ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
1987 IEEE Symposium on Security and Privacy
Latest Publications
TOTAL DOCUMENTS
27
(FIVE YEARS 0)
H-INDEX
12
(FIVE YEARS 0)
Published By IEEE
0818607718
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
Checking Classification Constraints for Consistency and Completeness
1987 IEEE Symposium on Security and Privacy
◽
10.1109/sp.1987.10000
◽
1987
◽
Author(s):
Selim G. Aki
◽
Dorothy E. Denning
Download Full-text
Information Flow and Invariance
1987 IEEE Symposium on Security and Privacy
◽
10.1109/sp.1987.10022
◽
1987
◽
Author(s):
Joshua Guttman
Keyword(s):
Information Flow
Download Full-text
A Universal Theory of Information Flow
1987 IEEE Symposium on Security and Privacy
◽
10.1109/sp.1987.10012
◽
1987
◽
Cited By ~ 17
Author(s):
Simon N. Foley
Keyword(s):
Information Flow
◽
Universal Theory
◽
Theory Of Information
Download Full-text
Covert Channel Capacity
1987 IEEE Symposium on Security and Privacy
◽
10.1109/sp.1987.10013
◽
1987
◽
Cited By ~ 103
Author(s):
Jonathan K. Millen
Keyword(s):
Channel Capacity
◽
Covert Channel
Download Full-text
Exploiting the Dual Nature of Sensitivity Labels
1987 IEEE Symposium on Security and Privacy
◽
10.1109/sp.1987.10016
◽
1987
◽
Cited By ~ 17
Author(s):
John P. L. Woodward
Keyword(s):
Dual Nature
Download Full-text
A Basis for Secure Communication in Large Distributed Systems
1987 IEEE Symposium on Security and Privacy
◽
10.1109/sp.1987.10006
◽
1987
◽
Cited By ~ 1
Author(s):
David P. Anderson
◽
P. Venkat Rangan
Keyword(s):
Distributed Systems
◽
Secure Communication
Download Full-text
A Formal Method for the Identification of Covert Storage Channels in Source Code
1987 IEEE Symposium on Security and Privacy
◽
10.1109/sp.1987.10014
◽
1987
◽
Cited By ~ 21
Author(s):
Chii-Ren Tsai
◽
Virgil D. Gligor
◽
C. Sekar Chandersekaran
Keyword(s):
Formal Method
◽
Source Code
◽
Storage Channels
Download Full-text
The Integrity Lock Architecture and Its Application to Message Systems: Reducing Covert Channels
1987 IEEE Symposium on Security and Privacy
◽
10.1109/sp.1987.10008
◽
1987
◽
Cited By ~ 3
Author(s):
Catherine Meadows
Keyword(s):
Covert Channels
Download Full-text
Coding for a Believable Specification to Implementation Mapping
1987 IEEE Symposium on Security and Privacy
◽
10.1109/sp.1987.10003
◽
1987
◽
Cited By ~ 8
Author(s):
William D. Young
◽
John Mchugh
Download Full-text
Toward Verified Execution Environments
1987 IEEE Symposium on Security and Privacy
◽
10.1109/sp.1987.10018
◽
1987
◽
Cited By ~ 12
Author(s):
William R. Bevier
◽
Warren A. Hunt, Jr.
◽
William D. Young
Download Full-text
Load More ...
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close