The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for TCSEC with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1994-2008 (9)
Publication types (Num. hits)
article(1) inproceedings(8)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 9 occurrences of 9 keywords

Results
Found 9 publication records. Showing 9 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
70Marvin Schaefer If A1 is the Answer, What was the Question? An Edgy Na?f's Retrospective on Promulgating the Trusted Computer Systems Evaluation Criteria. Search on Bibsonomy ACSAC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
60Kai Rannenberg, Giovanni Iachello Protection Profiles for Remailer Mixes -Do the New Evaluation Criteria Help? Search on Bibsonomy ACSAC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF protection profiles, remailer mixes, IT security evaluation criteria, privacy-related requirements, remailer mix networks, unobservable message transfer, ISO-ECITS, TCSEC, ITSEC, information technology, information technology, certification, privacy protection, electronic mail, data privacy, CC, evaluation criteria, user anonymity
46Jeremy Epstein Editorial: a view of cryptography in TCSEC products. Search on Bibsonomy ACSAC The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
23Ninghui Li How to make Discretionary Access Control secure against trojan horses. Search on Bibsonomy IPDPS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
23Sukhoon Kang, Yong-Rak Choi A Covert Timing Channel-Free Optimistic Concurrency Control Scheme for Multilevel Secure Database Management Systems. Search on Bibsonomy KES (3) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
23Changda Wang 0001, Shiguang Ju The Dilemma of Covert Channels Searching. Search on Bibsonomy ICISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
23Jian Leng, DongQin Xie A Novel Approach to Kernel Construction of China Bridge CA. Search on Bibsonomy PRDC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
23Zhouyi Zhou, Bin Liang, Li Jiang, Wenchang Shi, Yeping He A Formal Description of SECIMOS Operating System. Search on Bibsonomy MMM-ACNS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
23Richard E. Smith Cost profile of a highly assured, secure operating system. Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 2001 DBLP  DOI  BibTeX  RDF LOCK (Logical Coprocessing Kernel), security kernels
Displaying result #1 - #9 of 9 (100 per page; Change: )
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license