Search dblp for Publications

export results for "toc:db/conf/sp/sp1984.bht:"

 download as .bib file

@inproceedings{DBLP:conf/sp/Bailey84,
  author       = {David Bailey},
  title        = {Attacks on Computers: Congressional Hearings and Pending Legislation},
  booktitle    = {Proceedings of the 1984 {IEEE} Symposium on Security and Privacy,
                  Oakland, California, USA, April 29 - May 2, 1984},
  pages        = {180--187},
  publisher    = {{IEEE} Computer Society},
  year         = {1984},
  url          = {https://doi.org/10.1109/SP.1984.10012},
  doi          = {10.1109/SP.1984.10012},
  timestamp    = {Thu, 21 Sep 2023 15:57:32 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/Bailey84.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/Benzel84,
  author       = {Terry Benzel},
  title        = {Analysis of a Kernel Verification},
  booktitle    = {Proceedings of the 1984 {IEEE} Symposium on Security and Privacy,
                  Oakland, California, USA, April 29 - May 2, 1984},
  pages        = {125--133},
  publisher    = {{IEEE} Computer Society},
  year         = {1984},
  url          = {https://doi.org/10.1109/SP.1984.10015},
  doi          = {10.1109/SP.1984.10015},
  timestamp    = {Thu, 21 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/Benzel84.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/Britton84,
  author       = {D. E. Britton},
  title        = {Formal Verification of a Secure Network with End-to-End Encryption},
  booktitle    = {Proceedings of the 1984 {IEEE} Symposium on Security and Privacy,
                  Oakland, California, USA, April 29 - May 2, 1984},
  pages        = {154--166},
  publisher    = {{IEEE} Computer Society},
  year         = {1984},
  url          = {https://doi.org/10.1109/SP.1984.10009},
  doi          = {10.1109/SP.1984.10009},
  timestamp    = {Thu, 21 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/Britton84.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/Chaum84,
  author       = {David Chaum},
  title        = {A New Paradigm for Individuals in the Information Age},
  booktitle    = {Proceedings of the 1984 {IEEE} Symposium on Security and Privacy,
                  Oakland, California, USA, April 29 - May 2, 1984},
  pages        = {99--106},
  publisher    = {{IEEE} Computer Society},
  year         = {1984},
  url          = {https://doi.org/10.1109/SP.1984.10025},
  doi          = {10.1109/SP.1984.10025},
  timestamp    = {Thu, 21 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/Chaum84.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/Craigen84,
  author       = {Dan Craigen},
  title        = {Ottawa Euclid and {EVES:} {A} Status Report},
  booktitle    = {Proceedings of the 1984 {IEEE} Symposium on Security and Privacy,
                  Oakland, California, USA, April 29 - May 2, 1984},
  pages        = {114--124},
  publisher    = {{IEEE} Computer Society},
  year         = {1984},
  url          = {https://doi.org/10.1109/SP.1984.10006},
  doi          = {10.1109/SP.1984.10006},
  timestamp    = {Thu, 21 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/Craigen84.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/Denning84,
  author       = {Dorothy E. Denning},
  title        = {Cryptographic Checksums for Multilevel Database Security},
  booktitle    = {Proceedings of the 1984 {IEEE} Symposium on Security and Privacy,
                  Oakland, California, USA, April 29 - May 2, 1984},
  pages        = {52--61},
  publisher    = {{IEEE} Computer Society},
  year         = {1984},
  url          = {https://doi.org/10.1109/SP.1984.10011},
  doi          = {10.1109/SP.1984.10011},
  timestamp    = {Thu, 21 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/Denning84.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/DinoltNBF84,
  author       = {George W. Dinolt and
                  Richard B. Neely and
                  P. C. Baker and
                  James W. Freeman},
  title        = {Multinet Gateway-Towards {A1} Certification},
  booktitle    = {Proceedings of the 1984 {IEEE} Symposium on Security and Privacy,
                  Oakland, California, USA, April 29 - May 2, 1984},
  pages        = {226},
  publisher    = {{IEEE} Computer Society},
  year         = {1984},
  url          = {https://doi.org/10.1109/SP.1984.10005},
  doi          = {10.1109/SP.1984.10005},
  timestamp    = {Thu, 21 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/DinoltNBF84.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/GoguenM84,
  author       = {Joseph A. Goguen and
                  Jos{\'{e}} Meseguer},
  title        = {Unwinding and Inference Control},
  booktitle    = {Proceedings of the 1984 {IEEE} Symposium on Security and Privacy,
                  Oakland, California, USA, April 29 - May 2, 1984},
  pages        = {75--87},
  publisher    = {{IEEE} Computer Society},
  year         = {1984},
  url          = {https://doi.org/10.1109/SP.1984.10019},
  doi          = {10.1109/SP.1984.10019},
  timestamp    = {Thu, 21 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/GoguenM84.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/GoldLC84,
  author       = {Barry D. Gold and
                  Richard R. Linde and
                  P. F. Cudney},
  title        = {{KVM/37O} in Retrospect},
  booktitle    = {Proceedings of the 1984 {IEEE} Symposium on Security and Privacy,
                  Oakland, California, USA, April 29 - May 2, 1984},
  pages        = {13--23},
  publisher    = {{IEEE} Computer Society},
  year         = {1984},
  url          = {https://doi.org/10.1109/SP.1984.10002},
  doi          = {10.1109/SP.1984.10002},
  timestamp    = {Thu, 21 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/GoldLC84.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/Graubart84,
  author       = {Richard D. Graubart},
  title        = {The Integrity-Lock Approach to Secure Database Management},
  booktitle    = {Proceedings of the 1984 {IEEE} Symposium on Security and Privacy,
                  Oakland, California, USA, April 29 - May 2, 1984},
  pages        = {62--74},
  publisher    = {{IEEE} Computer Society},
  year         = {1984},
  url          = {https://doi.org/10.1109/SP.1984.10017},
  doi          = {10.1109/SP.1984.10017},
  timestamp    = {Thu, 21 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/Graubart84.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/Hartman84,
  author       = {B. A. Hartman},
  title        = {A Gypsy-Based Kernel},
  booktitle    = {Proceedings of the 1984 {IEEE} Symposium on Security and Privacy,
                  Oakland, California, USA, April 29 - May 2, 1984},
  pages        = {219--225},
  publisher    = {{IEEE} Computer Society},
  year         = {1984},
  url          = {https://doi.org/10.1109/SP.1984.10004},
  doi          = {10.1109/SP.1984.10004},
  timestamp    = {Thu, 21 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/Hartman84.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/KargerH84,
  author       = {Paul A. Karger and
                  A. J. Herbert},
  title        = {An Augmented Capability Architecture to Support Lattice Security and
                  Traceability of Access},
  booktitle    = {Proceedings of the 1984 {IEEE} Symposium on Security and Privacy,
                  Oakland, California, USA, April 29 - May 2, 1984},
  pages        = {2--12},
  publisher    = {{IEEE} Computer Society},
  year         = {1984},
  url          = {https://doi.org/10.1109/SP.1984.10001},
  doi          = {10.1109/SP.1984.10001},
  timestamp    = {Thu, 21 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/KargerH84.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/KorelskyS84,
  author       = {Tanya Korelsky and
                  David Sutherland},
  title        = {Formal Specification of a Multi-Level Secure Operating System},
  booktitle    = {Proceedings of the 1984 {IEEE} Symposium on Security and Privacy,
                  Oakland, California, USA, April 29 - May 2, 1984},
  pages        = {209--218},
  publisher    = {{IEEE} Computer Society},
  year         = {1984},
  url          = {https://doi.org/10.1109/SP.1984.10016},
  doi          = {10.1109/SP.1984.10016},
  timestamp    = {Thu, 21 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/KorelskyS84.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/Kramer84,
  author       = {S. Kramer},
  title        = {Linus {IV} : An Experiment in Computer Security},
  booktitle    = {Proceedings of the 1984 {IEEE} Symposium on Security and Privacy,
                  Oakland, California, USA, April 29 - May 2, 1984},
  pages        = {24--33},
  publisher    = {{IEEE} Computer Society},
  year         = {1984},
  url          = {https://doi.org/10.1109/SP.1984.10000},
  doi          = {10.1109/SP.1984.10000},
  timestamp    = {Thu, 21 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/Kramer84.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/LandwehrC84,
  author       = {Carl E. Landwehr and
                  John M. Carroll},
  title        = {Hardware Requirements for Secure Computer Systems: {A} Framework},
  booktitle    = {Proceedings of the 1984 {IEEE} Symposium on Security and Privacy,
                  Oakland, California, USA, April 29 - May 2, 1984},
  pages        = {34--40},
  publisher    = {{IEEE} Computer Society},
  year         = {1984},
  url          = {https://doi.org/10.1109/SP.1984.10023},
  doi          = {10.1109/SP.1984.10023},
  timestamp    = {Thu, 21 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/LandwehrC84.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/MacEwenBL84,
  author       = {Glenn H. MacEwen and
                  Bruce Burwell and
                  Zhuo{-}Jun Lu},
  title        = {Multi-Level Security Based on Physical Distribution},
  booktitle    = {Proceedings of the 1984 {IEEE} Symposium on Security and Privacy,
                  Oakland, California, USA, April 29 - May 2, 1984},
  pages        = {167--179},
  publisher    = {{IEEE} Computer Society},
  year         = {1984},
  url          = {https://doi.org/10.1109/SP.1984.10013},
  doi          = {10.1109/SP.1984.10013},
  timestamp    = {Thu, 21 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/MacEwenBL84.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/McLeanLH84,
  author       = {John D. McLean and
                  Carl E. Landwehr and
                  Constance L. Heitmeyer},
  title        = {A Formal Statement of the {MMS} Security Model},
  booktitle    = {Proceedings of the 1984 {IEEE} Symposium on Security and Privacy,
                  Oakland, California, USA, April 29 - May 2, 1984},
  pages        = {188--194},
  publisher    = {{IEEE} Computer Society},
  year         = {1984},
  url          = {https://doi.org/10.1109/SP.1984.10022},
  doi          = {10.1109/SP.1984.10022},
  timestamp    = {Thu, 21 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/McLeanLH84.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/Millen84,
  author       = {Jonathan K. Millen},
  title        = {The Interrogator: {A} Tool for Cryptographic Protocol Security},
  booktitle    = {Proceedings of the 1984 {IEEE} Symposium on Security and Privacy,
                  Oakland, California, USA, April 29 - May 2, 1984},
  pages        = {134--141},
  publisher    = {{IEEE} Computer Society},
  year         = {1984},
  url          = {https://doi.org/10.1109/SP.1984.10003},
  doi          = {10.1109/SP.1984.10003},
  timestamp    = {Thu, 21 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/Millen84.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/NeilsonW84,
  author       = {John O. Neilson and
                  F. E. Wuebker},
  title        = {Design Experiences from the Multilevel Secure {MCF} Operating System},
  booktitle    = {Proceedings of the 1984 {IEEE} Symposium on Security and Privacy,
                  Oakland, California, USA, April 29 - May 2, 1984},
  pages        = {204--208},
  publisher    = {{IEEE} Computer Society},
  year         = {1984},
  url          = {https://doi.org/10.1109/SP.1984.10018},
  doi          = {10.1109/SP.1984.10018},
  timestamp    = {Thu, 21 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/NeilsonW84.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/Platek84,
  author       = {Richard Platek},
  title        = {The Use of Ada as an Implementation Language in Formally Specified
                  Systems},
  booktitle    = {Proceedings of the 1984 {IEEE} Symposium on Security and Privacy,
                  Oakland, California, USA, April 29 - May 2, 1984},
  pages        = {107--110},
  publisher    = {{IEEE} Computer Society},
  year         = {1984},
  url          = {https://doi.org/10.1109/SP.1984.10007},
  doi          = {10.1109/SP.1984.10007},
  timestamp    = {Thu, 21 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/Platek84.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/SchaeferS84,
  author       = {M. Schaefer and
                  Roger R. Schell},
  title        = {Toward an Understanding of Extensible Architectures for Evaluated
                  Trusted Computer System Products},
  booktitle    = {Proceedings of the 1984 {IEEE} Symposium on Security and Privacy,
                  Oakland, California, USA, April 29 - May 2, 1984},
  pages        = {41--51},
  publisher    = {{IEEE} Computer Society},
  year         = {1984},
  url          = {https://doi.org/10.1109/SP.1984.10024},
  doi          = {10.1109/SP.1984.10024},
  timestamp    = {Thu, 21 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/SchaeferS84.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/Sidhu84,
  author       = {Deepinder P. Sidhu},
  title        = {Executable Logic Specifications: {A} New Approach to Computer Security},
  booktitle    = {Proceedings of the 1984 {IEEE} Symposium on Security and Privacy,
                  Oakland, California, USA, April 29 - May 2, 1984},
  pages        = {142--153},
  publisher    = {{IEEE} Computer Society},
  year         = {1984},
  url          = {https://doi.org/10.1109/SP.1984.10020},
  doi          = {10.1109/SP.1984.10020},
  timestamp    = {Thu, 21 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/Sidhu84.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/Taylor84,
  author       = {T. Taylor},
  title        = {Comparison Paper between the Bell and LaPadula Model and the {SRI}
                  Model},
  booktitle    = {Proceedings of the 1984 {IEEE} Symposium on Security and Privacy,
                  Oakland, California, USA, April 29 - May 2, 1984},
  pages        = {195--203},
  publisher    = {{IEEE} Computer Society},
  year         = {1984},
  url          = {https://doi.org/10.1109/SP.1984.10021},
  doi          = {10.1109/SP.1984.10021},
  timestamp    = {Thu, 21 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/Taylor84.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/Wagner84,
  author       = {Neal R. Wagner},
  title        = {Searching for Public-Key Cryptosystems},
  booktitle    = {Proceedings of the 1984 {IEEE} Symposium on Security and Privacy,
                  Oakland, California, USA, April 29 - May 2, 1984},
  pages        = {91--98},
  publisher    = {{IEEE} Computer Society},
  year         = {1984},
  url          = {https://doi.org/10.1109/SP.1984.10026},
  doi          = {10.1109/SP.1984.10026},
  timestamp    = {Thu, 21 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/Wagner84.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/Winternitz84,
  author       = {Robert S. Winternitz},
  title        = {A Secure One-Way Hash Function Built from {DES}},
  booktitle    = {Proceedings of the 1984 {IEEE} Symposium on Security and Privacy,
                  Oakland, California, USA, April 29 - May 2, 1984},
  pages        = {88--90},
  publisher    = {{IEEE} Computer Society},
  year         = {1984},
  url          = {https://doi.org/10.1109/SP.1984.10027},
  doi          = {10.1109/SP.1984.10027},
  timestamp    = {Thu, 21 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/Winternitz84.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/Yelowitz84,
  author       = {Lawrence Yelowitz},
  title        = {Practical Experience with an Ada-Based Formal Specification/Language
                  on a Large Project},
  booktitle    = {Proceedings of the 1984 {IEEE} Symposium on Security and Privacy,
                  Oakland, California, USA, April 29 - May 2, 1984},
  pages        = {111--113},
  publisher    = {{IEEE} Computer Society},
  year         = {1984},
  url          = {https://doi.org/10.1109/SP.1984.10008},
  doi          = {10.1109/SP.1984.10008},
  timestamp    = {Thu, 21 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/Yelowitz84.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sp/1984,
  title        = {Proceedings of the 1984 {IEEE} Symposium on Security and Privacy,
                  Oakland, California, USA, April 29 - May 2, 1984},
  publisher    = {{IEEE} Computer Society},
  year         = {1984},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/6234786/proceeding},
  isbn         = {0-8186-0532-4},
  timestamp    = {Thu, 21 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/1984.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics