|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 39 occurrences of 33 keywords
|
|
|
Results
Found 30 publication records. Showing 30 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
82 | Jim Woodcock 0001, Susan Stepney, David Cooper, John A. Clark, Jeremy Jacob |
The certification of the Mondex electronic purse to ITSEC Level E6. |
Formal Aspects Comput. |
2008 |
DBLP DOI BibTeX RDF |
Electronic finance, Grand Challenge in Verified Software, ITSEC Level E6, Security, Verification, Refinement, Theorem proving, Smart cards, Certification, Correctness, Z notation, Grand challenges, Verified Software Repository, Mondex |
82 | Pierre Bieber |
Formal Techniques for an ITSEC-E4 Secure Gateway. |
ACSAC |
1996 |
DBLP DOI BibTeX RDF |
ITSEC-E4 secure gateway, interactive theorem prover, Information Technology Security Evaluation Criteria, formal specification, security policy, security architecture, formal technique, functional specifications |
49 | Kai Rannenberg, Giovanni Iachello |
Protection Profiles for Remailer Mixes -Do the New Evaluation Criteria Help? |
ACSAC |
2000 |
DBLP DOI BibTeX RDF |
protection profiles, remailer mixes, IT security evaluation criteria, privacy-related requirements, remailer mix networks, unobservable message transfer, ISO-ECITS, TCSEC, ITSEC, information technology, information technology, certification, privacy protection, electronic mail, data privacy, CC, evaluation criteria, user anonymity |
49 | C. Cant, Simon R. Wiseman |
Simple Assured Bastion Hosts. |
ACSAC |
1997 |
DBLP DOI BibTeX RDF |
assured firewalls, compartmented mode workstation, ITSEC E3 assurance, evaluation effort reuse, bastion host architecture, unevaluated proxies, information exporting, trusted path export sanction, evaluated release checker, authorisation |
32 | Zhili Chen, Liusheng Huang, Lin Chen 0002 |
ITSEC: An information-theoretically secure framework for truthful spectrum auctions. |
INFOCOM |
2015 |
DBLP DOI BibTeX RDF |
|
32 | Thomas Fuchß, Lothar Fritsch |
Erfahrungen mit der ITSEC E4/hoch-Zertifizierung - Ist bewiesene Sicherheit bezahlbar? Erfahrungsbericht eines Softwarehauses. |
Datenschutz und Datensicherheit |
2000 |
DBLP BibTeX RDF |
|
32 | Ian Uttridge, Gualtiero Bazzana, Massimo Giunchi, Gemma Deler, Stéphane Geyres, Josef Heiler |
Evaluation of the security of distributed IT systems through ITSEC/ITSEM: experiences and findings. |
SEC |
1996 |
DBLP BibTeX RDF |
|
32 | Wayne Madsen |
International ITSEC Standards: INTEL Isn't Inside. |
Inf. Secur. J. A Glob. Perspect. |
1994 |
DBLP DOI BibTeX RDF |
|
32 | Stewart Kowalski |
Historical Labels in Open Distributed Systems: An ITSEC/ECMA Specification. |
SEC |
1993 |
DBLP BibTeX RDF |
|
32 | Jan Peleska 0001 |
Formale Spezifikation generischer ITSEC-Funktionalitätsklassen. |
GI Jahrestagung |
1993 |
DBLP DOI BibTeX RDF |
|
32 | Fritz Krückeberg |
Stellungnahme zu den Kriterien für die Berwertung der Sicherheit von Systemen der Informationstechnik (ITSEC) Version 1.2 (Präsidiumsarbeitskreis Datenschutz und Datensicherung der Gesellschaft für Informatik). |
Inform. Spektrum |
1992 |
DBLP BibTeX RDF |
|
32 | William J. Caelli, Anthony W. Rhodes, Nick C. Russell |
An evaluation of HP-UX (UNIX) for database protection using the European ITSEC. |
Comput. Secur. |
1992 |
DBLP DOI BibTeX RDF |
|
32 | John Robinson |
Computer security evaluation: Developments in the European ITSEC programme. |
Comput. Secur. |
1992 |
DBLP DOI BibTeX RDF |
|
32 | Michael Gehrke, Andreas Pfitzmann, Kai Rannenberg |
Information Technology Security Evaluation Criteria (ITSEC) - a Contribution to Vulnerability? |
IFIP Congress (2) |
1992 |
DBLP BibTeX RDF |
|
32 | Karl Rihaczek |
The harmonized ITSEC evaluation criteria. |
Comput. Secur. |
1991 |
DBLP DOI BibTeX RDF |
|
20 | Nina Moebius, Dominik Haneberg, Wolfgang Reif, Gerhard Schellhorn |
A Modeling Framework for the Development of Provably Secure E-Commerce Applications. |
ICSEA |
2007 |
DBLP DOI BibTeX RDF |
|
20 | Richard Banach, Michael Poppleton, Czeslaw Jeske, Susan Stepney |
Retrenching the Purse: Hashing Injective CLEAR Codes, and Security Properties. |
ISoLA |
2006 |
DBLP DOI BibTeX RDF |
|
20 | Richard Banach, Michael Poppleton, Susan Stepney |
Retrenching the Purse: Finite Exception Logs, and Validating the Small. |
SEW |
2006 |
DBLP DOI BibTeX RDF |
|
20 | Jung Youp Lee, Seok Won Jung, Jongin Lim 0001 |
Detecting Trapdoors in Smart Cards Using Timing and Power Analysis. |
TestCom |
2005 |
DBLP DOI BibTeX RDF |
Trapdoor, Smart Card, Timing Analysis, Power Analysis |
20 | Richard Banach, Michael Poppleton, Czeslaw Jeske, Susan Stepney |
Retrenching the Purse: Finite Sequence Numbers, and the Tower Pattern. |
FM |
2005 |
DBLP DOI BibTeX RDF |
|
20 | Seung-youn Lee, Myong-Chul Shin, Jae Sang Cha, Tai-Hoon Kim |
Threat Description for Developing Security Countermeasure. |
PCM (1) |
2004 |
DBLP DOI BibTeX RDF |
|
20 | Tai-Hoon Kim, Byung-Gyu No, Dong Chun Lee |
Threat Description for the PP by Using the Concept of the Assets Protected by TOE. |
International Conference on Computational Science |
2003 |
DBLP DOI BibTeX RDF |
|
20 | Anthony Hall |
Correctness by Construction: Integrating Formality into a Commercial Development Process. |
FME |
2002 |
DBLP DOI BibTeX RDF |
|
20 | Pieter H. Hartel, Luc Moreau 0001 |
Formalizing the safety of Java, the Java virtual machine, and Java card. |
ACM Comput. Surv. |
2001 |
DBLP DOI BibTeX RDF |
programming, Common criteria |
20 | Volkmar Lotz, Volker Kessler, Georg Walter |
A Formal Security Model for Microprocessor Hardware. |
IEEE Trans. Software Eng. |
2000 |
DBLP DOI BibTeX RDF |
Security, hardware, formal security models |
20 | David Everett |
Zzzzzzzzzzzzzzzzzzzzzzzzzz. |
ZB |
2000 |
DBLP DOI BibTeX RDF |
|
20 | Pierre Bieber |
Security Function Interactions. |
CSFW |
1999 |
DBLP DOI BibTeX RDF |
Access Control, Formal methods, Computer security |
20 | Volkmar Lotz, Volker Kessler, Georg Walter |
A Formal Security Model for Microprocessor Hardware. |
World Congress on Formal Methods |
1999 |
DBLP DOI BibTeX RDF |
security, hardware, formal security models |
20 | Horst H. Henn |
Reliable and Secure Operation of Smart Cards. |
EDCC |
1999 |
DBLP DOI BibTeX RDF |
|
20 | Alison Anderson, Dennis Longley, Lam-for Kwok |
Security Modelling for Organisations. |
CCS |
1994 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #30 of 30 (100 per page; Change: )
|
|