![](https://dblp1.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp1.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp1.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
default search action
Search dblp for Publications
export results for "toc:db/conf/sp/sp1993.bht:"
@inproceedings{DBLP:conf/sp/AtluriBJ93, author = {Vijayalakshmi Atluri and Elisa Bertino and Sushil Jajodia}, title = {Achieving stricter correctness requirements in multilevel secure databases}, booktitle = {1993 {IEEE} Computer Society Symposium on Research in Security and Privacy, Oakland, CA, USA, May 24-26, 1993}, pages = {135--147}, publisher = {{IEEE} Computer Society}, year = {1993}, url = {https://doi.org/10.1109/RISP.1993.287636}, doi = {10.1109/RISP.1993.287636}, timestamp = {Thu, 21 Sep 2023 15:57:35 +0200}, biburl = {https://dblp.org/rec/conf/sp/AtluriBJ93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/BlausteinJMN93, author = {Barbara T. Blaustein and Sushil Jajodia and Catherine D. McCollum and LouAnna Notargiacomo}, title = {A model of atomicity for multilevel transactions}, booktitle = {1993 {IEEE} Computer Society Symposium on Research in Security and Privacy, Oakland, CA, USA, May 24-26, 1993}, pages = {120--134}, publisher = {{IEEE} Computer Society}, year = {1993}, url = {https://doi.org/10.1109/RISP.1993.287637}, doi = {10.1109/RISP.1993.287637}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/BlausteinJMN93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/Cuppens93, author = {Fr{\'{e}}d{\'{e}}ric Cuppens}, title = {A logical analysis of authorized and prohibited information flows}, booktitle = {1993 {IEEE} Computer Society Symposium on Research in Security and Privacy, Oakland, CA, USA, May 24-26, 1993}, pages = {100--109}, publisher = {{IEEE} Computer Society}, year = {1993}, url = {https://doi.org/10.1109/RISP.1993.287639}, doi = {10.1109/RISP.1993.287639}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/Cuppens93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/FineM93, author = {Todd Fine and Spencer E. Minear}, title = {Assuring Distributed Trusted Mach}, booktitle = {1993 {IEEE} Computer Society Symposium on Research in Security and Privacy, Oakland, CA, USA, May 24-26, 1993}, pages = {206--217}, publisher = {{IEEE} Computer Society}, year = {1993}, url = {https://doi.org/10.1109/RISP.1993.287631}, doi = {10.1109/RISP.1993.287631}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/FineM93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/Gray93, author = {James W. Gray III}, title = {On introducing noise into the bus-contention channel}, booktitle = {1993 {IEEE} Computer Society Symposium on Research in Security and Privacy, Oakland, CA, USA, May 24-26, 1993}, pages = {90--98}, publisher = {{IEEE} Computer Society}, year = {1993}, url = {https://doi.org/10.1109/RISP.1993.287640}, doi = {10.1109/RISP.1993.287640}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/Gray93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/HortonHACHNSW93, author = {Joseph D. Horton and Robert Harland and Elton Ashby and Rodney H. Cooper and W. F. Hyslop and Bradford G. Nickerson and W. M. Stewart and O. K. Ward}, title = {The cascade vulnerability problem}, booktitle = {1993 {IEEE} Computer Society Symposium on Research in Security and Privacy, Oakland, CA, USA, May 24-26, 1993}, pages = {110--116}, publisher = {{IEEE} Computer Society}, year = {1993}, url = {https://doi.org/10.1109/RISP.1993.287638}, doi = {10.1109/RISP.1993.287638}, timestamp = {Fri, 29 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/HortonHACHNSW93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/Ilgun93, author = {Koral Ilgun}, title = {{USTAT:} a real-time intrusion detection system for {UNIX}}, booktitle = {1993 {IEEE} Computer Society Symposium on Research in Security and Privacy, Oakland, CA, USA, May 24-26, 1993}, pages = {16--28}, publisher = {{IEEE} Computer Society}, year = {1993}, url = {https://doi.org/10.1109/RISP.1993.287646}, doi = {10.1109/RISP.1993.287646}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/Ilgun93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/KephartW93, author = {Jeffrey O. Kephart and Steve R. White}, title = {Measuring and modeling computer virus prevalence}, booktitle = {1993 {IEEE} Computer Society Symposium on Research in Security and Privacy, Oakland, CA, USA, May 24-26, 1993}, pages = {2--15}, publisher = {{IEEE} Computer Society}, year = {1993}, url = {https://doi.org/10.1109/RISP.1993.287647}, doi = {10.1109/RISP.1993.287647}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/KephartW93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/MolvaT93, author = {Refik Molva and Gene Tsudik}, title = {Authentication method with impersonal token cards}, booktitle = {1993 {IEEE} Computer Society Symposium on Research in Security and Privacy, Oakland, CA, USA, May 24-26, 1993}, pages = {56--65}, publisher = {{IEEE} Computer Society}, year = {1993}, url = {https://doi.org/10.1109/RISP.1993.287643}, doi = {10.1109/RISP.1993.287643}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/MolvaT93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/PiessensDJ93, author = {Frank Piessens and Bart De Decker and Phil Janson}, title = {Interconnecting domains with heterogeneous key distribution and authentication protocols}, booktitle = {1993 {IEEE} Computer Society Symposium on Research in Security and Privacy, Oakland, CA, USA, May 24-26, 1993}, pages = {66--79}, publisher = {{IEEE} Computer Society}, year = {1993}, url = {https://doi.org/10.1109/RISP.1993.287642}, doi = {10.1109/RISP.1993.287642}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/PiessensDJ93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/QianSKLG93, author = {Xiaolei Qian and Mark E. Stickel and Peter D. Karp and Teresa F. Lunt and Thomas D. Garvey}, title = {Detection and elimination of inference channels in multilevel relational database systems}, booktitle = {1993 {IEEE} Computer Society Symposium on Research in Security and Privacy, Oakland, CA, USA, May 24-26, 1993}, pages = {196--205}, publisher = {{IEEE} Computer Society}, year = {1993}, url = {https://doi.org/10.1109/RISP.1993.287632}, doi = {10.1109/RISP.1993.287632}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/QianSKLG93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/ReiterG93, author = {Michael K. Reiter and Li Gong}, title = {Preventing denial and forgery of causal relationships in distributed systems}, booktitle = {1993 {IEEE} Computer Society Symposium on Research in Security and Privacy, Oakland, CA, USA, May 24-26, 1993}, pages = {30--40}, publisher = {{IEEE} Computer Society}, year = {1993}, url = {https://doi.org/10.1109/RISP.1993.287645}, doi = {10.1109/RISP.1993.287645}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/ReiterG93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/StubblebineG93, author = {Stuart G. Stubblebine and Virgil D. Gligor}, title = {Protocol design for integrity protection}, booktitle = {1993 {IEEE} Computer Society Symposium on Research in Security and Privacy, Oakland, CA, USA, May 24-26, 1993}, pages = {41--53}, publisher = {{IEEE} Computer Society}, year = {1993}, url = {https://doi.org/10.1109/RISP.1993.287644}, doi = {10.1109/RISP.1993.287644}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/StubblebineG93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/SyversonM93, author = {Paul Syverson and Catherine Meadows}, title = {A logical language for specifying cryptographic protocol requirements}, booktitle = {1993 {IEEE} Computer Society Symposium on Research in Security and Privacy, Oakland, CA, USA, May 24-26, 1993}, pages = {165--177}, publisher = {{IEEE} Computer Society}, year = {1993}, url = {https://doi.org/10.1109/RISP.1993.287634}, doi = {10.1109/RISP.1993.287634}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/SyversonM93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/Trostle93, author = {Jonathan T. Trostle}, title = {Modelling a fuzzy time system}, booktitle = {1993 {IEEE} Computer Society Symposium on Research in Security and Privacy, Oakland, CA, USA, May 24-26, 1993}, pages = {82--89}, publisher = {{IEEE} Computer Society}, year = {1993}, url = {https://doi.org/10.1109/RISP.1993.287641}, doi = {10.1109/RISP.1993.287641}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/Trostle93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/WooL93, author = {Thomas Y. C. Woo and Simon S. Lam}, title = {A semantic model for authentication protocols}, booktitle = {1993 {IEEE} Computer Society Symposium on Research in Security and Privacy, Oakland, CA, USA, May 24-26, 1993}, pages = {178--194}, publisher = {{IEEE} Computer Society}, year = {1993}, url = {https://doi.org/10.1109/RISP.1993.287633}, doi = {10.1109/RISP.1993.287633}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/WooL93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/YahalomKB93, author = {Raphael Yahalom and Birgit Klein and Thomas Beth}, title = {Trust relationships in secure systems-a distributed authentication perspective}, booktitle = {1993 {IEEE} Computer Society Symposium on Research in Security and Privacy, Oakland, CA, USA, May 24-26, 1993}, pages = {150--164}, publisher = {{IEEE} Computer Society}, year = {1993}, url = {https://doi.org/10.1109/RISP.1993.287635}, doi = {10.1109/RISP.1993.287635}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/YahalomKB93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/sp/1993, title = {1993 {IEEE} Computer Society Symposium on Research in Security and Privacy, Oakland, CA, USA, May 24-26, 1993}, publisher = {{IEEE} Computer Society}, year = {1993}, url = {https://ieeexplore.ieee.org/xpl/conhome/902/proceeding}, isbn = {0-8186-3370-0}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/1993.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
![](https://dblp1.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.