The Community for Technology Leaders
2012 IEEE Symposium on Security and Privacy (1986)
Oakland, CA
Apr. 7, 1986 to Apr. 9, 1986
ISSN: 1540-7993
ISBN: 0-8186-0716-5
TABLE OF CONTENTS

Symposium Committee (Abstract)

pp. iii

Preface (Abstract)

pp. iv

Extending Ina Jo With Teimporal Logic (Abstract)

Jeannette M. Wing , Carnegie-Mellon University
pp. 2

An Experience Using Two Covert Channel Analysis Techniques On a Real System Design (Abstract)

J. Thomas Haigh , Honeywell Secure Computing Technology Center
Richard A. Kemmerer , Massachusetts Institute of Technology
John McHugh , The Research Triangle Institute
William D. Young , The University of Texas at Austin
pp. 14

Muse - A Computer Assisted Verification System (Abstract)

J. Daniel Halpern , Sytek, Inc.
Sam Owre , Sytek, Inc.
Norman Proctor , Sytek, Inc.
William F. Wilson , Sytek, Inc.
pp. 25

A New Security Testing Method and its Application to the Secure Xenix Kernel (Abstract)

V.D. Gligor , IBM Corporation
C.S. Chandersekaran , IBM Corporation
W. Cheng , IBM Corporation
W.D. Jiang , IBM Corporation
A. Johri , IBM Corporation
G.L. Luckenbaugh , IBM Corporation
L.E. Reich , IBM Corporation
pp. 40

Extending The Non-Interference Version Of MLS For Sat (Abstract)

J. Thomas Haigh , Honeywell's Secure Computing and Technology Center
William D. Young , Honeywell's Secure Computing and Technology Center
pp. 231

Security In Keykos™ (Abstract)

S.A. Rajunas , Key Logic
N. Hardy , Key Logic
A.C. Bomberger , Key Logic
W.S. Frantz , Key Logic
C.R. Landau , Key Logic
pp. 78

A Secure Capability Computer System (Abstract)

Simon Wiseman , Royal Signals and Radar Establishment
pp. 86

On Access Checking in Capability-Based Systems (Abstract)

Richard Y. Kain , University of Minnesota
Carl E. Landwehr , Naval Research Laboratory
pp. 95

On the Design and the Implementation of Secure Xenix Workstations (Abstract)

V.D. Gligor , IBM Corporation
E.L. Burch , IBM Corporation
G.S. Chandersekaran , IBM Corporation
R.S. Chapman , IBM Corporation
L.J. Dotterer , IBM Corporation
M.S. Hecht , IBM Corporation
W.D. Jiang , IBM Corporation
G.L. Luckenbaugh , IBM Corporation
N. Vasudevan , IBM Corporation
pp. 102

An Intrusion-Detection Model (Abstract)

Dorothy E. Denning , SRI International
pp. 118

Preface (PDF)

pp. iv
Session I: Verification Methods and Tools

Extending Ina Jo With Teimporal Logic (Abstract)

Jeannette M. Wing , Carnegie-Mellon University
pp. 2

An Experience Using Two Covert Channel Analysis Techniques On a Real System Design (Abstract)

J. Thomas Haigh , Honeywell Secure Computing Technology Center
Richard A. Kemmerer , Massachusetts Institute of Technology
William D. Young , The University of Texas at Austin
John McHugh , The Research Triangle Institute
pp. 14

Muse - A Computer Assisted Verification System (Abstract)

Sam Owre , Sytek, Inc.
William F. Wilson , Sytek, Inc.
Norman Proctor , Sytek, Inc.
J. Daniel Halpern , Sytek, Inc.
pp. 25
Session 2: Verification Methods and Tools- Continued

A New Security Testing Method and its Application to the Secure Xenix Kernel (Abstract)

W.D. Jiang , IBM Corporation
G.L. Luckenbaugh , IBM Corporation
W. Cheng , IBM Corporation
A. Johri , IBM Corporation
C.S. Chandersekaran , IBM Corporation
L.E. Reich , IBM Corporation
V.D. Gligor , IBM Corporation
pp. 40
Session 3: Security Policy and Models

Extending The Non-Interference Version Of MLS For Sat (Abstract)

William D. Young , Honeywell's Secure Computing and Technology Center
J. Thomas Haigh , Honeywell's Secure Computing and Technology Center
pp. 231
Session 5: Operating Systems Mechanisms

Security In Keykos™ (Abstract)

C.R. Landau , Key Logic
N. Hardy , Key Logic
A.C. Bomberger , Key Logic
S.A. Rajunas , Key Logic
W.S. Frantz , Key Logic
pp. 78

A Secure Capability Computer System (Abstract)

Simon Wiseman , Royal Signals and Radar Establishment
pp. 86

On Access Checking in Capability-Based Systems (Abstract)

Carl E. Landwehr , Naval Research Laboratory
Richard Y. Kain , University of Minnesota
pp. 95
Session 6: Operating Systems Mechanisms - Continued

On the Design and the Implementation of Secure Xenix Workstations (Abstract)

V.D. Gligor , IBM Corporation
N. Vasudevan , IBM Corporation
W.D. Jiang , IBM Corporation
G.S. Chandersekaran , IBM Corporation
E.L. Burch , IBM Corporation
M.S. Hecht , IBM Corporation
L.J. Dotterer , IBM Corporation
R.S. Chapman , IBM Corporation
G.L. Luckenbaugh , IBM Corporation
pp. 102

An Intrusion-Detection Model (Abstract)

Dorothy E. Denning , SRI International
pp. 118
Session 7: Applications of Cryptography

Encrypted Database Design: Specialized Approaches (Abstract)

Neal R. Wagner , Drexel University
Marianne R. Cain , Drexel University
Paul S. Putter , The Pennsylvania State University
pp. 148
Session 8: Database Security

Views for Multilevel Database Security (Abstract)

Selim G. Akl , SRI International Computer Science Laboratory
Roger R. Schell , Gemini Computers, Inc.
Mark Heckman , Gemini Computers, Inc.
Peter G Neumann , SRI International Computer Science Laboratory
Matthew Morgenstern , SRI International Computer Science Laboratory
Dorothy E. Denning , SRI International Computer Science Laboratory
pp. 156
Session 9: Architectures for Secure Systems

The Trusted Domain Machine: A Secure Communication Device For Security Guard Applications (Abstract)

Richard A. Carlson , Sytek Inc. - Data Security Division
Teresa F. Lunt , Sytek Inc. - Data Security Division
pp. 182

Building Reliable Secure Computing Systems Out Of Unreliable Insecure Components (Abstract)

B. Randell , University of New Castle upon Tyne
J.E. Dobson , University of New Castle upon Tyne
pp. 187

Intrusion-Tolerance Using Fine-Grain Fragmentation-Scattering (Abstract)

David Powell , LAAS/CNRS - INRIA
Jean-Michel Fray , LAAS/CNRS - INRIA
Yves Deswarte , LAAS/CNRS - INRIA
pp. 194
Session 10: Network Security

Factors Affecting Distributed System Security (Abstract)

D. M. Nessett , Lawence Livermore National Laboratory
pp. 204

A Global Authentication Service without Global Trust (Abstract)

Michael D. Schroeder , Digital Equipment Corporation
Roger M. Needham , Digital Equipment Corporation
pp. 223
109 ms
(Ver 3.1 (10032016))