Security and Privacy Volume 2: Proceedings of the 6th, 7th, & 8th Symposia (1985-1987)
Organization
The Institute of Electrical and Electronics Engineers, Inc (IEEE)
Publisher
IEEE Computer Society Press
Publication Date
1900-01-01
Contents
* Verification Methods
* Verification Tools
* Network Policies
* DoD trusted Computer Systems Evaluation Criteria
* Applications of Cryptography
* Cryptographic Algorithms
* Database Security
* Operating Systems Mechanisms
* Secure Policies I
* Security Policies II
Location
A hard-copy of this is in the CERIAS Library