skip to main content
10.5555/283849acmconferencesBook PagePublication PagesnspwConference Proceedingsconference-collections
NSPW '94: Proceedings of the 1994 workshop on New security paradigms
1994 Proceeding
Publisher:
  • IEEE Computer Society Press
  • Washington
  • DC
  • United States
Conference:
Little Compton Rhode Island USA
ISBN:
978-0-8186-6335-2
Published:
03 August 1994
Sponsors:

Bibliometrics
Abstract

No abstract available.

Skip Table Of Content Section
Article
Free
Modeling the “multipolicy machine”
pp 2–9

A method of treating several unspecified policies is presented. Precise notions of policy combination, policy conflict, conflict resolution, and policy precedence are introduced. Necessary and sufficient conditions for policies to be combined without ...

Article
Free
Messages, communication, information security and value
pp 10–19

This paper addresses the problem of analysing an information system for security flaws or vulnerabilities in a way that is analogous to the analysis of a safety-critical system. In particular, instead of adopting the approach that security is a property ...

Article
Free
New email security infrastructure
pp 20–27

This paper addresses the problem of analysing an information system for security flaws or vulnerabilities in a way that is analogous to the analysis of a safety-critical system. In particular, instead of adopting the approach that security is a property ...

Article
Free
“HIS-Treck -- the next generation”: an introduction to future hospital information systems
pp 28–31

The shift by health care organizations to integrated care with an outpatient emphasis requires the development of a new generation of multifaceted electronic medical record systems to coordinate these services. This paper introduces the context of ...

Article
Free
Healthcare information architecture: elements of a new paradigm
pp 32–41

An Electronic Medical Record (EMR) must provide a secure, permanent archive for an individual's medical records and also function as a multi-purpose database that supports the complex, varied activities of patient care. Meeting these objectives requires ...

Article
Free
Anomaly detection: a soft computing approach
pp 44–53

Computer are finite discrete machines, the set of real numbers is an infinite continuum. So real numbers in computers are approximation. Rough set theory is the underlying mathematics. A “computer” version of Weistrass theorem states that every sequence,...

Article
Free
Fuzzy sets and secure computer systems
pp 54–62

Computer are finite discrete machines, the set of real numbers is an infinite continuum. So real numbers in computers are approximation. Rough set theory is the underlying mathematics. A “computer” version of Weistrass theorem states that every sequence,...

Article
Free
Formal semantics of confidentiality in multilevel logic databases
pp 64–73

This paper presents a new formal approach to the definition of confidentiality in multilevel logic databases. We regard a multilevel secure database as an extension of an open database which preserves the database-semantics. We give four definitions of ...

Article
Free
What is a secret—and—what does that have to do with computer security?
pp 74–79

This paper questions some of the basic assumptions of computer security in the context of keeping secrets, and it finds some major discrepancies. It then proposes a new paradigm for functional security in computer systems.

The first conclusion of the ...

Article
Free
A new approach to security system development
pp 82–88

The development of a security system is generally performed through a multiphase methodology, starting from the initial preliminary analisys of the application environment, up to the physical implementation of the security mechanisms. In this framework, ...

Article
Free
Providing non-hierarchical security through interface mechanisms
pp 89–95

Common security models provide protection in an hierarchical fashion (i.e. there is a trusted core with outer circles of less secure code and data). There is only one method of providing protection. This model makes it difficult to protect code and data ...

Article
Free
Designing encryption algorithms for real people
pp 98–101

There is a wide disparity between cryptographic algorithms as specified by researchers and cryptographic algorithms as implemented in software applications. Programmers are prone to implement poor key management, make mistakes coding the algorithm, and ...

Article
Free
A discretionary access control model with temporal authorizations
pp 102–107

Conventional authorization models enforcing discretionary policies are based on authorizations which specify, for each user or group of users in the system, the accesses he is allowed to execute on objects. We propose a new authorization model which ...

Article
Free
Versatile integrity and security environment (VISE) for computer systems
pp 109–118

We have developed a model of security and integrity for computer systems, the Versatile Integrity and Security Environment (VISE), which describes the basic functionality of these systems and which addresses data confidentiality and correctness of ...

Contributors
  • University of St Andrews

Recommendations

Acceptance Rates

Overall Acceptance Rate62of170submissions,36%
YearSubmittedAcceptedRate
NSPW '18311135%
NSPW '14321134%
NSPW '13321134%
NSPW '02401435%
NSPW '00351543%
Overall1706236%