The Community for Technology Leaders
RSS Icon
2012 IEEE Symposium on Security and Privacy (1985)
Oakland, CA
Apr. 22, 1985 to Apr. 24, 1985
ISBN: 0-8186-0629-0
pp. iii
Preface (PDF)
pp. iv
Structuring Systems for Formal Verification
Richard B. Neely , Ford Aerospace and Communications Corporation
James W. Freeman , Ford Aerospace and Communications Corporation
pp. 2
Verification Tools
John McHugh , Research Triangle Institute
Donald L. Good , University of Texas
pp. 46
Network Policies
Deborah Estrin , M.I.T. Laboratory for Computer Science
pp. 56
Stephen T. Walker , Trusted Information Systems, lnc.
pp. 62
DoD Trusted Computer Systems Evaulation Criteria
Applications of Cryptography
Robert W. Baldwin , Massachusetts Institute of Technology
Wayne C. Gramlich , Massachusetts Institute of Technology
pp. 92
Thomas A. Berson , Sytek, Inc.
Raymond M. Wong , Sytek, Inc.
pp. 101
Gustavus J. Simmons , Sandia National Laboratories
pp. 108
Cryptographic Algorithms
Tatsuski Okamoto , Yokosuka Electrical Communication Laboratory
pp. 123
Database Security
Operating Systems Mechanisms
R.Y. Kaln , University of Minnesota
W.E. Boebert , Honeywell Secure Computing Technology
S.A. Hansohn , S.A. Hansohn
pp. 176
Eric R. Anderson , TRW Defense Systems Group
pp. 184
Kishore Swaminathan , Motorola Inc. and University of Massachusetts
pp. 190
Security Policies I
Ben G. Matley , Ventura College and West Coast University
pp. 219
Douglas M. Gage , Naval Ocean Systems Center
pp. 224
Security Policies II
Mindy E. Rudell , MITRE Corp.
pp. 237
27 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool