• S
  • SP
  • 1986
  • 1986 IEEE Symposium on Security and Privacy
Advanced Search 
1986 IEEE Symposium on Security and Privacy
Oakland, CA
April 07-April 09
ISBN: 0-8186-0716-5
Table of Contents
null
Session I: Verification Methods and Tools
J. Thomas Haigh, Honeywell Secure Computing Technology Center
Richard A. Kemmerer, Massachusetts Institute of Technology
John McHugh, The Research Triangle Institute
William D. Young, The University of Texas at Austin
pp. 14
Session 2: Verification Methods and Tools- Continued
V.D. Gligor, IBM Corporation
C.S. Chandersekaran, IBM Corporation
W. Cheng, IBM Corporation
W.D. Jiang, IBM Corporation
A. Johri, IBM Corporation
G.L. Luckenbaugh, IBM Corporation
L.E. Reich, IBM Corporation
pp. 40
Session 3: Security Policy and Models
J. Thomas Haigh, Honeywell's Secure Computing and Technology Center
William D. Young, Honeywell's Secure Computing and Technology Center
pp. 231
Session 5: Operating Systems Mechanisms
S.A. Rajunas, Key Logic
N. Hardy, Key Logic
A.C. Bomberger, Key Logic
W.S. Frantz, Key Logic
C.R. Landau, Key Logic
pp. 78
Simon Wiseman, Royal Signals and Radar Establishment
pp. 86
Richard Y. Kain, University of Minnesota
Carl E. Landwehr, Naval Research Laboratory
pp. 95
Session 6: Operating Systems Mechanisms - Continued
V.D. Gligor, IBM Corporation
E.L. Burch, IBM Corporation
G.S. Chandersekaran, IBM Corporation
R.S. Chapman, IBM Corporation
L.J. Dotterer, IBM Corporation
M.S. Hecht, IBM Corporation
W.D. Jiang, IBM Corporation
G.L. Luckenbaugh, IBM Corporation
N. Vasudevan, IBM Corporation
pp. 102
Session 7: Applications of Cryptography
Neal R. Wagner, Drexel University
Paul S. Putter, The Pennsylvania State University
Marianne R. Cain, Drexel University
pp. 148
Session 8: Database Security
Dorothy E. Denning, SRI International Computer Science Laboratory
Selim G. Akl, SRI International Computer Science Laboratory
Matthew Morgenstern, SRI International Computer Science Laboratory
Peter G Neumann, SRI International Computer Science Laboratory
Roger R. Schell, Gemini Computers, Inc.
Mark Heckman, Gemini Computers, Inc.
pp. 156
Session 9: Architectures for Secure Systems
J.E. Dobson, University of New Castle upon Tyne
B. Randell, University of New Castle upon Tyne
pp. 187
Session 10: Network Security
D. M. Nessett, Lawence Livermore National Laboratory
pp. 204
Usage of this product signifies your acceptance of the Terms of Use.