The Community for Technology Leaders
2012 IEEE Symposium on Security and Privacy (1995)
Oakland, CA
May 8, 1995 to May 10, 1995
ISSN: 1540-7993
ISBN: 0-8186-7015-0
TABLE OF CONTENTS
Secure Commerce

The design and implementation of a secure auction service (Abstract)

M.K. Reiter , AT&T Bell Labs., Holmdel, NJ, USA
M.K. Franklin , AT&T Bell Labs., Holmdel, NJ, USA
pp. 0002

Cryptographic credit control in pre-payment metering systems (Abstract)

R.J. Anderson , Comput. Lab., Cambridge Univ., UK
S.J. Bezuidenhout , Comput. Lab., Cambridge Univ., UK
pp. 0015
Network Security

Preserving privacy in a network of mobile computers (Abstract)

D.A. Cooper , Dept. of Comput. Sci., Cornell Univ., Ithaca, NY, USA
K.P. Birman , Dept. of Comput. Sci., Cornell Univ., Ithaca, NY, USA
pp. 0026

Holding intruders accountable on the Internet (Abstract)

L.T. Heberlein , Dept. of Comput. Sci., California Univ., Davis, CA, USA
S. Staniford-Chen , Dept. of Comput. Sci., California Univ., Davis, CA, USA
pp. 0039

Integrating security in CORBA based object architectures (Abstract)

A.A. Lazar , Inst. of Syst. Sci., Nat. Univ. of Singapore, Singapore
Weiguo Wang , Inst. of Syst. Sci., Nat. Univ. of Singapore, Singapore
S.K. Bhonsle , Inst. of Syst. Sci., Nat. Univ. of Singapore, Singapore
R.H. Deng , Inst. of Syst. Sci., Nat. Univ. of Singapore, Singapore
pp. 0050
Secure Operating Systems

Practical Domain and Type Enforcement for UNIX (Abstract)

S.A. Haghighat , Trusted Inf. Syst. Inc., Glenwood, MD, USA
K.M. Walker , Trusted Inf. Syst. Inc., Glenwood, MD, USA
L. Badger , Trusted Inf. Syst. Inc., Glenwood, MD, USA
D.F. Sterne , Trusted Inf. Syst. Inc., Glenwood, MD, USA
D.L. Sherman , Trusted Inf. Syst. Inc., Glenwood, MD, USA
pp. 0066

A multilevel file system for high assurance (Abstract)

C.E. Irvine , Dept. of Comput. Sci., Naval Postgraduate Sch., Monterey, CA, USA
pp. 0078

Formal methods in the THETA kernel (Abstract)

D. Guaspari , Odyssey Res. Associates Inc., Ithaca, NY, USA
M. Stillerman , Odyssey Res. Associates Inc., Ithaca, NY, USA
M. Seager , Odyssey Res. Associates Inc., Ithaca, NY, USA
C. Marceau , Odyssey Res. Associates Inc., Ithaca, NY, USA
pp. 0088
Formal Models for Multilevel Security

Absorbing covers and intransitive non-interference (Abstract)

S. Pinsky , Nat. Security Agency, USA
pp. 0102

CSP and determinism in security modelling (Abstract)

A.W. Roscoe , Comput. Lab., Oxford Univ., UK
pp. 0114

The semantics and expressive power of the MLR data model (Abstract)

Fang Chen , Centre for Secure Inf. Syst., George Mason Univ., Fairfax, VA, USA
R.S. Sandhu , Centre for Secure Inf. Syst., George Mason Univ., Fairfax, VA, USA
pp. 0128
Covert Channel Control

A network version of the Pump (Abstract)

D.C. Lee , Naval Res. Lab., Washington, DC, USA
M.H. Kang , Naval Res. Lab., Washington, DC, USA
I.S. Moskowitz , Naval Res. Lab., Washington, DC, USA
pp. 0144

An architecture for covert channel control in realtime networks and multiprocessors (Abstract)

R. Browne , 147 Old Bloomfield Avenue, Parsippany, NJ, USA
pp. 0155

Version pool management in a multilevel secure multiversion transaction manager (Abstract)

A.C. Warner , Dept. of Comput. Sci. & Eng., Pennsylvania State Univ., University Park, PA, USA
T.F. Keefe , Dept. of Comput. Sci. & Eng., Pennsylvania State Univ., University Park, PA, USA
pp. 0169
Analysis of Security Vulnerabilities

Capacity estimation and auditability of network covert channels (Abstract)

B.R. Venkatraman , Corp. Network Services, Hewlett-Packard Co., Palo Alto, CA, USA
R.E. Newman-Wolfe , Corp. Network Services, Hewlett-Packard Co., Palo Alto, CA, USA
pp. 0186

Supporting security requirements in multilevel real-time databases (Abstract)

R. Mukkamala , Dept. of Comput. Sci., Virginia Univ., Charlottesville, VA, USA
S.H. Son , Dept. of Comput. Sci., Virginia Univ., Charlottesville, VA, USA
R. David , Dept. of Comput. Sci., Virginia Univ., Charlottesville, VA, USA
pp. 0199

The Intel 80x86 Processor Architecture: Pitfalls for Secure Systems (Abstract)

O. Sibert , Oxford Syst. Inc., Lexington, MA, USA
R. Lindell , Oxford Syst. Inc., Lexington, MA, USA
P.A. Porras , Oxford Syst. Inc., Lexington, MA, USA
pp. 0211
Protocol Analysis

Reasoning about accountability in protocols for electronic commerce (Abstract)

R. Kailar , SecureWare Inc., Atlanta, GA, USA
pp. 0236

The Interrogator model (Abstract)

J.K. Millen , Mitre Corp., Bedford, MA, USA
pp. 0251

Author Index (PDF)

pp. 0261
94 ms
(Ver )