|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 39 occurrences of 33 keywords
|
|
|
Results
Found 30 publication records. Showing 30 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
82 | Jim Woodcock 0001, Susan Stepney, David Cooper, John A. Clark, Jeremy Jacob |
The certification of the Mondex electronic purse to ITSEC Level E6. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Formal Aspects Comput. ![In: Formal Aspects Comput. 20(1), pp. 5-19, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Electronic finance, Grand Challenge in Verified Software, ITSEC Level E6, Security, Verification, Refinement, Theorem proving, Smart cards, Certification, Correctness, Z notation, Grand challenges, Verified Software Repository, Mondex |
82 | Pierre Bieber |
Formal Techniques for an ITSEC-E4 Secure Gateway. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 12th Annual Computer Security Applications Conference (ACSAC 1996), 9-13 December 1996, San Diego, CA, USA, pp. 236-245, 1996, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
ITSEC-E4 secure gateway, interactive theorem prover, Information Technology Security Evaluation Criteria, formal specification, security policy, security architecture, formal technique, functional specifications |
49 | Kai Rannenberg, Giovanni Iachello |
Protection Profiles for Remailer Mixes -Do the New Evaluation Criteria Help? ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 16th Annual Computer Security Applications Conference (ACSAC 2000), 11-15 December 2000, New Orleans, Louisiana, USA, pp. 107-, 2000, IEEE Computer Society, 0-7695-0859-6. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
protection profiles, remailer mixes, IT security evaluation criteria, privacy-related requirements, remailer mix networks, unobservable message transfer, ISO-ECITS, TCSEC, ITSEC, information technology, information technology, certification, privacy protection, electronic mail, data privacy, CC, evaluation criteria, user anonymity |
49 | C. Cant, Simon R. Wiseman |
Simple Assured Bastion Hosts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 13th Annual Computer Security Applications Conference (ACSAC 1997), 8-12 December 1997, San Diego, CA, USA, pp. 24-33, 1997, IEEE Computer Society, 0-8186-8274-4. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
assured firewalls, compartmented mode workstation, ITSEC E3 assurance, evaluation effort reuse, bastion host architecture, unevaluated proxies, information exporting, trusted path export sanction, evaluated release checker, authorisation |
32 | Zhili Chen, Liusheng Huang, Lin Chen 0002 |
ITSEC: An information-theoretically secure framework for truthful spectrum auctions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INFOCOM ![In: 2015 IEEE Conference on Computer Communications, INFOCOM 2015, Kowloon, Hong Kong, April 26 - May 1, 2015, pp. 2065-2073, 2015, IEEE, 978-1-4799-8381-0. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
32 | Thomas Fuchß, Lothar Fritsch |
Erfahrungen mit der ITSEC E4/hoch-Zertifizierung - Ist bewiesene Sicherheit bezahlbar? Erfahrungsbericht eines Softwarehauses. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Datenschutz und Datensicherheit ![In: Datenschutz und Datensicherheit 24(10), 2000. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP BibTeX RDF |
|
32 | Ian Uttridge, Gualtiero Bazzana, Massimo Giunchi, Gemma Deler, Stéphane Geyres, Josef Heiler |
Evaluation of the security of distributed IT systems through ITSEC/ITSEM: experiences and findings. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEC ![In: Information Systems Security, Facing the information society of the 21st Century, pp. 405-416, 1996, Chapman & Hall, 0-412-78120-4. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP BibTeX RDF |
|
32 | Wayne Madsen |
International ITSEC Standards: INTEL Isn't Inside. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Secur. J. A Glob. Perspect. ![In: Inf. Secur. J. A Glob. Perspect. 3(3), pp. 11-15, 1994. The full citation details ...](Pics/full.jpeg) |
1994 |
DBLP DOI BibTeX RDF |
|
32 | Stewart Kowalski |
Historical Labels in Open Distributed Systems: An ITSEC/ECMA Specification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEC ![In: Computer Security, Proceedings of the IFIP TC11, Ninth International Conference on Information Security, IFIP/Sec '93, Toronto, Canada, 12-14 May 1993, pp. 207-226, 1993, North-Holland, 0-444-81748-4. The full citation details ...](Pics/full.jpeg) |
1993 |
DBLP BibTeX RDF |
|
32 | Jan Peleska 0001 |
Formale Spezifikation generischer ITSEC-Funktionalitätsklassen. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GI Jahrestagung ![In: Informatik - Wirtschaft - Gesellschaft, 23. Gi-Jahrestagung, Dresden, Germany, 27. September - 1. Oktober 1993, pp. 354-364, 1993, Springer, 3-540-57192-2. The full citation details ...](Pics/full.jpeg) |
1993 |
DBLP DOI BibTeX RDF |
|
32 | Fritz Krückeberg |
Stellungnahme zu den Kriterien für die Berwertung der Sicherheit von Systemen der Informationstechnik (ITSEC) Version 1.2 (Präsidiumsarbeitskreis Datenschutz und Datensicherung der Gesellschaft für Informatik). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inform. Spektrum ![In: Inform. Spektrum 15(4), pp. 221-224, 1992. The full citation details ...](Pics/full.jpeg) |
1992 |
DBLP BibTeX RDF |
|
32 | William J. Caelli, Anthony W. Rhodes, Nick C. Russell |
An evaluation of HP-UX (UNIX) for database protection using the European ITSEC. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Secur. ![In: Comput. Secur. 11(5), pp. 463-479, 1992. The full citation details ...](Pics/full.jpeg) |
1992 |
DBLP DOI BibTeX RDF |
|
32 | John Robinson |
Computer security evaluation: Developments in the European ITSEC programme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Secur. ![In: Comput. Secur. 11(6), pp. 518-524, 1992. The full citation details ...](Pics/full.jpeg) |
1992 |
DBLP DOI BibTeX RDF |
|
32 | Michael Gehrke, Andreas Pfitzmann, Kai Rannenberg |
Information Technology Security Evaluation Criteria (ITSEC) - a Contribution to Vulnerability? ![Search on Bibsonomy](Pics/bibsonomy.png) |
IFIP Congress (2) ![In: Education and Society - Information Processing '92, Volume 2, Proceedings of the IFIP 12th World Computer Congress, Madrid, Spain, 7-11 September 1992, pp. 579-587, 1992, North-Holland, 0-444-89750-X. The full citation details ...](Pics/full.jpeg) |
1992 |
DBLP BibTeX RDF |
|
32 | Karl Rihaczek |
The harmonized ITSEC evaluation criteria. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Secur. ![In: Comput. Secur. 10(2), pp. 101-110, 1991. The full citation details ...](Pics/full.jpeg) |
1991 |
DBLP DOI BibTeX RDF |
|
20 | Nina Moebius, Dominik Haneberg, Wolfgang Reif, Gerhard Schellhorn |
A Modeling Framework for the Development of Provably Secure E-Commerce Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSEA ![In: Proceedings of the Second International Conference on Software Engineering Advances (ICSEA 2007), August 25-31, 2007, Cap Esterel, French Riviera, France, pp. 8, 2007, IEEE Computer Society, 0-7695-2937-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
20 | Richard Banach, Michael Poppleton, Czeslaw Jeske, Susan Stepney |
Retrenching the Purse: Hashing Injective CLEAR Codes, and Security Properties. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISoLA ![In: Leveraging Applications of Formal Methods, Second International Symposium, ISoLA 2006, Paphos, Cyprus, 15-19 November 2006, pp. 82-90, 2006, IEEE Computer Society, 978-0-7695-3071-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
20 | Richard Banach, Michael Poppleton, Susan Stepney |
Retrenching the Purse: Finite Exception Logs, and Validating the Small. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEW ![In: 30th Annual IEEE / NASA Software Engineering Workshop (SEW-30 2006), 25-28 April 2006, Loyola College Graduate Center, Columbia, MD, USA, pp. 234-248, 2006, IEEE Computer Society, 0-7695-2624-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
20 | Jung Youp Lee, Seok Won Jung, Jongin Lim 0001 |
Detecting Trapdoors in Smart Cards Using Timing and Power Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TestCom ![In: Testing of Communicating Systems, 17th IFIP TC6/WG 6.1 International Conference, TestCom 2005, Montreal, Canada, May 31 - June 2, 2005, Proceedings, pp. 275-288, 2005, Springer, 3-540-26054-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Trapdoor, Smart Card, Timing Analysis, Power Analysis |
20 | Richard Banach, Michael Poppleton, Czeslaw Jeske, Susan Stepney |
Retrenching the Purse: Finite Sequence Numbers, and the Tower Pattern. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FM ![In: FM 2005: Formal Methods, International Symposium of Formal Methods Europe, Newcastle, UK, July 18-22, 2005, Proceedings, pp. 382-398, 2005, Springer, 3-540-27882-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
20 | Seung-youn Lee, Myong-Chul Shin, Jae Sang Cha, Tai-Hoon Kim |
Threat Description for Developing Security Countermeasure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PCM (1) ![In: Advances in Multimedia Information Processing - PCM 2004, 5th Pacific Rim Conference on Multimedia, Tokyo, Japan, November 30 - December 3, 2004, Proceedings, Part I, pp. 548-555, 2004, Springer, 3-540-23974-X. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
20 | Tai-Hoon Kim, Byung-Gyu No, Dong Chun Lee |
Threat Description for the PP by Using the Concept of the Assets Protected by TOE. ![Search on Bibsonomy](Pics/bibsonomy.png) |
International Conference on Computational Science ![In: Computational Science - ICCS 2003, International Conference, Melbourne, Australia and St. Petersburg, Russia, June 2-4, 2003. Proceedings, Part IV, pp. 605-614, 2003, Springer, 3-540-40197-0. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
20 | Anthony Hall |
Correctness by Construction: Integrating Formality into a Commercial Development Process. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FME ![In: FME 2002: Formal Methods - Getting IT Right, International Symposium of Formal Methods Europe, Copenhagen, Denmark, July 22-24, 2002, Proceedings, pp. 224-233, 2002, Springer, 3-540-43928-5. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
20 | Pieter H. Hartel, Luc Moreau 0001 |
Formalizing the safety of Java, the Java virtual machine, and Java card. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Comput. Surv. ![In: ACM Comput. Surv. 33(4), pp. 517-558, 2001. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
programming, Common criteria |
20 | Volkmar Lotz, Volker Kessler, Georg Walter |
A Formal Security Model for Microprocessor Hardware. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Software Eng. ![In: IEEE Trans. Software Eng. 26(8), pp. 702-712, 2000. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
Security, hardware, formal security models |
20 | David Everett |
Zzzzzzzzzzzzzzzzzzzzzzzzzz. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ZB ![In: ZB 2000: Formal Specification and Development in Z and B, First International Conference of B and Z Users, York, UK, August 29 - September 2, 2000, Proceedings, pp. 450, 2000, Springer, 3-540-67944-8. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
20 | Pierre Bieber |
Security Function Interactions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSFW ![In: Proceedings of the 12th IEEE Computer Security Foundations Workshop, CSFW 1999, Mordano, Italy, June 28-30, 1999, pp. 151-160, 1999, IEEE Computer Society, 0-7695-0201-6. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
Access Control, Formal methods, Computer security |
20 | Volkmar Lotz, Volker Kessler, Georg Walter |
A Formal Security Model for Microprocessor Hardware. ![Search on Bibsonomy](Pics/bibsonomy.png) |
World Congress on Formal Methods ![In: FM'99 - Formal Methods, World Congress on Formal Methods in the Development of Computing Systems, Toulouse, France, September 20-24, 1999, Proceedings, Volume I, pp. 718-737, 1999, Springer, 3-540-66587-0. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
security, hardware, formal security models |
20 | Horst H. Henn |
Reliable and Secure Operation of Smart Cards. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EDCC ![In: Dependable Computing - EDCC-3, Third European Dependable Computing Conference, Prague, Czech Republic, September 15-17, 1999, Proceedings, pp. 3-6, 1999, Springer, 3-540-66483-1. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
20 | Alison Anderson, Dennis Longley, Lam-for Kwok |
Security Modelling for Organisations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: CCS '94, Proceedings of the 2nd ACM Conference on Computer and Communications Security, Fairfax, Virginia, USA, November 2-4, 1994., pp. 241-250, 1994, ACM, 0-89791-732-4. The full citation details ...](Pics/full.jpeg) |
1994 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #30 of 30 (100 per page; Change: )
|
|