The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for ITSEC with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1991-1999 (15) 2000-2015 (15)
Publication types (Num. hits)
article(9) inproceedings(21)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 39 occurrences of 33 keywords

Results
Found 30 publication records. Showing 30 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
82Jim Woodcock 0001, Susan Stepney, David Cooper, John A. Clark, Jeremy Jacob The certification of the Mondex electronic purse to ITSEC Level E6. Search on Bibsonomy Formal Aspects Comput. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Electronic finance, Grand Challenge in Verified Software, ITSEC Level E6, Security, Verification, Refinement, Theorem proving, Smart cards, Certification, Correctness, Z notation, Grand challenges, Verified Software Repository, Mondex
82Pierre Bieber Formal Techniques for an ITSEC-E4 Secure Gateway. Search on Bibsonomy ACSAC The full citation details ... 1996 DBLP  DOI  BibTeX  RDF ITSEC-E4 secure gateway, interactive theorem prover, Information Technology Security Evaluation Criteria, formal specification, security policy, security architecture, formal technique, functional specifications
49Kai Rannenberg, Giovanni Iachello Protection Profiles for Remailer Mixes -Do the New Evaluation Criteria Help? Search on Bibsonomy ACSAC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF protection profiles, remailer mixes, IT security evaluation criteria, privacy-related requirements, remailer mix networks, unobservable message transfer, ISO-ECITS, TCSEC, ITSEC, information technology, information technology, certification, privacy protection, electronic mail, data privacy, CC, evaluation criteria, user anonymity
49C. Cant, Simon R. Wiseman Simple Assured Bastion Hosts. Search on Bibsonomy ACSAC The full citation details ... 1997 DBLP  DOI  BibTeX  RDF assured firewalls, compartmented mode workstation, ITSEC E3 assurance, evaluation effort reuse, bastion host architecture, unevaluated proxies, information exporting, trusted path export sanction, evaluated release checker, authorisation
32Zhili Chen, Liusheng Huang, Lin Chen 0002 ITSEC: An information-theoretically secure framework for truthful spectrum auctions. Search on Bibsonomy INFOCOM The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
32Thomas Fuchß, Lothar Fritsch Erfahrungen mit der ITSEC E4/hoch-Zertifizierung - Ist bewiesene Sicherheit bezahlbar? Erfahrungsbericht eines Softwarehauses. Search on Bibsonomy Datenschutz und Datensicherheit The full citation details ... 2000 DBLP  BibTeX  RDF
32Ian Uttridge, Gualtiero Bazzana, Massimo Giunchi, Gemma Deler, Stéphane Geyres, Josef Heiler Evaluation of the security of distributed IT systems through ITSEC/ITSEM: experiences and findings. Search on Bibsonomy SEC The full citation details ... 1996 DBLP  BibTeX  RDF
32Wayne Madsen International ITSEC Standards: INTEL Isn't Inside. Search on Bibsonomy Inf. Secur. J. A Glob. Perspect. The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
32Stewart Kowalski Historical Labels in Open Distributed Systems: An ITSEC/ECMA Specification. Search on Bibsonomy SEC The full citation details ... 1993 DBLP  BibTeX  RDF
32Jan Peleska 0001 Formale Spezifikation generischer ITSEC-Funktionalitätsklassen. Search on Bibsonomy GI Jahrestagung The full citation details ... 1993 DBLP  DOI  BibTeX  RDF
32Fritz Krückeberg Stellungnahme zu den Kriterien für die Berwertung der Sicherheit von Systemen der Informationstechnik (ITSEC) Version 1.2 (Präsidiumsarbeitskreis Datenschutz und Datensicherung der Gesellschaft für Informatik). Search on Bibsonomy Inform. Spektrum The full citation details ... 1992 DBLP  BibTeX  RDF
32William J. Caelli, Anthony W. Rhodes, Nick C. Russell An evaluation of HP-UX (UNIX) for database protection using the European ITSEC. Search on Bibsonomy Comput. Secur. The full citation details ... 1992 DBLP  DOI  BibTeX  RDF
32John Robinson Computer security evaluation: Developments in the European ITSEC programme. Search on Bibsonomy Comput. Secur. The full citation details ... 1992 DBLP  DOI  BibTeX  RDF
32Michael Gehrke, Andreas Pfitzmann, Kai Rannenberg Information Technology Security Evaluation Criteria (ITSEC) - a Contribution to Vulnerability? Search on Bibsonomy IFIP Congress (2) The full citation details ... 1992 DBLP  BibTeX  RDF
32Karl Rihaczek The harmonized ITSEC evaluation criteria. Search on Bibsonomy Comput. Secur. The full citation details ... 1991 DBLP  DOI  BibTeX  RDF
20Nina Moebius, Dominik Haneberg, Wolfgang Reif, Gerhard Schellhorn A Modeling Framework for the Development of Provably Secure E-Commerce Applications. Search on Bibsonomy ICSEA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
20Richard Banach, Michael Poppleton, Czeslaw Jeske, Susan Stepney Retrenching the Purse: Hashing Injective CLEAR Codes, and Security Properties. Search on Bibsonomy ISoLA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
20Richard Banach, Michael Poppleton, Susan Stepney Retrenching the Purse: Finite Exception Logs, and Validating the Small. Search on Bibsonomy SEW The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
20Jung Youp Lee, Seok Won Jung, Jongin Lim 0001 Detecting Trapdoors in Smart Cards Using Timing and Power Analysis. Search on Bibsonomy TestCom The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Trapdoor, Smart Card, Timing Analysis, Power Analysis
20Richard Banach, Michael Poppleton, Czeslaw Jeske, Susan Stepney Retrenching the Purse: Finite Sequence Numbers, and the Tower Pattern. Search on Bibsonomy FM The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
20Seung-youn Lee, Myong-Chul Shin, Jae Sang Cha, Tai-Hoon Kim Threat Description for Developing Security Countermeasure. Search on Bibsonomy PCM (1) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
20Tai-Hoon Kim, Byung-Gyu No, Dong Chun Lee Threat Description for the PP by Using the Concept of the Assets Protected by TOE. Search on Bibsonomy International Conference on Computational Science The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
20Anthony Hall Correctness by Construction: Integrating Formality into a Commercial Development Process. Search on Bibsonomy FME The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
20Pieter H. Hartel, Luc Moreau 0001 Formalizing the safety of Java, the Java virtual machine, and Java card. Search on Bibsonomy ACM Comput. Surv. The full citation details ... 2001 DBLP  DOI  BibTeX  RDF programming, Common criteria
20Volkmar Lotz, Volker Kessler, Georg Walter A Formal Security Model for Microprocessor Hardware. Search on Bibsonomy IEEE Trans. Software Eng. The full citation details ... 2000 DBLP  DOI  BibTeX  RDF Security, hardware, formal security models
20David Everett Zzzzzzzzzzzzzzzzzzzzzzzzzz. Search on Bibsonomy ZB The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
20Pierre Bieber Security Function Interactions. Search on Bibsonomy CSFW The full citation details ... 1999 DBLP  DOI  BibTeX  RDF Access Control, Formal methods, Computer security
20Volkmar Lotz, Volker Kessler, Georg Walter A Formal Security Model for Microprocessor Hardware. Search on Bibsonomy World Congress on Formal Methods The full citation details ... 1999 DBLP  DOI  BibTeX  RDF security, hardware, formal security models
20Horst H. Henn Reliable and Secure Operation of Smart Cards. Search on Bibsonomy EDCC The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
20Alison Anderson, Dennis Longley, Lam-for Kwok Security Modelling for Organisations. Search on Bibsonomy CCS The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #30 of 30 (100 per page; Change: )
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license