The Community for Technology Leaders
2012 IEEE Symposium on Security and Privacy (1991)
Oakland, CA
May 20, 1991 to May 22, 1991
ISSN: 1540-7993
ISBN: 0-8186-2168-0
TABLE OF CONTENTS
Covert Channels I: Chair: D. Kemmerer
Covert Chanels II - Chair: P. Neumann
Models - Chair: J. Jacob
Distributed Systems - Chair: S. Lipner
Protocol Verification - Chair: J. McLean

Exploring the BAN Approach to Protocol Analysis (Abstract)

Einar Snekkenes , Alcatel Telecom Norway AS
pp. 171
Policy - Chair: E. Boebert

Toward an Approach to Measuring Software Trust (Abstract)

Ed Amoroso , AT&T Bell Laboratories
Thu Nguyen , AT&T Bell Laboratories
Pete Lapiska , GE Aerospace
John Watson , GE Aerospace
Jon Weiss , AT&T Bell Laboratories
Terry Starr , GE Aerospace
pp. 198

Onthe Buzzword ??Security Policy?? (Abstract)

Daniel F. Sterne , Trusted Information Systems, Inc.
pp. 219
Authentication - Chair: C. Meadows
Database Security - Chair: C. Garvey

A Novel Decomposition of Multilevel Relations into Single-Level Relations (Abstract)

Sushil Jajodia , George Mason University
Ravi Sandhu , George Mason University
pp. 300
Intrusion Detection - Chair: T. Lunt
Information Theory - Chair: J. Millen
PANEL:
111 ms
(Ver 3.1 (10032016))