The Community for Technology Leaders
2012 IEEE Symposium on Security and Privacy (1980)
Oakland, CA
Apr. 14, 1980 to Apr. 16, 1980
ISSN: 1540-7993
ISBN: 0-8186-0335-6

Symposium (PDF)

pp. iii
Monday, April 14, 1980

An Overview of Transborder Data Flow Issues (Abstract)

Rein Turn , California State University, Northridge
pp. 0003

A Model to Describe Protection Problems (Abstract)

Gerald Kreissig , Purdue University
pp. 0009

Towards a Fail-Safe Approach to Secure Databases (Abstract)

A. D. Friedman , The George Washington University
L. J. Hoffman , The George Washington University
pp. 0018

A Module Definition Facility for Access Control in Distributed Data Base Systems (Abstract)

Anthony I. Wasserman , University of California, San Francisco
Reind P. van de Riet , Vrije Universiteit
Martin L. Kersten , Vrije Universiteit
pp. 0059
Tuesday, April 15, 1980

The Cryptographic Security of Compact Knapsacks (Preliminary Report) (Abstract)

Adi Shamir , Massachusetts Institute of Technology
pp. 0094

Protecting Shared Cryptographic Keys (Abstract)

George I. Davida , University of Wisconsin-Milwaukee
Richard A. DeMillo , University of Wisconsin-Milwaukee
Richard J. Lipton , Princeton University
pp. 0100

The Master Key Problem (Abstract)

Dorothy E. Denning , Purdue University
Fred B. Schneider , Cornell University
pp. 0103

Multi-Tiered Approach to System Security (Abstract)

Peppe Barbarino , SAI COMSYSTEMS CORP.
pp. 0114

Protocols for Public Key Cryptosystems (Abstract)

Ralph C. Merkle , ELXSi International
pp. 122
Wednesday, April 16, 1980

A System Architecture to Support a Verifiably Secure Multilevel Security System (Abstract)

Richard A. DeMillo , Georgia Institute of Technology
George I. Davida , University of Wisconsin
Richard J. Lipton , University of California, Berkeley
pp. 137
115 ms
(Ver 3.1 (10032016))