The Community for Technology Leaders
RSS Icon
Subscribe
1986 IEEE Symposium on Security and Privacy (1986)
Oakland, CA, USA
April 7, 1986 to April 9, 1986
ISBN: 0-8186-0716-5
TABLE OF CONTENTS
Symposium Committee (Abstract)
pp. iii
Preface (Abstract)
pp. iv
Jeannette M. Wing , Carnegie-Mellon University
pp. 2
J. Thomas Haigh , Honeywell Secure Computing Technology Center
Richard A. Kemmerer , Massachusetts Institute of Technology
John McHugh , The Research Triangle Institute
William D. Young , The University of Texas at Austin
pp. 14
J. Daniel Halpern , Sytek, Inc.
Sam Owre , Sytek, Inc.
Norman Proctor , Sytek, Inc.
William F. Wilson , Sytek, Inc.
pp. 25
V.D. Gligor , IBM Corporation
C.S. Chandersekaran , IBM Corporation
W. Cheng , IBM Corporation
W.D. Jiang , IBM Corporation
A. Johri , IBM Corporation
G.L. Luckenbaugh , IBM Corporation
L.E. Reich , IBM Corporation
pp. 40
J. Thomas Haigh , Honeywell's Secure Computing and Technology Center
William D. Young , Honeywell's Secure Computing and Technology Center
pp. 231
Ravinderpal S. Sandhu , The Ohio State University
Michael E. Share , The Ohio State University
pp. 61
S.A. Rajunas , Key Logic
N. Hardy , Key Logic
A.C. Bomberger , Key Logic
W.S. Frantz , Key Logic
C.R. Landau , Key Logic
pp. 78
Simon Wiseman , Royal Signals and Radar Establishment
pp. 86
Richard Y. Kain , University of Minnesota
Carl E. Landwehr , Naval Research Laboratory
pp. 95
V.D. Gligor , IBM Corporation
E.L. Burch , IBM Corporation
G.S. Chandersekaran , IBM Corporation
R.S. Chapman , IBM Corporation
L.J. Dotterer , IBM Corporation
M.S. Hecht , IBM Corporation
W.D. Jiang , IBM Corporation
G.L. Luckenbaugh , IBM Corporation
N. Vasudevan , IBM Corporation
pp. 102
Dorothy E. Denning , SRI International
pp. 118
Preface (PDF)
pp. iv
Session I: Verification Methods and Tools
Jeannette M. Wing , Carnegie-Mellon University
pp. 2
J. Thomas Haigh , Honeywell Secure Computing Technology Center
Richard A. Kemmerer , Massachusetts Institute of Technology
John McHugh , The Research Triangle Institute
William D. Young , The University of Texas at Austin
pp. 14
J. Daniel Halpern , Sytek, Inc.
Sam Owre , Sytek, Inc.
Norman Proctor , Sytek, Inc.
William F. Wilson , Sytek, Inc.
pp. 25
Session 2: Verification Methods and Tools- Continued
V.D. Gligor , IBM Corporation
C.S. Chandersekaran , IBM Corporation
W. Cheng , IBM Corporation
W.D. Jiang , IBM Corporation
A. Johri , IBM Corporation
G.L. Luckenbaugh , IBM Corporation
L.E. Reich , IBM Corporation
pp. 40
Session 3: Security Policy and Models
J. Thomas Haigh , Honeywell's Secure Computing and Technology Center
William D. Young , Honeywell's Secure Computing and Technology Center
pp. 231
Ravinderpal S. Sandhu , The Ohio State University
Michael E. Share , The Ohio State University
pp. 61
Session 5: Operating Systems Mechanisms
S.A. Rajunas , Key Logic
N. Hardy , Key Logic
A.C. Bomberger , Key Logic
W.S. Frantz , Key Logic
C.R. Landau , Key Logic
pp. 78
Simon Wiseman , Royal Signals and Radar Establishment
pp. 86
Richard Y. Kain , University of Minnesota
Carl E. Landwehr , Naval Research Laboratory
pp. 95
Session 6: Operating Systems Mechanisms - Continued
V.D. Gligor , IBM Corporation
E.L. Burch , IBM Corporation
G.S. Chandersekaran , IBM Corporation
R.S. Chapman , IBM Corporation
L.J. Dotterer , IBM Corporation
M.S. Hecht , IBM Corporation
W.D. Jiang , IBM Corporation
G.L. Luckenbaugh , IBM Corporation
N. Vasudevan , IBM Corporation
pp. 102
Dorothy E. Denning , SRI International
pp. 118
Session 7: Applications of Cryptography
Neal R. Wagner , Drexel University
Paul S. Putter , The Pennsylvania State University
Marianne R. Cain , Drexel University
pp. 148
Session 8: Database Security
Dorothy E. Denning , SRI International Computer Science Laboratory
Selim G. Akl , SRI International Computer Science Laboratory
Matthew Morgenstern , SRI International Computer Science Laboratory
Peter G Neumann , SRI International Computer Science Laboratory
Roger R. Schell , Gemini Computers, Inc.
Mark Heckman , Gemini Computers, Inc.
pp. 156
Norman S. Matloff , University of California at Davis
pp. 173
Session 9: Architectures for Secure Systems
Richard A. Carlson , Sytek Inc. - Data Security Division
Teresa F. Lunt , Sytek Inc. - Data Security Division
pp. 182
J.E. Dobson , University of New Castle upon Tyne
B. Randell , University of New Castle upon Tyne
pp. 187
Jean-Michel Fray , LAAS/CNRS - INRIA
Yves Deswarte , LAAS/CNRS - INRIA
David Powell , LAAS/CNRS - INRIA
pp. 194
Session 10: Network Security
D. M. Nessett , Lawence Livermore National Laboratory
pp. 204
Roger M. Needham , Digital Equipment Corporation
Michael D. Schroeder , Digital Equipment Corporation
pp. 223
57 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool