The Community for Technology Leaders
2012 IEEE Symposium on Security and Privacy (1985)
Oakland, CA
Apr. 22, 1985 to Apr. 24, 1985
ISSN: 1540-7993
ISBN: 0-8186-0629-0
TABLE OF CONTENTS

Program Committee (Abstract)

pp. iii

Preface (Abstract)

pp. iv

Structuring Systems for Formal Verification (Abstract)

Richard B. Neely , Ford Aerospace and Communications Corporation
James W. Freeman , Ford Aerospace and Communications Corporation
pp. 2

An Information Flow Tool for Gypsy (Abstract)

John McHugh , Research Triangle Institute
Donald L. Good , University of Texas
pp. 46

Non-Discretionary Controls for Inter-Organization Networks (Abstract)

Deborah Estrin , M.I.T. Laboratory for Computer Science
pp. 56

Network Security Overview (Abstract)

Stephen T. Walker , Trusted Information Systems, lnc.
pp. 62

Cryptographic Protocol for Trustable Match Making (Abstract)

Robert W. Baldwin , Massachusetts Institute of Technology
Wayne C. Gramlich , Massachusetts Institute of Technology
pp. 92

How to (Selectively) Broadcast A Secret (Abstract)

Gustavus J. Simmons , Sandia National Laboratories
pp. 108

A Fast Signature Scheme Based on Quadratic Inequalities (Abstract)

Tatsuski Okamoto , Yokosuka Electrical Communication Laboratory
Akira Shibaishi , Yokosuka Electrical Communication Laboratory
pp. 123

Preface (PDF)

pp. iv
Structuring Systems for Formal Verification

Structuring Systems for Formal Verification (Abstract)

Richard B. Neely , Ford Aerospace and Communications Corporation
James W. Freeman , Ford Aerospace and Communications Corporation
pp. 2
Verification Tools

An Information Flow Tool for Gypsy (Abstract)

John McHugh , Research Triangle Institute
Donald L. Good , University of Texas
pp. 46
Network Policies

Non-Discretionary Controls for Inter-Organization Networks (Abstract)

Deborah Estrin , M.I.T. Laboratory for Computer Science
pp. 56

Network Security Overview (Abstract)

Stephen T. Walker , Trusted Information Systems, lnc.
pp. 62
DoD Trusted Computer Systems Evaulation Criteria
Applications of Cryptography

Cryptographic Protocol for Trustable Match Making (Abstract)

Robert W. Baldwin , Massachusetts Institute of Technology
Wayne C. Gramlich , Massachusetts Institute of Technology
pp. 92

How to (Selectively) Broadcast A Secret (Abstract)

Gustavus J. Simmons , Sandia National Laboratories
pp. 108
Cryptographic Algorithms

A Fast Signature Scheme Based on Quadratic Inequalities (Abstract)

Akira Shibaishi , Yokosuka Electrical Communication Laboratory
Tatsuski Okamoto , Yokosuka Electrical Communication Laboratory
pp. 123
Database Security

Rounding and Inference Controlin Conceptual Models for Statistical Databases (Abstract)

Tzong-An Su , Case Western Reserve University
Gultekin Ozsoyoglu , Case Western Reserve University
pp. 160
Operating Systems Mechanisms

Secure Ada Target: Issues, System Design, and Verification (Abstract)

R.Y. Kaln , University of Minnesota
W.D. Young , University of Texas
W.E. Boebert , Honeywell Secure Computing Technology
S.A. Hansohn , S.A. Hansohn
pp. 176

Ada?s Suitability for Trusted Computer Systems (Abstract)

Eric R. Anderson , TRW Defense Systems Group
pp. 184

Negotiated Access Control (Abstract)

Kishore Swaminathan , Motorola Inc. and University of Massachusetts
pp. 190
Security Policies I

Computer Privacy in America: Conflicting Practices and Policy Choices (Abstract)

Ben G. Matley , Ventura College and West Coast University
pp. 219

Security Considerations for Autonomous Robots (Abstract)

Douglas M. Gage , Naval Ocean Systems Center
pp. 224
Security Policies II

Labeling Screen Output (Abstract)

Mindy E. Rudell , MITRE Corp.
pp. 237
92 ms
(Ver )