


default search action
17th S&P 1996: Oakland, California, USA
- 1996 IEEE Symposium on Security and Privacy, May 6-8, 1996, Oakland, CA, USA. IEEE Computer Society 1996, ISBN 0-8186-7417-2

- Message from the Program Chairs.

- Conference Committee.

Covert Channels
- Ira S. Moskowitz, Steven J. Greenwald, Myong H. Kang:

An Analysis of the Timed Z-channel. 2-11 - Todd Fine:

Defining Noninterference in the Temporal Logic of Actions. 12-21
Panel: Goals for Computer Security Education
- Cynthia E. Irvine:

Goals for Computer Security Education. 24-25 - Stephen F. Burnett:

Computer Security Training and Education: A Needs Analysis. 26-27
Domain Specific Security
- Ross J. Anderson:

A Security Policy Model for Clinical Information Systems. 30-43
Protocols
- Dieter Gollmann:

What do We Mean by Entity Authentication? 46-54 - Jianying Zhou, Dieter Gollmann:

A Fair Non-repudiation Protocol. 55-61 - Paul F. Syverson:

Limitations on Design Principles for Public Key Protocols. 62-72
Databases
- Paul Ammann, Sushil Jajodia, Indrakshi Ray:

Ensuring Atomicity of Multilevel Transactions. 74-84 - Xiaolei Qian:

View-Based Access Control with High Assurance. 85-93 - Elisa Bertino, Sushil Jajodia, Pierangela Samarati:

Supporting Multiple Access Control Policies in Database Systems. 94-107
Biologically Inspired Topics in Computer Security
- Patrik D'haeseleer, Stephanie Forrest, Paul Helman:

An Immunological Approach to Change Detection: Algorithms, Analysis and Implications. 110-119 - Stephanie Forrest, Steven A. Hofmeyr, Anil Somayaji, Thomas A. Longstaff:

A Sense of Self for Unix Processes. 120-128 - Adam L. Young, Moti Yung:

Cryptovirology: Extortion-Based Security Threats and Countermeasures. 129-140
Modeling
- Simon N. Foley, Li Gong, Xiaolei Qian:

A Security Model of Dynamic Labeling Providing a Tiered Approach to Verification. 142-153 - Martin Röscheisen, Terry Winograd:

A Communication Agreement Framework for Access/Action Control. 154-163 - Matt Blaze, Joan Feigenbaum, Jack Lacy:

Decentralized Trust Management. 164-173 - Steve A. Schneider

:
Security Properties and CSP. 174-187
Networks
- Drew Dean, Edward W. Felten, Dan S. Wallach:

Java Security: From HotJava to Netscape and Beyond. 190-200 - Wenbo Mao:

On two Proposals for On-line Bankcard Payments using Open Networks: Problems and Solutions. 201-210 - Leendert van Doorn, Martín Abadi, Michael Burrows, Edward Wobber:

Secure Network Objects. 211-221 - Cristina Serban, Bruce M. McMillin:

Run-Time Security Evaluation (RTSE) for Distributed Applications. 222-237

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














