The Community for Technology Leaders
Proceedings. 1991 IEEE Computer Society Symposium on Research in Security and Privacy (1991)
Oakland, CA
May 20, 1991 to May 22, 1991
ISSN: 1540-7993
ISBN: 0-8186-2168-0
Covert Channels I: Chair: D. Kemmerer
Covert Chanels II - Chair: P. Neumann
Models - Chair: J. Jacob
Distributed Systems - Chair: S. Lipner
Protocol Verification - Chair: J. McLean

Exploring the BAN Approach to Protocol Analysis (Abstract)

Einar Snekkenes , Alcatel Telecom Norway AS
pp. 171
Policy - Chair: E. Boebert

Toward an Approach to Measuring Software Trust (Abstract)

Ed Amoroso , AT&T Bell Laboratories
Thu Nguyen , AT&T Bell Laboratories
Jon Weiss , AT&T Bell Laboratories
John Watson , GE Aerospace
Pete Lapiska , GE Aerospace
Terry Starr , GE Aerospace
pp. 198

Onthe Buzzword ??Security Policy?? (Abstract)

Daniel F. Sterne , Trusted Information Systems, Inc.
pp. 219
Authentication - Chair: C. Meadows
Database Security - Chair: C. Garvey

A Novel Decomposition of Multilevel Relations into Single-Level Relations (Abstract)

Sushil Jajodia , George Mason University
Ravi Sandhu , George Mason University
pp. 300
Intrusion Detection - Chair: T. Lunt
Information Theory - Chair: J. Millen
95 ms
(Ver 3.3 (11022016))