Proceedings:
Gespeichert in:
Körperschaft: | |
---|---|
Format: | Tagungsbericht Buch |
Sprache: | English |
Veröffentlicht: |
Los Alamitos, Calif. [u.a.]
IEEE Computer Soc.
1990
|
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | Literaturangaben |
Beschreibung: | IX, 401 S. graph. Darst. |
ISBN: | 0818620609 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV004219112 | ||
003 | DE-604 | ||
005 | 20150324 | ||
007 | t| | ||
008 | 910129s1990 xx d||| |||| 10||| eng d | ||
020 | |a 0818620609 |9 0-8186-2060-9 | ||
035 | |a (OCoLC)256969716 | ||
035 | |a (DE-599)BVBBV004219112 | ||
040 | |a DE-604 |b ger |e rakddb | ||
041 | 0 | |a eng | |
049 | |a DE-91G |a DE-739 |a DE-83 |a DE-188 | ||
084 | |a SD 1990 |0 (DE-625)142724: |2 rvk | ||
084 | |a DAT 450f |2 stub | ||
084 | |a DAT 460f |2 stub | ||
084 | |a DAT 050f |2 stub | ||
111 | 2 | |a Symposium on Research in Security and Privacy |n 11 |d 1990 |c Oakland, Calif. |j Verfasser |0 (DE-588)5029867-7 |4 aut | |
245 | 1 | 0 | |a Proceedings |c 1990 IEEE Computer Society Symposium on Research in Security and Privacy, May 7 - 9, 1990, Oakland, Calif. |
246 | 1 | 3 | |a Research in security and privacy |
264 | 1 | |a Los Alamitos, Calif. [u.a.] |b IEEE Computer Soc. |c 1990 | |
300 | |a IX, 401 S. |b graph. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
500 | |a Literaturangaben | ||
650 | 0 | 7 | |a Datenschutz |0 (DE-588)4011134-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Programmiersprache |0 (DE-588)4047409-4 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)1071861417 |a Konferenzschrift |y 1990 |z Oakland Calif. |2 gnd-content | |
689 | 0 | 0 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 0 | 1 | |a Datenschutz |0 (DE-588)4011134-9 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Programmiersprache |0 (DE-588)4047409-4 |D s |
689 | 1 | |8 1\p |5 DE-604 | |
710 | 2 | |a IEEE Computer Society |e Sonstige |0 (DE-588)25694-8 |4 oth | |
711 | 2 | |a Symposium on Research in Security and Privacy |n 11 |d 1990 |c Oakland, Calif. |j Sonstige |0 (DE-588)5029867-7 |4 oth | |
856 | 4 | 2 | |m Digitalisierung TU Muenchen |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=002626936&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-002626936 |
Datensatz im Suchindex
_version_ | 1820868132823105536 |
---|---|
adam_text |
Table of Contents
Message from the Program Chairs
.
v
Conference Committee
.vi
Secure Systems I
Chair: S.Lipner
A VMM Security Kernel for the VAX Architecture
.2
PA.
Karger,
ME. Zurko,
D.W.
Bonin,
AM. Mason, and
CE.
Kahn
An Architecture for Practical Delegation in
а
Distributed System
.20
M. Gasser and E. McDermott
Practical Authentication for Distributed Computing
.31
J
.
Linn
SP3 Peer Identification
.41
W.C.
Birnbaum
Secure Systems
Π
Chair: E. Sullivan
The Army Secure Operating System
.50
NA. Waldhart
Specification and Verification of the ASOS Kernel
.61
BL.
Di Vito,
PM.
Palmquist,
ЕЯ.
Anderson, and ML. Johnston
Database I
Chair: T.Lunt
Integrating an Object-Oriented Data Model with Multilevel Security
.76
S. Jajodia andB. Kogan
A Little Knowledge Goes a Long Way: Faster Detection of
Compromised Data in 2-D Tables
.
í
6
D.
Gusfield
Extending the Brewer-Nash Model to a Multilevel Context
.95
C. Meadows
Databasen
Chair: E.Boebert
Polyinstantiation Integrity in Multilevel Relations
.104
S. Jajodia andR. Sandhu
Naming and Grouping Privileges to Simplify Security
Management in Large Databases
.116
R.W.Baldwin
Referential Secrecy
.133
RK. Burns
Information Flow
Chair: J.Rushby
Information Flow in Nondeterministic Systems
.144
J.T.
Wittbold
and DM. Johnson
Constructively Using Noninterference to Analyze Systems
.162
T. Fine
vn
Probabilistic Interference
.170
J.W.
Gray, III
Security Models and Information Row
.180
J. McLean
Access Control and Integrity
Chair: R.
Schell
Beyond the Pale of MAC and
D
AC-Defining
New Forms of Access Control
.190
CJ. McCollum,
ЈЛ.
Messing, andL. Notargiacomo
Some Conundrums Concerning Separation of Duty
.201
MJ. Nash, and
КЯ.
Poland
Authentication
Chair: T.Berson
The Role of Trust in Protected Mail
.210
M. Br
anstod,
W.
С.
Barker, and P. Cochrane
On die Formal Specification and Verification of a
Multiparty Session Protocol
.216
P.-C. Cheng and VD. Gligor
Reasoning about Belief in Cryptographic Protocols
.234
L. Gong, R. Needham, andR. Yahalom
A Security Architecture and Mechanism for
Data Confidentiality in
TCP/IP
Protocols
.249
R.Ramaswamy
Auditing and Intrusion Detection
Chair: J.Anderson
The Auditing Facility for
а
VMM Security Kernel
.262
KF.
Seiden
and
J
J*. Melanson
Adaptive
Real-Time
Anomaly Detection Using Inductively
Generated Sequential Patterns
.278
HS.
Teng,
К.
Chen, and
S.C.
-Y. Lu
Auditing
the Use of Covert Storage Channels in Secure Systems
.285
S.-P.W. Shieh and VJ). Gligor
A Network Security Monitor
. 296
L.T.
Herberlein,
G.V.
Dias,
КЯ.
Levitt,
B. Mukherjee, J. Wood, andD. Wolber
Verification
Chair: D. Cooper
The Deductive Theory
Managen
A Knowledge Based System for
Formal Verification
. 306
B.DiVito, C. Garvey.D.Kwong, A. Murray,
J. Solomon, and A. Wu
Formal Construction of
Provably
Secure Systems with
Cartesiana
319
H.BrixandA.Dietl
Verifying a Hardware Security Architecture
333
JJ). GuttmanandH.-P.
Ko
A Hierarchical Methodology for Verifying
Microprogrammed Microprocessors
. . .
PJ.Windley
.
VUl
Database
ні
Chair: C.Garvey
Transaction Processing in Multilevel-Secure Databases
Using Replicated Architecture
.360
S. Jajodia andB. Kogan
Multiversion Concurrency Control for Multilevel
Secure Database Systems
.369
T
.F.
Кеф
and W.T. Tsai
Modeling Security-Relevant Data Semantics
.384
G.W. Smith
Facing the Challenges of the
90s
Chair: T.Lee
Information Privacy bsues for the
1990s.394
R.Turn
Author Index
.401
IX |
any_adam_object | 1 |
author_corporate | Symposium on Research in Security and Privacy Oakland, Calif |
author_corporate_role | aut |
author_facet | Symposium on Research in Security and Privacy Oakland, Calif |
author_sort | Symposium on Research in Security and Privacy Oakland, Calif |
building | Verbundindex |
bvnumber | BV004219112 |
classification_rvk | SD 1990 |
classification_tum | DAT 450f DAT 460f DAT 050f |
ctrlnum | (OCoLC)256969716 (DE-599)BVBBV004219112 |
discipline | Informatik Mathematik |
format | Conference Proceeding Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000 c 4500</leader><controlfield tag="001">BV004219112</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20150324</controlfield><controlfield tag="007">t|</controlfield><controlfield tag="008">910129s1990 xx d||| |||| 10||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0818620609</subfield><subfield code="9">0-8186-2060-9</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)256969716</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV004219112</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakddb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91G</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-83</subfield><subfield code="a">DE-188</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">SD 1990</subfield><subfield code="0">(DE-625)142724:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 450f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 460f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 050f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="111" ind1="2" ind2=" "><subfield code="a">Symposium on Research in Security and Privacy</subfield><subfield code="n">11</subfield><subfield code="d">1990</subfield><subfield code="c">Oakland, Calif.</subfield><subfield code="j">Verfasser</subfield><subfield code="0">(DE-588)5029867-7</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Proceedings</subfield><subfield code="c">1990 IEEE Computer Society Symposium on Research in Security and Privacy, May 7 - 9, 1990, Oakland, Calif.</subfield></datafield><datafield tag="246" ind1="1" ind2="3"><subfield code="a">Research in security and privacy</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Los Alamitos, Calif. [u.a.]</subfield><subfield code="b">IEEE Computer Soc.</subfield><subfield code="c">1990</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">IX, 401 S.</subfield><subfield code="b">graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Literaturangaben</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datenschutz</subfield><subfield code="0">(DE-588)4011134-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Programmiersprache</subfield><subfield code="0">(DE-588)4047409-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="y">1990</subfield><subfield code="z">Oakland Calif.</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Datenschutz</subfield><subfield code="0">(DE-588)4011134-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Programmiersprache</subfield><subfield code="0">(DE-588)4047409-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">IEEE Computer Society</subfield><subfield code="e">Sonstige</subfield><subfield code="0">(DE-588)25694-8</subfield><subfield code="4">oth</subfield></datafield><datafield tag="711" ind1="2" ind2=" "><subfield code="a">Symposium on Research in Security and Privacy</subfield><subfield code="n">11</subfield><subfield code="d">1990</subfield><subfield code="c">Oakland, Calif.</subfield><subfield code="j">Sonstige</subfield><subfield code="0">(DE-588)5029867-7</subfield><subfield code="4">oth</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung TU Muenchen</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=002626936&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-002626936</subfield></datafield></record></collection> |
genre | (DE-588)1071861417 Konferenzschrift 1990 Oakland Calif. gnd-content |
genre_facet | Konferenzschrift 1990 Oakland Calif. |
id | DE-604.BV004219112 |
illustrated | Illustrated |
indexdate | 2025-01-10T13:19:31Z |
institution | BVB |
institution_GND | (DE-588)5029867-7 (DE-588)25694-8 |
isbn | 0818620609 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-002626936 |
oclc_num | 256969716 |
open_access_boolean | |
owner | DE-91G DE-BY-TUM DE-739 DE-83 DE-188 |
owner_facet | DE-91G DE-BY-TUM DE-739 DE-83 DE-188 |
physical | IX, 401 S. graph. Darst. |
publishDate | 1990 |
publishDateSearch | 1990 |
publishDateSort | 1990 |
publisher | IEEE Computer Soc. |
record_format | marc |
spelling | Symposium on Research in Security and Privacy 11 1990 Oakland, Calif. Verfasser (DE-588)5029867-7 aut Proceedings 1990 IEEE Computer Society Symposium on Research in Security and Privacy, May 7 - 9, 1990, Oakland, Calif. Research in security and privacy Los Alamitos, Calif. [u.a.] IEEE Computer Soc. 1990 IX, 401 S. graph. Darst. txt rdacontent n rdamedia nc rdacarrier Literaturangaben Datenschutz (DE-588)4011134-9 gnd rswk-swf Datensicherung (DE-588)4011144-1 gnd rswk-swf Programmiersprache (DE-588)4047409-4 gnd rswk-swf (DE-588)1071861417 Konferenzschrift 1990 Oakland Calif. gnd-content Datensicherung (DE-588)4011144-1 s Datenschutz (DE-588)4011134-9 s DE-604 Programmiersprache (DE-588)4047409-4 s 1\p DE-604 IEEE Computer Society Sonstige (DE-588)25694-8 oth Symposium on Research in Security and Privacy 11 1990 Oakland, Calif. Sonstige (DE-588)5029867-7 oth Digitalisierung TU Muenchen application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=002626936&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Proceedings Datenschutz (DE-588)4011134-9 gnd Datensicherung (DE-588)4011144-1 gnd Programmiersprache (DE-588)4047409-4 gnd |
subject_GND | (DE-588)4011134-9 (DE-588)4011144-1 (DE-588)4047409-4 (DE-588)1071861417 |
title | Proceedings |
title_alt | Research in security and privacy |
title_auth | Proceedings |
title_exact_search | Proceedings |
title_full | Proceedings 1990 IEEE Computer Society Symposium on Research in Security and Privacy, May 7 - 9, 1990, Oakland, Calif. |
title_fullStr | Proceedings 1990 IEEE Computer Society Symposium on Research in Security and Privacy, May 7 - 9, 1990, Oakland, Calif. |
title_full_unstemmed | Proceedings 1990 IEEE Computer Society Symposium on Research in Security and Privacy, May 7 - 9, 1990, Oakland, Calif. |
title_short | Proceedings |
title_sort | proceedings |
topic | Datenschutz (DE-588)4011134-9 gnd Datensicherung (DE-588)4011144-1 gnd Programmiersprache (DE-588)4047409-4 gnd |
topic_facet | Datenschutz Datensicherung Programmiersprache Konferenzschrift 1990 Oakland Calif. |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=002626936&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT symposiumonresearchinsecurityandprivacyoaklandcalif proceedings AT ieeecomputersociety proceedings AT symposiumonresearchinsecurityandprivacyoaklandcalif researchinsecurityandprivacy AT ieeecomputersociety researchinsecurityandprivacy |