default search action
17th S&P 1996: Oakland, California, USA
- 1996 IEEE Symposium on Security and Privacy, May 6-8, 1996, Oakland, CA, USA. IEEE Computer Society 1996, ISBN 0-8186-7417-2
- Message from the Program Chairs.
- Conference Committee.
Covert Channels
- Ira S. Moskowitz, Steven J. Greenwald, Myong H. Kang:
An Analysis of the Timed Z-channel. 2-11 - Todd Fine:
Defining Noninterference in the Temporal Logic of Actions. 12-21
Panel: Goals for Computer Security Education
- Cynthia E. Irvine:
Goals for Computer Security Education. 24-25 - Stephen F. Burnett:
Computer Security Training and Education: A Needs Analysis. 26-27
Domain Specific Security
- Ross J. Anderson:
A Security Policy Model for Clinical Information Systems. 30-43
Protocols
- Dieter Gollmann:
What do We Mean by Entity Authentication? 46-54 - Jianying Zhou, Dieter Gollmann:
A Fair Non-repudiation Protocol. 55-61 - Paul F. Syverson:
Limitations on Design Principles for Public Key Protocols. 62-72
Databases
- Paul Ammann, Sushil Jajodia, Indrakshi Ray:
Ensuring Atomicity of Multilevel Transactions. 74-84 - Xiaolei Qian:
View-Based Access Control with High Assurance. 85-93 - Elisa Bertino, Sushil Jajodia, Pierangela Samarati:
Supporting Multiple Access Control Policies in Database Systems. 94-107
Biologically Inspired Topics in Computer Security
- Patrik D'haeseleer, Stephanie Forrest, Paul Helman:
An Immunological Approach to Change Detection: Algorithms, Analysis and Implications. 110-119 - Stephanie Forrest, Steven A. Hofmeyr, Anil Somayaji, Thomas A. Longstaff:
A Sense of Self for Unix Processes. 120-128 - Adam L. Young, Moti Yung:
Cryptovirology: Extortion-Based Security Threats and Countermeasures. 129-140
Modeling
- Simon N. Foley, Li Gong, Xiaolei Qian:
A Security Model of Dynamic Labeling Providing a Tiered Approach to Verification. 142-153 - Martin Röscheisen, Terry Winograd:
A Communication Agreement Framework for Access/Action Control. 154-163 - Matt Blaze, Joan Feigenbaum, Jack Lacy:
Decentralized Trust Management. 164-173 - Steve A. Schneider:
Security Properties and CSP. 174-187
Networks
- Drew Dean, Edward W. Felten, Dan S. Wallach:
Java Security: From HotJava to Netscape and Beyond. 190-200 - Wenbo Mao:
On two Proposals for On-line Bankcard Payments using Open Networks: Problems and Solutions. 201-210 - Leendert van Doorn, Martín Abadi, Michael Burrows, Edward Wobber:
Secure Network Objects. 211-221 - Cristina Serban, Bruce M. McMillin:
Run-Time Security Evaluation (RTSE) for Distributed Applications. 222-237
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.