1983 IEEE Symposium on Security and Privacy最新文献

筛选
英文 中文
Verification of Treaty Compliance -- Revisited 核查条约遵守情况——重访
1983 IEEE Symposium on Security and Privacy Pub Date : 1983-04-25 DOI: 10.1109/SP.1983.10016
G. J. Simmons
{"title":"Verification of Treaty Compliance -- Revisited","authors":"G. J. Simmons","doi":"10.1109/SP.1983.10016","DOIUrl":"https://doi.org/10.1109/SP.1983.10016","url":null,"abstract":"In a series of papers, the author has documented the evolution at the Sandia National Laboratories of a solution to the problem of how two mutually deceitful and distrusting parties -- the host and the monitor -- can both trust a data acquisition system whose function is to inform the monitor, and perhaps third parties, whether the host has or has not violated the terms of a treaty. The national interests of the various participants, host, monitor and third parties, at first appear to be mutually irreconcilable, however the conclusion of this paper will be that it is possible to simultaneously satisfy the interests of all parties. The technical device on which this fourth, and hopefully final, iteration of treaty verification systems is based is the concatenation of two or more two key cryptographic systems. In the resulting system no part of the rneasage need be kept secret from any participant at anytime; no party, nor collusion of fewer than all of the parties can utter an undetectable forgery; no unilateral action on the part of any party can lessen the confidence of the others as to the authenticity of the data and finally third parties can be logically persuaded of the authenticity of messages. Thus, finally after a decade of development a complete technical solution is in hand for the problem of the verification of treaty compliance.","PeriodicalId":236986,"journal":{"name":"1983 IEEE Symposium on Security and Privacy","volume":"148 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1983-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132696052","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
Processor-per-Domain Guard Architecture 每个域的处理器保护体系结构
1983 IEEE Symposium on Security and Privacy Pub Date : 1983-04-25 DOI: 10.1109/SP.1983.10006
T. Berson, R. Feiertag, R. K. Bauer
{"title":"Processor-per-Domain Guard Architecture","authors":"T. Berson, R. Feiertag, R. K. Bauer","doi":"10.1109/SP.1983.10006","DOIUrl":"https://doi.org/10.1109/SP.1983.10006","url":null,"abstract":"The motlvatlon, conception and design of a data filter operating In the security class.lflcatlon domain are described The filter architecture features dlstlnct dcmalns with a separate mlcrOprOcessor In each Isolatlon of the domains 1s accomplished exculslvely by hardware Sharing between the domains 1s con– trolled by trusted software This architecture facilitates verlflcatlon and prov]des flexlblllty, economy, and high throughput A prototgpe of the filter has been Implemented and applled to guarding channels connecting a multicompartmented database to lower level networks The protot~pe ’s operation is fully automatic It uses secret key dlg~tal signatures associated with each database record to authenticate classlflcatlon markings and data A filter security pollcy has been modelled and the prototype design and implementation have been shown Informally to comply. Future directions zn architecture, engineering, application and verification are discussed I20 CH1882-O/83/~/OIN$Ol.M@1983 IEEE","PeriodicalId":236986,"journal":{"name":"1983 IEEE Symposium on Security and Privacy","volume":"372 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1983-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133380910","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Security Enhancement through Product Evaluation 通过产品评估提高安全性
1983 IEEE Symposium on Security and Privacy Pub Date : 1983-04-25 DOI: 10.1109/SP.1983.10020
P. Woodie
{"title":"Security Enhancement through Product Evaluation","authors":"P. Woodie","doi":"10.1109/SP.1983.10020","DOIUrl":"https://doi.org/10.1109/SP.1983.10020","url":null,"abstract":"This paper describes a major goal of the DOD Computer Security Center, which is to encouraqe the easy availability of computer products with enhanced security features. The mechanisms by which this is to be accomplished are described. There are detailed explanations of the Preliminary and Final Product Evaluation processes. The paper then takes a pragmatic view, from three perspectives, of how the process is actually working. Finally, an update is included, which describes the present status of the evaluation efforts underway.","PeriodicalId":236986,"journal":{"name":"1983 IEEE Symposium on Security and Privacy","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1983-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125371803","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Using Views in a Multilevel Secure Database Management System 在多级安全数据库管理系统中使用视图
1983 IEEE Symposium on Security and Privacy Pub Date : 1983-04-25 DOI: 10.1109/SP.1983.10009
Billy G. Claybrook
{"title":"Using Views in a Multilevel Secure Database Management System","authors":"Billy G. Claybrook","doi":"10.1109/SP.1983.10009","DOIUrl":"https://doi.org/10.1109/SP.1983.10009","url":null,"abstract":"The use of database views in database management systems that enforce user level discretionary and nondiscretionary access control policies is discussed. This discussion involves several issues such as how should views be classified?, what types of mechanisms should be used to define views?, etc. Mapping between views, view updating, and aggregation and inference problems are also discussed.","PeriodicalId":236986,"journal":{"name":"1983 IEEE Symposium on Security and Privacy","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1983-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130193522","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Secure Computer Systems: A Retrospective 安全计算机系统:回顾
1983 IEEE Symposium on Security and Privacy Pub Date : 1983-04-25 DOI: 10.1109/SP.1983.10001
D. E. Bell
{"title":"Secure Computer Systems: A Retrospective","authors":"D. E. Bell","doi":"10.1109/SP.1983.10001","DOIUrl":"https://doi.org/10.1109/SP.1983.10001","url":null,"abstract":"Eight years after the completion of the \"Secure Computer Systems\" series, basic questions about that work are being raised. Is the model useful? Is it overly restrictive? Are further modeling efforts necessary to address current problems? This paper addresses those questions in a personal view of the development and the utility of the \"Secure Computer Systems\" security model.","PeriodicalId":236986,"journal":{"name":"1983 IEEE Symposium on Security and Privacy","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1983-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128409421","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Packet Switched Networks 分组交换网络
1983 IEEE Symposium on Security and Privacy Pub Date : 1983-04-25 DOI: 10.1109/SP.1983.10022
D. Barnes
{"title":"Packet Switched Networks","authors":"D. Barnes","doi":"10.1109/SP.1983.10022","DOIUrl":"https://doi.org/10.1109/SP.1983.10022","url":null,"abstract":"The trend towards common user packet switched networks has increased the need for the provision of adequate end-to-end security techniques in order to protect the data of individual groups of network users. The techniques which can be employed in order to provide adequate end-to-end security measures are considered in this paper frc,mamilitary perspective, where the security requirements are particularly stringent. The paper concludes with a consideration of the practical application of these security techniques in an experimental military packet switched network.","PeriodicalId":236986,"journal":{"name":"1983 IEEE Symposium on Security and Privacy","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1983-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121133046","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Fingerprinting 指纹识别
1983 IEEE Symposium on Security and Privacy Pub Date : 1900-01-01 DOI: 10.1109/SP.1983.10018
Neal R. Wagner
{"title":"Fingerprinting","authors":"Neal R. Wagner","doi":"10.1109/SP.1983.10018","DOIUrl":"https://doi.org/10.1109/SP.1983.10018","url":null,"abstract":"This paper presents a general discussion of the use of fingerprints, especially fingerprinted data, Fingerprinting is classified in four orthogonal ways, and some illustrative examples are given. The basis for a statistical analysis of altered fingerprints is presented, along with an example simulation. The possibility of more subtle fingerprints is discussed.","PeriodicalId":236986,"journal":{"name":"1983 IEEE Symposium on Security and Privacy","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130964258","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 100
General Chairman's Message 主席致辞
1983 IEEE Symposium on Security and Privacy Pub Date : 1900-01-01 DOI: 10.1109/milcom.1986.4805808
J. Runyan
{"title":"General Chairman's Message","authors":"J. Runyan","doi":"10.1109/milcom.1986.4805808","DOIUrl":"https://doi.org/10.1109/milcom.1986.4805808","url":null,"abstract":"Having been a part of all the previous symposia, I am happy to introduce this one. The Program Chairpersons Bob Blakely and Dorothy Denning have done a superb job in recruiting and cajoling the community to make possible a splendid program. Thanks to them and their program committee. Again Jim Runyan has done an outstanding job of organizing everything, and deserves our appreciation. All of these people have devoted considerable effort and time to jobs that are extremely valuable to the community at large.","PeriodicalId":236986,"journal":{"name":"1983 IEEE Symposium on Security and Privacy","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125204826","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Note on the Denial-of-Service Problem 关于拒绝服务问题的说明
1983 IEEE Symposium on Security and Privacy Pub Date : 1900-01-01 DOI: 10.1109/SP.1983.10004
V. Gligor
{"title":"A Note on the Denial-of-Service Problem","authors":"V. Gligor","doi":"10.1109/SP.1983.10004","DOIUrl":"https://doi.org/10.1109/SP.1983.10004","url":null,"abstract":"A simple and general definition of denial of service in operating systems is presented herein. It is argued that no current protection mechanism nor model resolves this problem in any demonstrable way. A set of examples from known systems is presented in order to delimit the scope of the problem. The notion of interuser dependency is introduced and identified as the common cause for all problem instances. Necessary end sufficient conditions for solutions are stated and justified informally. The relative complexity of undesirable (and unspecified) interuser dependencies is also discussed.","PeriodicalId":236986,"journal":{"name":"1983 IEEE Symposium on Security and Privacy","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134351217","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 86
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信