ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy
Latest Publications
TOTAL DOCUMENTS
35
(FIVE YEARS 0)
H-INDEX
17
(FIVE YEARS 0)
Published By IEEE
0818620609
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
Modeling security-relevant data semantics
Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy
◽
10.1109/risp.1990.63866
◽
1990
◽
Cited By ~ 24
Author(s):
G.W. Smith
Keyword(s):
Data Semantics
Download Full-text
Some conundrums concerning separation of duty
Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy
◽
10.1109/risp.1990.63851
◽
1990
◽
Cited By ~ 44
Author(s):
M.J. Nash
◽
K.R. Poland
Keyword(s):
Separation Of Duty
Download Full-text
An architecture for practical delegation in a distributed system
Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy
◽
10.1109/risp.1990.63835
◽
1990
◽
Cited By ~ 90
Author(s):
M. Gasser
◽
E. McDermott
Keyword(s):
Distributed System
Download Full-text
Probabilistic interference
Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy
◽
10.1109/risp.1990.63848
◽
1990
◽
Cited By ~ 41
Author(s):
J.W. Gray
Download Full-text
Reasoning about belief in cryptographic protocols
Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy
◽
10.1109/risp.1990.63854
◽
1990
◽
Cited By ~ 294
Author(s):
L. Gong
◽
R. Needham
◽
R. Yahalom
Keyword(s):
Cryptographic Protocols
Download Full-text
Information flow in nondeterministic systems
Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy
◽
10.1109/risp.1990.63846
◽
1990
◽
Cited By ~ 134
Author(s):
J.T. Wittbold
◽
D.M. Johnson
Keyword(s):
Information Flow
Download Full-text
The role of trust in protected mail
Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy
◽
10.1109/risp.1990.63852
◽
1990
◽
Cited By ~ 2
Author(s):
M. Branstad
◽
W.C. Barker
◽
P. Cochrane
Download Full-text
Auditing the use of covert storage channels in secure systems
Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy
◽
10.1109/risp.1990.63858
◽
1990
◽
Cited By ~ 6
Author(s):
S.-P.W. Shieh
◽
V.D. Gligor
Keyword(s):
Secure Systems
◽
Storage Channels
Download Full-text
Adaptive real-time anomaly detection using inductively generated sequential patterns
Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy
◽
10.1109/risp.1990.63857
◽
1990
◽
Cited By ~ 78
Author(s):
H.S. Teng
◽
K. Chen
◽
S.C. Lu
Keyword(s):
Anomaly Detection
◽
Real Time
◽
Sequential Patterns
Download Full-text
A security architecture and mechanism for data confidentiality in TCP/IP protocols
Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy
◽
10.1109/risp.1990.63855
◽
1990
◽
Cited By ~ 2
Author(s):
R. Ramaswamy
Keyword(s):
Security Architecture
◽
Data Confidentiality
Download Full-text
Load More ...
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close