Proceedings: 1991 IEEE Computer Society Symposium on Research in Security and Privacy, May 20-22, 1991, Oakland, California
IEEE Computer Society Press, 1991 - Computers - 389 pages
Proceedings of the 1991 IEEE Computer Society Symposium on [title], held in Oakland, California, May 1991. Focusing on both theoretical and practical research in computer security, the subjects addressed include covert channels, security models, distributed systems, protocol verification, policy, authentication, information theory, database security, and intrusion detection. No index. Acidic paper. Annotation copyrighted by Book News, Inc., Portland, OR.
What people are saying - Write a review
We haven't found any reviews in the usual places.
Reducing Timing Channels with Fuzzy Time
Toward a Mathematical Foundation for Information Flow Security
A Technique for Identifying
17 other sections not shown
access control ACL numbers algorithm application approach attribute audit records authentication authorization server BAN logic Bell-LaPadula model certificate clock component Computer Security computer system covert channel creation operation cryptographic protocols database defined definition delegation discretionary access controls disk distributed system encrypted entity ESPM event system example Figure flow policies formal fragment function given graph high water mark host id identified implementation infected information flow input integrity interface intrusion Kerberos logic module multilevel multilevel security nodes object output parameter predicate proof properties protocol public key query random random graph regime relation request requirements restrictive result scenario Security and Privacy security kernel security policy semantics session key software development specification SVMM Symposium on Security TCSEC techniques theorem ticket tion TNIU token trust principles tuple Turing Test update verification virtual machine