Dorothy E. Denning
Timestamps in key distribution protocols
The distribution of keys in a computer network using single key or public key encryption is discussed. We consider the possibility that communication keys may be…
Secure personal computing in an insecure network
A method for implementing secure personal computing in a network with one or more central facilities is proposed. The method employs a public-key encryption device and…
Certification of programs for secure information flow
ertification mechanism for verifying the secure flow of information through a program. Because it exploits the properties of a lattice structure among security classes,…
A lattice model of secure information flow
This paper investigates mechanisms that guarantee secure information flow in a computer system. These mechanisms are examined within a mathematical framework suitable for…
Shape the Future of Computing
ACM encourages its members to take a direct hand in shaping the future of the association. There are more ways than ever to get involved.
Get Involved