A security architecture and mechanism for data confidentiality in TCP/IP protocols (English)
- New search for: Ramaswamy, R.
- New search for: Ramaswamy, R.
In:
Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy
;
249-259
;
1990
-
ISBN:
- Conference paper / Print
-
Title:A security architecture and mechanism for data confidentiality in TCP/IP protocols
-
Additional title:Eine Sicherheitsarchitektur und ein Mechanismus für die Datenvertraulichkeit in TCP/IP-Protokollen
-
Contributors:Ramaswamy, R. ( author )
-
Published in:
-
Publisher:
- New search for: IEEE Comput. Soc. Press
-
Place of publication:Los Alamitos
-
Publication date:1990
-
Size:11 Seiten, 39 Quellen
-
ISBN:
-
DOI:
-
Type of media:Conference paper
-
Type of material:Print
-
Language:English
-
Keywords:
-
Source:
Table of contents conference proceedings
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 0_1
-
Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy (Cat. No.90CH2884-5)| 1990
- 2
-
A VMM security kernel for the VAX architectureKarger, P.A. / Zurko, M.E. / Bonin, D.W. / Mason, A.H. / Kahn, C.E. et al. | 1990
- 20
-
An architecture for practical delegation in a distributed systemGasser, M. / McDermott, E. et al. | 1990
- 31
-
Practical authentication for distributed computingLinn, J. et al. | 1990
- 41
-
SP3 peer identificationBirnbaum, W.C. et al. | 1990
- 50
-
The Army Secure Operating SystemWaldhart, N.A. et al. | 1990
- 61
-
Specification and verification of the ASOS kernelDi Vito, B.L. / Palmquist, P.H. / Anderson, E.R. / Johnston, M.L. et al. | 1990
- 76
-
Integrating an object-oriented data model with multilevel securityJajodia, S. / Kogan, B. et al. | 1990
- 86
-
A little knowledge goes a long way: faster detection of compromised data in 2-D tablesGusfield, D. et al. | 1990
- 95
-
Extending the Brewer-Nash model to a multilevel contextMeadows, C. et al. | 1990
- 104
-
Polyinstantiation integrity in multilevel relationsJajodia, S. / Sandhu, R. et al. | 1990
- 116
-
Naming and grouping privileges to simplify security management in large databasesBaldwin, R.W. et al. | 1990
- 133
-
Referential secrecyBurns, R.K. et al. | 1990
- 144
-
Information flow in nondeterministic systemsWittbold, J.T. / Johnson, D.M. et al. | 1990
- 162
-
Constructively using noninterference to analyze systemsFine, T. et al. | 1990
- 170
-
Probabilistic interferenceGray, J.W. III et al. | 1990
- 180
-
Security models and information flowMcLean, J. et al. | 1990
- 190
-
Beyond the pale of MAC and DAC-defining new forms of access controlMcCollum, C.J. / Messing, J.R. / Notargiacomo, L. et al. | 1990
- 201
-
Some conundrums concerning separation of dutyNash, M.J. / Poland, K.R. et al. | 1990
- 210
-
The role of trust in protected mailBranstad, M. / Barker, W.C. / Cochrane, P. et al. | 1990
- 216
-
On the formal specification and verification of a multiparty session protocolCheng, P.C. / Gligor, V.D. et al. | 1990
- 234
-
Reasoning about belief in cryptographic protocolsGong, L. / Needham, R. / Yahalom, R. et al. | 1990
- 249
-
A security architecture and mechanism for data confidentiality in TCP/IP protocolsRamaswamy, R. et al. | 1990
- 262
-
The auditing facility for a VMM security kernelSeiden, K.F. / Melanson, J.P. et al. | 1990
- 278
-
Adaptive real-time anomaly detection using inductively generated sequential patternsTeng, H.S. / Chen, K. / Lu, S.C. et al. | 1990
- 285
-
Auditing the use of covert storage channels in secure systemsShieh, S.P.W. / Gligor, V.D. et al. | 1990
- 296
-
A network security monitorHeberlein, L.T. / Dias, G.V. / Levitt, K.N. / Mukherjee, B. / Wood, J. / Wolber, D. et al. | 1990
- 306
-
The deductive theory manager: a knowledge based system for formal verificationDi Vito, B. / Garvey, C. / Kwong, D. / Murray, A. / Solomon, J. / Wu, A. et al. | 1990
- 319
-
Formal construction of provably secure systems with CartesianaBrix, H. / Dietl, A. et al. | 1990
- 333
-
Verifying a hardware security architectureGuttman, J.D. / Ko, H.P. et al. | 1990
- 345
-
A hierarchical methodology for verifying microprogrammed microprocessorsWindley, P.J. et al. | 1990
- 360
-
Transaction processing in multilevel-secure databases using replicated architectureJajodia, S. / Kogan, B. et al. | 1990
- 369
-
Multiversion concurrency control for multilevel secure database systemsKeefe, T.F. / Tsai, W.T. et al. | 1990
- 384
-
Modeling security-relevant data semanticsSmith, G.W. et al. | 1990
- 394
-
Information privacy issues for the 1990sTurn, R. et al. | 1990