default search action
Search dblp for Publications
export results for "toc:db/conf/sp/sp1990.bht:"
@inproceedings{DBLP:conf/sp/Baldwin90, author = {R. W. Baldwin}, title = {Naming and Grouping Privileges to Simplify Security Management in Large Databases}, booktitle = {Proceedings of the 1990 {IEEE} Symposium on Security and Privacy, Oakland, California, USA, May 7-9, 1990}, pages = {116--132}, publisher = {{IEEE} Computer Society}, year = {1990}, url = {https://doi.org/10.1109/RISP.1990.63844}, doi = {10.1109/RISP.1990.63844}, timestamp = {Thu, 21 Sep 2023 15:57:34 +0200}, biburl = {https://dblp.org/rec/conf/sp/Baldwin90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/Birnbaum90, author = {W. C. Birnbaum}, title = {{SP3} Peer Identification}, booktitle = {Proceedings of the 1990 {IEEE} Symposium on Security and Privacy, Oakland, California, USA, May 7-9, 1990}, pages = {41--49}, publisher = {{IEEE} Computer Society}, year = {1990}, url = {https://doi.org/10.1109/RISP.1990.63837}, doi = {10.1109/RISP.1990.63837}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/Birnbaum90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/BranstadBC90, author = {Martha A. Branstad and W. Curtis Barker and Pamela Cochrane}, title = {The Role of Trust in Protected Mail}, booktitle = {Proceedings of the 1990 {IEEE} Symposium on Security and Privacy, Oakland, California, USA, May 7-9, 1990}, pages = {210--215}, publisher = {{IEEE} Computer Society}, year = {1990}, url = {https://doi.org/10.1109/RISP.1990.63852}, doi = {10.1109/RISP.1990.63852}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/BranstadBC90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/BrixD90, author = {H. Brix and Albert Dietl}, title = {Formal Construction of Provably Secure Systems with Cartesiana}, booktitle = {Proceedings of the 1990 {IEEE} Symposium on Security and Privacy, Oakland, California, USA, May 7-9, 1990}, pages = {319--332}, publisher = {{IEEE} Computer Society}, year = {1990}, url = {https://doi.org/10.1109/RISP.1990.63861}, doi = {10.1109/RISP.1990.63861}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/BrixD90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/Burns90, author = {Rae K. Burns}, title = {Referential Secrecy}, booktitle = {Proceedings of the 1990 {IEEE} Symposium on Security and Privacy, Oakland, California, USA, May 7-9, 1990}, pages = {133--143}, publisher = {{IEEE} Computer Society}, year = {1990}, url = {https://doi.org/10.1109/RISP.1990.63845}, doi = {10.1109/RISP.1990.63845}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/Burns90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/ChengG90, author = {Pau{-}Chen Cheng and Virgil D. Gligor}, title = {On the Formal Specification and Verification of a Multiparty Session Protocol}, booktitle = {Proceedings of the 1990 {IEEE} Symposium on Security and Privacy, Oakland, California, USA, May 7-9, 1990}, pages = {216--233}, publisher = {{IEEE} Computer Society}, year = {1990}, url = {https://doi.org/10.1109/RISP.1990.63853}, doi = {10.1109/RISP.1990.63853}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/ChengG90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/DiVitoGKMSW90, author = {Ben L. Di Vito and Cristi Garvey and D. Kwong and A. Murray and Jane Solomon and Amy Wu}, title = {The Deductive Theory Manager: {A} Knowledge Based System for Formal Verification}, booktitle = {Proceedings of the 1990 {IEEE} Symposium on Security and Privacy, Oakland, California, USA, May 7-9, 1990}, pages = {306--318}, publisher = {{IEEE} Computer Society}, year = {1990}, url = {https://doi.org/10.1109/RISP.1990.63860}, doi = {10.1109/RISP.1990.63860}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/DiVitoGKMSW90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/DiVitoPAJ90, author = {Ben L. Di Vito and Paul H. Palmquist and Eric R. Anderson and Michael L. Johnston}, title = {Specification and Verification of the {ASOS} Kernel}, booktitle = {Proceedings of the 1990 {IEEE} Symposium on Security and Privacy, Oakland, California, USA, May 7-9, 1990}, pages = {61--75}, publisher = {{IEEE} Computer Society}, year = {1990}, url = {https://doi.org/10.1109/RISP.1990.63839}, doi = {10.1109/RISP.1990.63839}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/DiVitoPAJ90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/Fine90, author = {Todd Fine}, title = {Constructively Using Noninterference to Analyze Systems}, booktitle = {Proceedings of the 1990 {IEEE} Symposium on Security and Privacy, Oakland, California, USA, May 7-9, 1990}, pages = {162--169}, publisher = {{IEEE} Computer Society}, year = {1990}, url = {https://doi.org/10.1109/RISP.1990.63847}, doi = {10.1109/RISP.1990.63847}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/Fine90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/GasserM90, author = {Morrie Gasser and Ellen McDermott}, title = {An Architecture for Practical Delegation in a Distributed System}, booktitle = {Proceedings of the 1990 {IEEE} Symposium on Security and Privacy, Oakland, California, USA, May 7-9, 1990}, pages = {20--30}, publisher = {{IEEE} Computer Society}, year = {1990}, url = {https://doi.org/10.1109/RISP.1990.63835}, doi = {10.1109/RISP.1990.63835}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/GasserM90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/GongNY90, author = {Li Gong and Roger M. Needham and Raphael Yahalom}, title = {Reasoning about Belief in Cryptographic Protocols}, booktitle = {Proceedings of the 1990 {IEEE} Symposium on Security and Privacy, Oakland, California, USA, May 7-9, 1990}, pages = {234--248}, publisher = {{IEEE} Computer Society}, year = {1990}, url = {https://doi.org/10.1109/RISP.1990.63854}, doi = {10.1109/RISP.1990.63854}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/GongNY90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/Gray90, author = {James W. Gray III}, title = {Probabilistic Interference}, booktitle = {Proceedings of the 1990 {IEEE} Symposium on Security and Privacy, Oakland, California, USA, May 7-9, 1990}, pages = {170--179}, publisher = {{IEEE} Computer Society}, year = {1990}, url = {https://doi.org/10.1109/RISP.1990.63848}, doi = {10.1109/RISP.1990.63848}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/Gray90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/Gusfield90, author = {Dan Gusfield}, title = {A Little Knowledge Goes a Long Way: Faster Detection of Compromised Data in 2-D Tables}, booktitle = {Proceedings of the 1990 {IEEE} Symposium on Security and Privacy, Oakland, California, USA, May 7-9, 1990}, pages = {86--94}, publisher = {{IEEE} Computer Society}, year = {1990}, url = {https://doi.org/10.1109/RISP.1990.63841}, doi = {10.1109/RISP.1990.63841}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/Gusfield90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/GuttmanK90, author = {Joshua D. Guttman and H.{-}P. Ko}, title = {Verifying a Hardware Security Architecture}, booktitle = {Proceedings of the 1990 {IEEE} Symposium on Security and Privacy, Oakland, California, USA, May 7-9, 1990}, pages = {333--344}, publisher = {{IEEE} Computer Society}, year = {1990}, url = {https://doi.org/10.1109/RISP.1990.63862}, doi = {10.1109/RISP.1990.63862}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/GuttmanK90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/HerberleinDLMWW90, author = {L. Todd Herberlein and Gihan V. Dias and Karl N. Levitt and Biswanath Mukherjee and Jeff Wood and David Wolber}, title = {A Network Security Monitor}, booktitle = {Proceedings of the 1990 {IEEE} Symposium on Security and Privacy, Oakland, California, USA, May 7-9, 1990}, pages = {296--305}, publisher = {{IEEE} Computer Society}, year = {1990}, url = {https://doi.org/10.1109/RISP.1990.63859}, doi = {10.1109/RISP.1990.63859}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/HerberleinDLMWW90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/JajodiaK90, author = {Sushil Jajodia and Boris Kogan}, title = {Integrating an Object-Oriented Data Model with Multilevel Security}, booktitle = {Proceedings of the 1990 {IEEE} Symposium on Security and Privacy, Oakland, California, USA, May 7-9, 1990}, pages = {76--85}, publisher = {{IEEE} Computer Society}, year = {1990}, url = {https://doi.org/10.1109/RISP.1990.63840}, doi = {10.1109/RISP.1990.63840}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/JajodiaK90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/JajodiaK90a, author = {Sushil Jajodia and Boris Kogan}, title = {Transaction Processing in Multilevel-Secure Databases Using Replicated Architecture}, booktitle = {Proceedings of the 1990 {IEEE} Symposium on Security and Privacy, Oakland, California, USA, May 7-9, 1990}, pages = {360--368}, publisher = {{IEEE} Computer Society}, year = {1990}, url = {https://doi.org/10.1109/RISP.1990.63864}, doi = {10.1109/RISP.1990.63864}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/JajodiaK90a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/JajodiaS90, author = {Sushil Jajodia and Ravi S. Sandhu}, title = {Polyinstantiation Integrity in Multilevel Relations}, booktitle = {Proceedings of the 1990 {IEEE} Symposium on Security and Privacy, Oakland, California, USA, May 7-9, 1990}, pages = {104--115}, publisher = {{IEEE} Computer Society}, year = {1990}, url = {https://doi.org/10.1109/RISP.1990.63843}, doi = {10.1109/RISP.1990.63843}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/JajodiaS90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/KargerZBMK90, author = {Paul A. Karger and Mary Ellen Zurko and Douglas W. Bonin and Andrew H. Mason and Clifford E. Kahn}, title = {A {VMM} Security Kernel for the {VAX} Architecture}, booktitle = {Proceedings of the 1990 {IEEE} Symposium on Security and Privacy, Oakland, California, USA, May 7-9, 1990}, pages = {2--19}, publisher = {{IEEE} Computer Society}, year = {1990}, url = {https://doi.org/10.1109/RISP.1990.63834}, doi = {10.1109/RISP.1990.63834}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/KargerZBMK90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/KeefeT90, author = {Thomas F. Keefe and Wei{-}Tek Tsai}, title = {Multiversion Concurrency Control for Multilevel Secure Database Systems}, booktitle = {Proceedings of the 1990 {IEEE} Symposium on Security and Privacy, Oakland, California, USA, May 7-9, 1990}, pages = {369--383}, publisher = {{IEEE} Computer Society}, year = {1990}, url = {https://doi.org/10.1109/RISP.1990.63865}, doi = {10.1109/RISP.1990.63865}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/KeefeT90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/Linn90, author = {J. Linn}, title = {Practical Authentication for Distributed Computing}, booktitle = {Proceedings of the 1990 {IEEE} Symposium on Security and Privacy, Oakland, California, USA, May 7-9, 1990}, pages = {31--40}, publisher = {{IEEE} Computer Society}, year = {1990}, url = {https://doi.org/10.1109/RISP.1990.63836}, doi = {10.1109/RISP.1990.63836}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/Linn90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/McCollumMN90, author = {Catherine D. McCollum and J. R. Messing and LouAnna Notargiacomo}, title = {Beyond the Pale of {MAC} and DAC-Defining New Forms of Access Control}, booktitle = {Proceedings of the 1990 {IEEE} Symposium on Security and Privacy, Oakland, California, USA, May 7-9, 1990}, pages = {190--200}, publisher = {{IEEE} Computer Society}, year = {1990}, url = {https://doi.org/10.1109/RISP.1990.63850}, doi = {10.1109/RISP.1990.63850}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/McCollumMN90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/McLean90, author = {John McLean}, title = {Security Models and Information Flow}, booktitle = {Proceedings of the 1990 {IEEE} Symposium on Security and Privacy, Oakland, California, USA, May 7-9, 1990}, pages = {180--189}, publisher = {{IEEE} Computer Society}, year = {1990}, url = {https://doi.org/10.1109/RISP.1990.63849}, doi = {10.1109/RISP.1990.63849}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/McLean90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/Meadows90, author = {Catherine Meadows}, title = {Extending the Brewer-Nash Model to a Multilevel Context}, booktitle = {Proceedings of the 1990 {IEEE} Symposium on Security and Privacy, Oakland, California, USA, May 7-9, 1990}, pages = {95--103}, publisher = {{IEEE} Computer Society}, year = {1990}, url = {https://doi.org/10.1109/RISP.1990.63842}, doi = {10.1109/RISP.1990.63842}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/Meadows90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/NashP90, author = {Michael J. Nash and K. R. Poland}, title = {Some Conundrums Concerning Separation of Duty}, booktitle = {Proceedings of the 1990 {IEEE} Symposium on Security and Privacy, Oakland, California, USA, May 7-9, 1990}, pages = {201--209}, publisher = {{IEEE} Computer Society}, year = {1990}, url = {https://doi.org/10.1109/RISP.1990.63851}, doi = {10.1109/RISP.1990.63851}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/NashP90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/Ramaswamy90, author = {Raju Ramaswamy}, title = {A Security Architecture and Mechanism for Data Confidentiality in {TCP/IP} Protocols}, booktitle = {Proceedings of the 1990 {IEEE} Symposium on Security and Privacy, Oakland, California, USA, May 7-9, 1990}, pages = {249--261}, publisher = {{IEEE} Computer Society}, year = {1990}, url = {https://doi.org/10.1109/RISP.1990.63855}, doi = {10.1109/RISP.1990.63855}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/Ramaswamy90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/SeidenM90, author = {K. F. Seiden and J. P. Melanson}, title = {The Auditing Facility for a {VMM} Security Kernel}, booktitle = {Proceedings of the 1990 {IEEE} Symposium on Security and Privacy, Oakland, California, USA, May 7-9, 1990}, pages = {262--277}, publisher = {{IEEE} Computer Society}, year = {1990}, url = {https://doi.org/10.1109/RISP.1990.63856}, doi = {10.1109/RISP.1990.63856}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/SeidenM90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/ShiehG90, author = {Shiuh{-}Pyng Shieh and Virgil D. Gligor}, title = {Auditing the Use of Covert Storage Channels in Secure Systems}, booktitle = {Proceedings of the 1990 {IEEE} Symposium on Security and Privacy, Oakland, California, USA, May 7-9, 1990}, pages = {285--295}, publisher = {{IEEE} Computer Society}, year = {1990}, url = {https://doi.org/10.1109/RISP.1990.63858}, doi = {10.1109/RISP.1990.63858}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/ShiehG90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/Smith90, author = {Gary W. Smith}, title = {Modeling Security-Relevant Data Semantics}, booktitle = {Proceedings of the 1990 {IEEE} Symposium on Security and Privacy, Oakland, California, USA, May 7-9, 1990}, pages = {384--393}, publisher = {{IEEE} Computer Society}, year = {1990}, url = {https://doi.org/10.1109/RISP.1990.63866}, doi = {10.1109/RISP.1990.63866}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/Smith90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/TengCL90, author = {Henry S. Teng and Kaihu Chen and Stephen C. Y. Lu}, title = {Adaptive Real-Time Anomaly Detection Using Inductively Generated Sequential Patterns}, booktitle = {Proceedings of the 1990 {IEEE} Symposium on Security and Privacy, Oakland, California, USA, May 7-9, 1990}, pages = {278--284}, publisher = {{IEEE} Computer Society}, year = {1990}, url = {https://doi.org/10.1109/RISP.1990.63857}, doi = {10.1109/RISP.1990.63857}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/TengCL90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/Turn90, author = {Rein Turn}, title = {Information Privacy Issues for the 1990s}, booktitle = {Proceedings of the 1990 {IEEE} Symposium on Security and Privacy, Oakland, California, USA, May 7-9, 1990}, pages = {394--400}, publisher = {{IEEE} Computer Society}, year = {1990}, url = {https://doi.org/10.1109/RISP.1990.63867}, doi = {10.1109/RISP.1990.63867}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/Turn90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/Waldhart90, author = {N. A. Waldhart}, title = {The Army Secure Operating System}, booktitle = {Proceedings of the 1990 {IEEE} Symposium on Security and Privacy, Oakland, California, USA, May 7-9, 1990}, pages = {50--60}, publisher = {{IEEE} Computer Society}, year = {1990}, url = {https://doi.org/10.1109/RISP.1990.63838}, doi = {10.1109/RISP.1990.63838}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/Waldhart90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/Windley90, author = {Phillip J. Windley}, title = {A Hierarchical Methodology for Verifying Microprogrammed Microprocessors}, booktitle = {Proceedings of the 1990 {IEEE} Symposium on Security and Privacy, Oakland, California, USA, May 7-9, 1990}, pages = {345--359}, publisher = {{IEEE} Computer Society}, year = {1990}, url = {https://doi.ieeecomputersociety.org/10.1109/SP.1990.10000}, doi = {10.1109/SP.1990.10000}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/Windley90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/WittboldJ90, author = {J. Todd Wittbold and Dale M. Johnson}, title = {Information Flow in Nondeterministic Systems}, booktitle = {Proceedings of the 1990 {IEEE} Symposium on Security and Privacy, Oakland, California, USA, May 7-9, 1990}, pages = {144--161}, publisher = {{IEEE} Computer Society}, year = {1990}, url = {https://doi.org/10.1109/RISP.1990.63846}, doi = {10.1109/RISP.1990.63846}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/WittboldJ90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/sp/1990, title = {Proceedings of the 1990 {IEEE} Symposium on Security and Privacy, Oakland, California, USA, May 7-9, 1990}, publisher = {{IEEE} Computer Society}, year = {1990}, url = {https://ieeexplore.ieee.org/xpl/conhome/300/proceeding}, isbn = {0-8186-2060-9}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/1990.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.