default search action
18th S&P 1997: Oakland, California, USA
- 1997 IEEE Symposium on Security and Privacy, May 4-7, 1997, Oakland, CA, USA. IEEE Computer Society 1997, ISBN 0-8186-7828-3
- Message from the Program Chairs.
- Conference Committee.
Panel/Debate
- John D. McLean:
Is the Trusted Computing Base Concept Fundamentally Flawed? 2 - Bob Blakley, Darrell M. Kienzle:
Some weaknesses of the TCB model. 3-5 - William R. Shockley, James P. Downey:
Is the Reference Monitor Concept Fatally Flawed? The Case for the Negative. 6-7
Authorization and Authentication
- Michael K. Reiter, Stuart G. Stubblebine:
Toward Acceptable Metrics of Authentication. 10-20 - Vincent Nicomette, Yves Deswarte:
An Authorization Scheme For Distributed Object Systems. 21-30 - Sushil Jajodia, Pierangela Samarati, V. S. Subrahmanian:
A Logical Language for Expressing Authorizations. 31-42
Applications
- Paul F. Syverson, David M. Goldschlag, Michael G. Reed:
Anonymous Connections and Onion Routing. 44-54 - Vikram R. Pesati, Thomas E. Keefe, Shankar Pal:
The Design and Implementation of a Multilevel Secure Log Manager. 55-64 - William A. Arbaugh, David J. Farber, Jonathan M. Smith:
A Secure and Reliable Bootstrap Architecture. 65-71 - Kelly Djahandari, Daniel F. Sterne:
An MBone Proxy for an Application Gateway Firewall. 72-81
Security Theory
- Mark Moriconi, Xiaolei Qian, Robert A. Riemenschneider, Li Gong:
Secure Software Architectures. 84-93 - Aris Zakinthinos, E. Stewart Lee:
A General Theory of Security Properties. 94-102 - Laurence Cholvy, Frédéric Cuppens:
Analyzing Consistency of Security Policies. 103-112
Panel
- Marvin Schaefer, Sylvan Pinsky, Drew Dean, Li Gong, Jim Roskind, Barbara Fox:
Ensuring Assurance in Mobile Computing. 114-118
Architectures
- Joshua D. Guttman:
Filtering Postures: Local Enforcement for Global Policies. 120-129 - Elena Ferrari, Pierangela Samarati, Elisa Bertino, Sushil Jajodia:
Providing flexibility in information flow control for object oriented systems. 130-140 - John C. Mitchell, Mark Mitchell, Ulrich Stern:
Automated analysis of cryptographic protocols using Mur-phi. 141-151
Intrusion Detection and Beyond
- Ulf Lindqvist, Erland Jonsson:
How to Systematically Classify Computer Security Intrusions. 154-163 - Paul Ammann, Sushil Jajodia, Catherine D. McCollum, Barbara T. Blaustein:
Surviving information warfare attacks on databases. 164-174 - Calvin Ko, Manfred Ruschitzka, Karl N. Levitt:
Execution Monitoring of Security-Critical Programs in Distributed Systems: A Specification-Based Approach. 175-187 - John Hale, Sujeet Shenoi:
Catalytic Inference Analysis: Detecting Inference Threats due to Knowledge Discovery. 188-199
Panel
- Cynthia E. Irvine:
Security in Innovative New Operating Systems. 202-203 - George C. Necula, Peter Lee:
Research on Proof-Carrying Code for Untrusted-Code Security. 204 - Robert Grimm, Brian N. Bershad:
Access Control for the SPIN Extensible Operating System. 205 - Oliver Spatscheck, Larry L. Peterson:
Escort: Securing Scout Paths. 206
System Vulnerabilities
- Christoph L. Schuba, Ivan Krsul, Markus G. Kuhn, Eugene H. Spafford, Aurobindo Sundaram, Diego Zamboni:
Analysis of a Denial of Service Attack on TCP. 208-223 - Adam L. Young, Moti Yung:
Deniable Password Snatching: On the Possibility of Evasive Electronic Espionage. 224-235 - Sarvar Patel:
Number Theoretic Attacks on Secure Password Schemes. 236-247
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.