LEADER 01653oam 2200409zu 450 001 996211250303316 005 20210807003402.0 035 $a(CKB)111055184259914 035 $a(SSID)ssj0000435138 035 $a(PQKBManifestationID)12183466 035 $a(PQKBTitleCode)TC0000435138 035 $a(PQKBWorkID)10420983 035 $a(PQKB)10814540 035 $a(NjHacI)99111055184259914 035 $a(EXLCZ)99111055184259914 100 $a20160829d1991 uy 101 0 $aeng 135 $aur||||||||||| 181 $ctxt 182 $cc 183 $acr 200 00$aSecurity and Privacy: Research in `91 Symposium 210 31$a[Place of publication not identified]$cIEEE Computer Society Press$d1991 215 $a1 online resource 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a0-8186-2168-0 330 $aProceedings of the 1991 IEEE Computer Society Symposium on [title], held in Oakland, California, May 1991. Focusing on both theoretical and practical research in computer security, the subjects addressed include covert channels, security models, distributed systems, protocol verification, policy, authentication, information theory, database security, and intrusion detection. No index. Acidic paper. Annotation copyrighted by Book News, Inc., Portland, OR. 606 $aComputer Security 606 $aComputer security$vCongresses 615 0$aComputer Security. 615 0$aComputer security 676 $a005.8 801 0$bPQKB 906 $aBOOK 912 $a996211250303316 996 $aSecurity and Privacy: Research in `91 Symposium$92377296 997 $aUNISA