. 224
Security Policies II
Burton H. Patkau , Vericom Systems Ltd
David L. Tennenhouse , Vericom Systems Ltd
pp. 230
Mindy E. Rudell , MITRE Corp.
pp. 237
15 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool