Search dblp for Publications

export results for "toc:db/conf/sp/sp1993.bht:"

 download as .bib file

@inproceedings{DBLP:conf/sp/AtluriBJ93,
  author       = {Vijayalakshmi Atluri and
                  Elisa Bertino and
                  Sushil Jajodia},
  title        = {Achieving stricter correctness requirements in multilevel secure databases},
  booktitle    = {1993 {IEEE} Computer Society Symposium on Research in Security and
                  Privacy, Oakland, CA, USA, May 24-26, 1993},
  pages        = {135--147},
  publisher    = {{IEEE} Computer Society},
  year         = {1993},
  url          = {https://doi.org/10.1109/RISP.1993.287636},
  doi          = {10.1109/RISP.1993.287636},
  timestamp    = {Thu, 21 Sep 2023 15:57:35 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/AtluriBJ93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/BlausteinJMN93,
  author       = {Barbara T. Blaustein and
                  Sushil Jajodia and
                  Catherine D. McCollum and
                  LouAnna Notargiacomo},
  title        = {A model of atomicity for multilevel transactions},
  booktitle    = {1993 {IEEE} Computer Society Symposium on Research in Security and
                  Privacy, Oakland, CA, USA, May 24-26, 1993},
  pages        = {120--134},
  publisher    = {{IEEE} Computer Society},
  year         = {1993},
  url          = {https://doi.org/10.1109/RISP.1993.287637},
  doi          = {10.1109/RISP.1993.287637},
  timestamp    = {Thu, 21 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/BlausteinJMN93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/Cuppens93,
  author       = {Fr{\'{e}}d{\'{e}}ric Cuppens},
  title        = {A logical analysis of authorized and prohibited information flows},
  booktitle    = {1993 {IEEE} Computer Society Symposium on Research in Security and
                  Privacy, Oakland, CA, USA, May 24-26, 1993},
  pages        = {100--109},
  publisher    = {{IEEE} Computer Society},
  year         = {1993},
  url          = {https://doi.org/10.1109/RISP.1993.287639},
  doi          = {10.1109/RISP.1993.287639},
  timestamp    = {Thu, 21 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/Cuppens93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/FineM93,
  author       = {Todd Fine and
                  Spencer E. Minear},
  title        = {Assuring Distributed Trusted Mach},
  booktitle    = {1993 {IEEE} Computer Society Symposium on Research in Security and
                  Privacy, Oakland, CA, USA, May 24-26, 1993},
  pages        = {206--217},
  publisher    = {{IEEE} Computer Society},
  year         = {1993},
  url          = {https://doi.org/10.1109/RISP.1993.287631},
  doi          = {10.1109/RISP.1993.287631},
  timestamp    = {Thu, 21 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/FineM93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/Gray93,
  author       = {James W. Gray III},
  title        = {On introducing noise into the bus-contention channel},
  booktitle    = {1993 {IEEE} Computer Society Symposium on Research in Security and
                  Privacy, Oakland, CA, USA, May 24-26, 1993},
  pages        = {90--98},
  publisher    = {{IEEE} Computer Society},
  year         = {1993},
  url          = {https://doi.org/10.1109/RISP.1993.287640},
  doi          = {10.1109/RISP.1993.287640},
  timestamp    = {Thu, 21 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/Gray93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/HortonHACHNSW93,
  author       = {Joseph D. Horton and
                  Robert Harland and
                  Elton Ashby and
                  Rodney H. Cooper and
                  W. F. Hyslop and
                  Bradford G. Nickerson and
                  W. M. Stewart and
                  O. K. Ward},
  title        = {The cascade vulnerability problem},
  booktitle    = {1993 {IEEE} Computer Society Symposium on Research in Security and
                  Privacy, Oakland, CA, USA, May 24-26, 1993},
  pages        = {110--116},
  publisher    = {{IEEE} Computer Society},
  year         = {1993},
  url          = {https://doi.org/10.1109/RISP.1993.287638},
  doi          = {10.1109/RISP.1993.287638},
  timestamp    = {Fri, 29 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/HortonHACHNSW93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/Ilgun93,
  author       = {Koral Ilgun},
  title        = {{USTAT:} a real-time intrusion detection system for {UNIX}},
  booktitle    = {1993 {IEEE} Computer Society Symposium on Research in Security and
                  Privacy, Oakland, CA, USA, May 24-26, 1993},
  pages        = {16--28},
  publisher    = {{IEEE} Computer Society},
  year         = {1993},
  url          = {https://doi.org/10.1109/RISP.1993.287646},
  doi          = {10.1109/RISP.1993.287646},
  timestamp    = {Thu, 21 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/Ilgun93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/KephartW93,
  author       = {Jeffrey O. Kephart and
                  Steve R. White},
  title        = {Measuring and modeling computer virus prevalence},
  booktitle    = {1993 {IEEE} Computer Society Symposium on Research in Security and
                  Privacy, Oakland, CA, USA, May 24-26, 1993},
  pages        = {2--15},
  publisher    = {{IEEE} Computer Society},
  year         = {1993},
  url          = {https://doi.org/10.1109/RISP.1993.287647},
  doi          = {10.1109/RISP.1993.287647},
  timestamp    = {Thu, 21 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/KephartW93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/MolvaT93,
  author       = {Refik Molva and
                  Gene Tsudik},
  title        = {Authentication method with impersonal token cards},
  booktitle    = {1993 {IEEE} Computer Society Symposium on Research in Security and
                  Privacy, Oakland, CA, USA, May 24-26, 1993},
  pages        = {56--65},
  publisher    = {{IEEE} Computer Society},
  year         = {1993},
  url          = {https://doi.org/10.1109/RISP.1993.287643},
  doi          = {10.1109/RISP.1993.287643},
  timestamp    = {Thu, 21 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/MolvaT93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/PiessensDJ93,
  author       = {Frank Piessens and
                  Bart De Decker and
                  Phil Janson},
  title        = {Interconnecting domains with heterogeneous key distribution and authentication
                  protocols},
  booktitle    = {1993 {IEEE} Computer Society Symposium on Research in Security and
                  Privacy, Oakland, CA, USA, May 24-26, 1993},
  pages        = {66--79},
  publisher    = {{IEEE} Computer Society},
  year         = {1993},
  url          = {https://doi.org/10.1109/RISP.1993.287642},
  doi          = {10.1109/RISP.1993.287642},
  timestamp    = {Thu, 21 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/PiessensDJ93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/QianSKLG93,
  author       = {Xiaolei Qian and
                  Mark E. Stickel and
                  Peter D. Karp and
                  Teresa F. Lunt and
                  Thomas D. Garvey},
  title        = {Detection and elimination of inference channels in multilevel relational
                  database systems},
  booktitle    = {1993 {IEEE} Computer Society Symposium on Research in Security and
                  Privacy, Oakland, CA, USA, May 24-26, 1993},
  pages        = {196--205},
  publisher    = {{IEEE} Computer Society},
  year         = {1993},
  url          = {https://doi.org/10.1109/RISP.1993.287632},
  doi          = {10.1109/RISP.1993.287632},
  timestamp    = {Thu, 21 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/QianSKLG93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/ReiterG93,
  author       = {Michael K. Reiter and
                  Li Gong},
  title        = {Preventing denial and forgery of causal relationships in distributed
                  systems},
  booktitle    = {1993 {IEEE} Computer Society Symposium on Research in Security and
                  Privacy, Oakland, CA, USA, May 24-26, 1993},
  pages        = {30--40},
  publisher    = {{IEEE} Computer Society},
  year         = {1993},
  url          = {https://doi.org/10.1109/RISP.1993.287645},
  doi          = {10.1109/RISP.1993.287645},
  timestamp    = {Thu, 21 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/ReiterG93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/StubblebineG93,
  author       = {Stuart G. Stubblebine and
                  Virgil D. Gligor},
  title        = {Protocol design for integrity protection},
  booktitle    = {1993 {IEEE} Computer Society Symposium on Research in Security and
                  Privacy, Oakland, CA, USA, May 24-26, 1993},
  pages        = {41--53},
  publisher    = {{IEEE} Computer Society},
  year         = {1993},
  url          = {https://doi.org/10.1109/RISP.1993.287644},
  doi          = {10.1109/RISP.1993.287644},
  timestamp    = {Thu, 21 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/StubblebineG93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/SyversonM93,
  author       = {Paul Syverson and
                  Catherine Meadows},
  title        = {A logical language for specifying cryptographic protocol requirements},
  booktitle    = {1993 {IEEE} Computer Society Symposium on Research in Security and
                  Privacy, Oakland, CA, USA, May 24-26, 1993},
  pages        = {165--177},
  publisher    = {{IEEE} Computer Society},
  year         = {1993},
  url          = {https://doi.org/10.1109/RISP.1993.287634},
  doi          = {10.1109/RISP.1993.287634},
  timestamp    = {Thu, 21 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/SyversonM93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/Trostle93,
  author       = {Jonathan T. Trostle},
  title        = {Modelling a fuzzy time system},
  booktitle    = {1993 {IEEE} Computer Society Symposium on Research in Security and
                  Privacy, Oakland, CA, USA, May 24-26, 1993},
  pages        = {82--89},
  publisher    = {{IEEE} Computer Society},
  year         = {1993},
  url          = {https://doi.org/10.1109/RISP.1993.287641},
  doi          = {10.1109/RISP.1993.287641},
  timestamp    = {Thu, 21 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/Trostle93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/WooL93,
  author       = {Thomas Y. C. Woo and
                  Simon S. Lam},
  title        = {A semantic model for authentication protocols},
  booktitle    = {1993 {IEEE} Computer Society Symposium on Research in Security and
                  Privacy, Oakland, CA, USA, May 24-26, 1993},
  pages        = {178--194},
  publisher    = {{IEEE} Computer Society},
  year         = {1993},
  url          = {https://doi.org/10.1109/RISP.1993.287633},
  doi          = {10.1109/RISP.1993.287633},
  timestamp    = {Thu, 21 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/WooL93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/YahalomKB93,
  author       = {Raphael Yahalom and
                  Birgit Klein and
                  Thomas Beth},
  title        = {Trust relationships in secure systems-a distributed authentication
                  perspective},
  booktitle    = {1993 {IEEE} Computer Society Symposium on Research in Security and
                  Privacy, Oakland, CA, USA, May 24-26, 1993},
  pages        = {150--164},
  publisher    = {{IEEE} Computer Society},
  year         = {1993},
  url          = {https://doi.org/10.1109/RISP.1993.287635},
  doi          = {10.1109/RISP.1993.287635},
  timestamp    = {Thu, 21 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/YahalomKB93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sp/1993,
  title        = {1993 {IEEE} Computer Society Symposium on Research in Security and
                  Privacy, Oakland, CA, USA, May 24-26, 1993},
  publisher    = {{IEEE} Computer Society},
  year         = {1993},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/902/proceeding},
  isbn         = {0-8186-3370-0},
  timestamp    = {Thu, 21 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/1993.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics