Proceedings, 1993 IEEE Computer Society Symposium on Research in Security and Privacy, May 24-26, 1993, Oakland, California |
Contents
A RealTime Intrusion Detection System for UNIX | 16 |
Preventing Denial and Forgery of Causal Relationships in Distributed Systems | 30 |
Protocol Design for Integrity Protection | 41 |
Copyright | |
13 other sections not shown
Common terms and phrases
algorithm analysis Analyzer assumption atomicity attacker attribute audit authentication protocols authentication systems BAN logic causality clock commit Computer Security computer virus concurrency control constraints correct covert channel cryptographic protocols database defined denoted detect domain representation DTMach edge encryption entities example execution Figure foreign key formal function fuzzy graph honest implemented incident infected inference channels input inter-domain intruder ISBN kernel kill signal lfact low process m₁ Mach message type ML transactions multilevel Multilevel Secure multiversion node nonce operations packets pairwise path port primary key principal problem properties range representation received represent request requirements satisfy scheduling secret security kernel security level security policy semantic sender serializability server session key specification task Threshold tion token card transition trusted subject type enforcement uptick USTAT vertex cover problem virus viruses workstation