• S
  • SP
  • 1995
  • 1995 IEEE Symposium on Security and Privacy
Advanced Search 
1995 IEEE Symposium on Security and Privacy
Oakland, CA
May 08-May 10
ISBN: 0-8186-7015-0
Table of Contents
Secure Commerce
M.K. Franklin, AT&T Bell Labs., Holmdel, NJ, USA
M.K. Reiter, AT&T Bell Labs., Holmdel, NJ, USA
pp. 0002
Network Security
D.A. Cooper, Dept. of Comput. Sci., Cornell Univ., Ithaca, NY, USA
K.P. Birman, Dept. of Comput. Sci., Cornell Univ., Ithaca, NY, USA
pp. 0026
S. Staniford-Chen, Dept. of Comput. Sci., California Univ., Davis, CA, USA
L.T. Heberlein, Dept. of Comput. Sci., California Univ., Davis, CA, USA
pp. 0039
R.H. Deng, Inst. of Syst. Sci., Nat. Univ. of Singapore, Singapore
S.K. Bhonsle, Inst. of Syst. Sci., Nat. Univ. of Singapore, Singapore
Weiguo Wang, Inst. of Syst. Sci., Nat. Univ. of Singapore, Singapore
A.A. Lazar, Inst. of Syst. Sci., Nat. Univ. of Singapore, Singapore
pp. 0050
Secure Operating Systems
L. Badger, Trusted Inf. Syst. Inc., Glenwood, MD, USA
D.F. Sterne, Trusted Inf. Syst. Inc., Glenwood, MD, USA
D.L. Sherman, Trusted Inf. Syst. Inc., Glenwood, MD, USA
K.M. Walker, Trusted Inf. Syst. Inc., Glenwood, MD, USA
S.A. Haghighat, Trusted Inf. Syst. Inc., Glenwood, MD, USA
pp. 0066
C.E. Irvine, Dept. of Comput. Sci., Naval Postgraduate Sch., Monterey, CA, USA
pp. 0078
M. Seager, Odyssey Res. Associates Inc., Ithaca, NY, USA
D. Guaspari, Odyssey Res. Associates Inc., Ithaca, NY, USA
M. Stillerman, Odyssey Res. Associates Inc., Ithaca, NY, USA
C. Marceau, Odyssey Res. Associates Inc., Ithaca, NY, USA
pp. 0088
Formal Models for Multilevel Security
Fang Chen, Centre for Secure Inf. Syst., George Mason Univ., Fairfax, VA, USA
R.S. Sandhu, Centre for Secure Inf. Syst., George Mason Univ., Fairfax, VA, USA
pp. 0128
Covert Channel Control
M.H. Kang, Naval Res. Lab., Washington, DC, USA
I.S. Moskowitz, Naval Res. Lab., Washington, DC, USA
D.C. Lee, Naval Res. Lab., Washington, DC, USA
pp. 0144
A.C. Warner, Dept. of Comput. Sci. & Eng., Pennsylvania State Univ., University Park, PA, USA
T.F. Keefe, Dept. of Comput. Sci. & Eng., Pennsylvania State Univ., University Park, PA, USA
pp. 0169
Analysis of Security Vulnerabilities
B.R. Venkatraman, Corp. Network Services, Hewlett-Packard Co., Palo Alto, CA, USA
R.E. Newman-Wolfe, Corp. Network Services, Hewlett-Packard Co., Palo Alto, CA, USA
pp. 0186
R. David, Dept. of Comput. Sci., Virginia Univ., Charlottesville, VA, USA
S.H. Son, Dept. of Comput. Sci., Virginia Univ., Charlottesville, VA, USA
R. Mukkamala, Dept. of Comput. Sci., Virginia Univ., Charlottesville, VA, USA
pp. 0199
O. Sibert, Oxford Syst. Inc., Lexington, MA, USA
P.A. Porras, Oxford Syst. Inc., Lexington, MA, USA
R. Lindell, Oxford Syst. Inc., Lexington, MA, USA
pp. 0211
Protocol Analysis
Usage of this product signifies your acceptance of the Terms of Use.