The Community for Technology Leaders
2012 IEEE Symposium on Security and Privacy (1983)
Oakland, CA
Apr. 25, 1983 to Apr. 27, 1983
ISSN: 1540-7993
ISBN: 0-8186-0467-0
TABLE OF CONTENTS

Fingerprinting (Abstract)

Neal R. Wagner , Drexel University
pp. 18

Message Authentication with Manipulation Detection Code (Abstract)

R.R. Jueneman , Computer Sciences Corp.
S.M. Matyas , IBM Corp.
C.H. Meyer , IBM Corp.
pp. 33

Joint Encryption and Error-Correction Coding (Abstract)

Subhash C. Kak , Louisiana State University
pp. 55

Verification of Treaty Compliance -- Revisited (Abstract)

Gustavus J. Simmons , Sandia National Laboratories
pp. 61

New Key Generation Algorithms for Multilevel Security (Abstract)

Stephen MacKinnon , Thousand Islands Secondary School & Queenés University
Selim G. Akl , Queen's University
pp. 72

Modified Architecture for the Sub-Keys Model (Abstract)

Khamis A. Omar , Southern Methodist University
David L. Wells , Southern Methodist University
pp. 79

Evaluating Security Properties of Computer Systems (Abstract)

ROGER R. SCHELL , DoD Computer Security Center
pp. 89

Security Enhancement through Product Evaluation (Abstract)

Paul E. Woodie , DoD Computer Security Center
pp. 96

The Channel Assignment Problem (Abstract)

Bahaa W. Fam , MITRE Corp.
Jonathan K. Millen , MITRE Corp.
pp. 107

SDC Secure Release Terminal Project (Abstract)

Tom Hinke , System Development Corporation
Jose Althouse , System Development Corporation
Richard A. Kemmerer , University of California, Santa Barbara
pp. 113

Packet Switched Networks (Abstract)

Dr Derek Barnes , Ministry of Defence
pp. 121

A Distributed Secure System (Abstract)

J.M. Rushby , University of Newcastle upon Tyne
B. Randell , University of Newcastle upon Tyne
pp. 127

The VERUS™ Design Verification System (Abstract)

Brian Marick , Compion Corporation
Virgil D. Gligor , University of Maryland
pp. 150
Cryptography

Joint Encryption and Error-Correction Coding (Abstract)

Subhash C. Kak , Louisiana State University
pp. 55

Verification of Treaty Compliance -- Revisited (Abstract)

Gustavus J. Simmons , Sandia National Laboratories
pp. 61

New Key Generation Algorithms for Multilevel Security (Abstract)

Stephen MacKinnon , Thousand Islands Secondary School & Queenés University
Selim G. Akl , Queen?s University
pp. 72

Modified Architecture for the Sub-Keys Model (Abstract)

Khamis A. Omar , Southern Methodist University
David L. Wells , Southern Methodist University
pp. 79
Security Requirements: DoD and Commercial

Evaluating Security Properties of Computer Systems (Abstract)

ROGER R. SCHELL , DoD Computer Security Center
pp. 89

Security Enhancement through Product Evaluation (Abstract)

Paul E. Woodie , DoD Computer Security Center
pp. 96
Secure Networks and Distributed Systems

The Channel Assignment Problem (Abstract)

Bahaa W. Fam , MITRE Corp.
Jonathan K. Millen , MITRE Corp.
pp. 107

SDC Secure Release Terminal Project (Abstract)

Jose Althouse , System Development Corporation
Tom Hinke , System Development Corporation
Richard A. Kemmerer , University of California, Santa Barbara
pp. 113

Packet Switched Networks (Abstract)

Dr Derek Barnes , Ministry of Defence
pp. 121

A Distributed Secure System (Abstract)

B. Randell , University of Newcastle upon Tyne
J.M. Rushby , University of Newcastle upon Tyne
pp. 127
Operating Systems and Security Models

The VERUS™ Design Verification System (Abstract)

Virgil D. Gligor , University of Maryland
Brian Marick , Compion Corporation
pp. 150
100 ms
(Ver )