The Community for Technology Leaders
Proceedings 1996 IEEE Symposium on Security and Privacy (1996)
Oakland, Ca
May 6, 1996 to May 8, 1996
ISSN: 1540-7993
ISBN: 0-8186-7417-2
TABLE OF CONTENTS
Covert Channels

Defining noninterference in the temporal logic of actions (Abstract)

T. Fine , Secure Comput. Corp., Roseville, MN, USA
pp. 0012
Panel: Goals for Computer Security Education

Computer security training and education: a needs analysis (PDF)

S.F. Burnett , Nat. Comput. Security Center, USA
pp. 0026
Domain Specific Security

A security policy model for clinical information systems (Abstract)

R.J. Anderson , Comput. Lab., Cambridge Univ., UK
pp. 0030
Protocols

What do we mean by entity authentication? (Abstract)

D. Gollmann , Dept. of Comput. Sci., London Univ., Egham, UK
pp. 0046

A fair non-repudiation protocol (Abstract)

Jianying Zhou , Dept. of Comput. Sci., London Univ., Egham, UK
D. Gollman , Dept. of Comput. Sci., London Univ., Egham, UK
pp. 0055
Databases

Ensuring Atomicity of Multilevel Transactions (Abstract)

Paul Ammann , George Mason University
Sushil Jajodia , George Mason University
Indrakshi Ray , George Mason University
pp. 0074

View-Based Access Control with High Assurance (Abstract)

Xiaolei Qian , Computer Science Laboratory SRI International
pp. 0085
Biologically Inspired Topics in Computer Security

An Immunological Approach to Change Detection: Algorithms, Analysis and Implications (Abstract)

Patrik D'haeseleer , University of New Mexico
Stephanie Forrest , University of New Mexico
Paul Helman , University of New Mexico
pp. 0110

A Sense of Self for Unix Processes (Abstract)

Stephanie Forrest , University of New Mexico
Steven A. Hofmeyr , University of New Mexico
Anil Somayaji , University of New Mexico
Thomas A. Longstaff , Carnegie-Mellon University
pp. 0120
Modeling

A Security Model of Dynamic Labeling Providing a Tiered Approach to Verification (Abstract)

Simon Foley , University College, Cork, Ireland
Li Gong , SRI International
Xiaolei Qian , SRI International
pp. 0142

A Communication Agreement Framework for Access/Action Control (Abstract)

Martin Roscheisen , Computer Science Department Stanford University
Terry Winograd , Computer Science Department Stanford University
pp. 0154

Decentralized Trust Management (Abstract)

Matt Blaze , AT&T Research
Joan Feigenbaum , AT&T Research
Jack Lacy , AT&T Research
pp. 0164

Security Properties and CSP (Abstract)

Steve Schneider , University of London
pp. 0174
Networks

Run-Time Security Evaluation (RTSE) for Distributed Applications (Abstract)

Cristina Serban , University of Missouri-Rolla
Bruce McMillin , University of Missouri-Rolla
pp. 0222

Index of Authors (PDF)

pp. 0233
89 ms
(Ver 3.3 (11022016))