The Community for Technology Leaders
1984 IEEE Symposium on Security and Privacy (1984)
Oakland, CA
Apr. 29, 1984 to May 2, 1984
ISSN: 1540-7993
ISBN: 0-8186-0532-4
TABLE OF CONTENTS

KVM/370 in Retrospect (Abstract)

B. D. GOLD , SYSTEM DEVELOPMENT CORPORATION/A BURROUGHS COMPANY
R. R. LINDE , SYSTEM DEVELOPMENT CORPORATION/A BURROUGHS COMPANY
P. F. CUDNEY , SYSTEM DEVELOPMENT CORPORATION/A BURROUGHS COMPANY
pp. 13

Hardware Requirements for Secure Computer Systems: A Framework (Abstract)

Carl E. Landwehr , Naval Research Laboratory
John M. Carroll , Unviersity of Western Ontario
pp. 34

Unwinding and Inference Control (Abstract)

Joseph A. Goguen , SRI International
Jose Meseguer , SRI International
pp. 75

Searching for Public-Key Cryptosystems (Abstract)

Neal R. Wagner , Drexel University
pp. 91

A New Paradigm for Individuals in the Information Age (Abstract)

David Chaum , University of California, Santa Barbara
pp. 99

Ottawa Euclid and EVES: A Status Report (Abstract)

Dan Craigen , I.P. Sharp Associates
pp. 114
Operating Systems

KVM/370 in Retrospect (Abstract)

B. D. GOLD , SYSTEM DEVELOPMENT CORPORATION/A BURROUGHS COMPANY
R. R. LINDE , SYSTEM DEVELOPMENT CORPORATION/A BURROUGHS COMPANY
P. F. CUDNEY , SYSTEM DEVELOPMENT CORPORATION/A BURROUGHS COMPANY
pp. 13
Architectual Requirements

Hardware Requirements for Secure Computer Systems: A Framework (Abstract)

Carl E. Landwehr , Naval Research Laboratory
John M. Carroll , Unviersity of Western Ontario
pp. 34
Database Systems

Unwinding and Inference Control (Abstract)

Joseph A. Goguen , SRI International
José Meseguer , SRI International
pp. 75
Cryptography

Searching for Public-Key Cryptosystems (Abstract)

Neal R. Wagner , Drexel University
pp. 91

A New Paradigm for Individuals in the Information Age (Abstract)

David Chaum , University of California, Santa Barbara
pp. 99
Panel: Security and Verification with Ada

null (PDF)

pp. null
Verification

Ottawa Euclid and EVES: A Status Report (Abstract)

Dan Craigen , I.P. Sharp Associates
pp. 114

Analysis of a Kemel Verification (Abstract)

Terry Vickers Benzel , MITRE Corporation
pp. 125
Networks and Formal Methods

Executable Logic Specifications: A New Approach (Abstract)

Deepinder P. Sidhu , SDC -A Burroughs Company
pp. 142

Multi-Level Security Based on Physical Distribution (Abstract)

Glenn H. MacEwen , Queen?s University
Bruce Burwell , Queen?s University
Zhuo-Jun Lu , Queen?s University
pp. 167
Special Report
Formal Models

A Formal Statement of the MMS Security Model (Abstract)

John McLean , Naval Research Laboratory
Carl E. Landwehr , Naval Research Laboratory
Constance L. Heitmeyer , Naval Research Laboratory
pp. 188

Comparison Paper between the Bell and LaPadula Model (Abstract)

Tad Taylor , DoD Computer Security Center
pp. 195
Work in Progress Towards A1 Systems

Design Experiences from the Multilevel Secure MCF Operating System (Abstract)

John O. Neilson , RCA Government Systems Division
Frederick E. Wuebker , RCA Government Systems Division
pp. 204

Formal Specification of a Multi-Level Secure Operating System (Abstract)

Tanya Korelsky , Odyssey Research Associates
David Sutherland , Odyssey Research Associates
pp. 209

A Gypsy-Based Kernel (Abstract)

Bret A. Hartman , DoD Computer Security Center
pp. 219

Multinet Gateway -- Towards A1 Certification (PDF)

George W. Dinolt , Ford Aerospace & Communications Corporation
Peter C. Baker , Ford Aerospace & Communications Corporation
Richard B. Neely , Ford Aerospace & Communications Corporation
James Freeman , Ford Aerospace & Communications Corporation
pp. 226
90 ms
(Ver 3.3 (11022016))