Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Nora Boulahia-Cuppens, Frédéric Cuppens, Alban Gabillon, Kioumars Yazdanian |
MultiView model for object-oriented database. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Ninth Annual Computer Security Applications Conference, ACSAC 1993, 6-10 Decemver, 1993, Orlando, Florida, USA, pp. 222-231, 1993, IEEE. The full citation details ...](Pics/full.jpeg) |
1993 |
DBLP DOI BibTeX RDF |
|
1 | Brian Tretick |
Operational requirements for multilevel security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Ninth Annual Computer Security Applications Conference, ACSAC 1993, 6-10 Decemver, 1993, Orlando, Florida, USA, pp. 30-35, 1993, IEEE. The full citation details ...](Pics/full.jpeg) |
1993 |
DBLP DOI BibTeX RDF |
|
1 | Eugen M. Bacic, A. Robison |
The rationale behind the Canadian criteria. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Ninth Annual Computer Security Applications Conference, ACSAC 1993, 6-10 Decemver, 1993, Orlando, Florida, USA, pp. 170-179, 1993, IEEE. The full citation details ...](Pics/full.jpeg) |
1993 |
DBLP DOI BibTeX RDF |
|
1 | Günther Pernul, Werner Winiwarter, A Min Tjoa |
The deductive filter approach to MLS database prototyping. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Ninth Annual Computer Security Applications Conference, ACSAC 1993, 6-10 Decemver, 1993, Orlando, Florida, USA, pp. 244-253, 1993, IEEE. The full citation details ...](Pics/full.jpeg) |
1993 |
DBLP DOI BibTeX RDF |
|
1 | Balaji R. Venkatraman, Richard E. Newman-Wolfe |
Transmission schedules to prevent traffic analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Ninth Annual Computer Security Applications Conference, ACSAC 1993, 6-10 Decemver, 1993, Orlando, Florida, USA, pp. 108-115, 1993, IEEE. The full citation details ...](Pics/full.jpeg) |
1993 |
DBLP DOI BibTeX RDF |
|
1 | Qi Shi 0001, John A. McDermid, Jonathan D. Moffett |
Applying noninterference to composition of systems: a more practical approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Ninth Annual Computer Security Applications Conference, ACSAC 1993, 6-10 Decemver, 1993, Orlando, Florida, USA, pp. 210-220, 1993, IEEE. The full citation details ...](Pics/full.jpeg) |
1993 |
DBLP DOI BibTeX RDF |
|
1 | Deborah J. Bodeau, Frederick N. Chase |
Modeling constructs for describing a complex system-of-systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Ninth Annual Computer Security Applications Conference, ACSAC 1993, 6-10 Decemver, 1993, Orlando, Florida, USA, pp. 140-148, 1993, IEEE. The full citation details ...](Pics/full.jpeg) |
1993 |
DBLP DOI BibTeX RDF |
|
1 | W. A. Jansen |
A second look at the SDNS key management protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Ninth Annual Computer Security Applications Conference, ACSAC 1993, 6-10 Decemver, 1993, Orlando, Florida, USA, pp. 74-81, 1993, IEEE. The full citation details ...](Pics/full.jpeg) |
1993 |
DBLP DOI BibTeX RDF |
|
1 | Richard E. Smith |
MLS file service for network data sharing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Ninth Annual Computer Security Applications Conference, ACSAC 1993, 6-10 Decemver, 1993, Orlando, Florida, USA, pp. 94-99, 1993, IEEE. The full citation details ...](Pics/full.jpeg) |
1993 |
DBLP DOI BibTeX RDF |
|
1 | Phillip A. Porras, Richard A. Kemmerer |
Penetration state transition analysis: A rule-based intrusion detection approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Eighth Annual Computer Security Applications Conference, ACSAC 1992, November 30 - December 4, 1992, San Antonio, Texas, USA, pp. 220-229, 1992, IEEE. The full citation details ...](Pics/full.jpeg) |
1992 |
DBLP DOI BibTeX RDF |
|
1 | Deborah J. Bodeau, Nancy R. Brusil, Irene N. Chang, Mary Jo Reece |
Security test and evaluation for multilevel-mode accreditation: Lessons learned. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Eighth Annual Computer Security Applications Conference, ACSAC 1992, November 30 - December 4, 1992, San Antonio, Texas, USA, pp. 37-45, 1992, IEEE. The full citation details ...](Pics/full.jpeg) |
1992 |
DBLP DOI BibTeX RDF |
|
1 | |
Eighth Annual Computer Security Applications Conference, ACSAC 1992, November 30 - December 4, 1992, San Antonio, Texas, USA ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![IEEE The full citation details ...](Pics/full.jpeg) |
1992 |
DBLP BibTeX RDF |
|
1 | Sandeep Kumar, Eugene H. Spafford |
A generic virus scanner for C++. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Eighth Annual Computer Security Applications Conference, ACSAC 1992, November 30 - December 4, 1992, San Antonio, Texas, USA, pp. 210-219, 1992, IEEE. The full citation details ...](Pics/full.jpeg) |
1992 |
DBLP DOI BibTeX RDF |
|
1 | Richard E. Newman-Wolfe, Balaji R. Venkatraman |
Performance analysis of a method for high level prevention of traffic analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Eighth Annual Computer Security Applications Conference, ACSAC 1992, November 30 - December 4, 1992, San Antonio, Texas, USA, pp. 123-130, 1992, IEEE. The full citation details ...](Pics/full.jpeg) |
1992 |
DBLP DOI BibTeX RDF |
|
1 | Michael V. Joyce |
Access control and applications on trusted systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Eighth Annual Computer Security Applications Conference, ACSAC 1992, November 30 - December 4, 1992, San Antonio, Texas, USA, pp. 160-167, 1992, IEEE. The full citation details ...](Pics/full.jpeg) |
1992 |
DBLP DOI BibTeX RDF |
|
1 | Charles W. Kurak Jr., John McHugh |
A cautionary note on image downgrading. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Eighth Annual Computer Security Applications Conference, ACSAC 1992, November 30 - December 4, 1992, San Antonio, Texas, USA, pp. 153-159, 1992, IEEE. The full citation details ...](Pics/full.jpeg) |
1992 |
DBLP DOI BibTeX RDF |
|
1 | Ricki Andrew Vick |
An overview of the AMC WWMCCS CAT Guard. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Eighth Annual Computer Security Applications Conference, ACSAC 1992, November 30 - December 4, 1992, San Antonio, Texas, USA, pp. 46-54, 1992, IEEE. The full citation details ...](Pics/full.jpeg) |
1992 |
DBLP DOI BibTeX RDF |
|
1 | Sharon R. Lewis, Simon R. Wiseman, Neil D. Poulter |
Providing security in a phone book database using triggers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Eighth Annual Computer Security Applications Conference, ACSAC 1992, November 30 - December 4, 1992, San Antonio, Texas, USA, pp. 85-96, 1992, IEEE. The full citation details ...](Pics/full.jpeg) |
1992 |
DBLP DOI BibTeX RDF |
|
1 | Semyon Dukach |
SNPP: A simple network payment protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Eighth Annual Computer Security Applications Conference, ACSAC 1992, November 30 - December 4, 1992, San Antonio, Texas, USA, pp. 173-179, 1992, IEEE. The full citation details ...](Pics/full.jpeg) |
1992 |
DBLP DOI BibTeX RDF |
|
1 | Paul Ammann, Ravi S. Sandhu |
Implementing transaction control expressions by checking for absence of access rights. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Eighth Annual Computer Security Applications Conference, ACSAC 1992, November 30 - December 4, 1992, San Antonio, Texas, USA, pp. 131-140, 1992, IEEE. The full citation details ...](Pics/full.jpeg) |
1992 |
DBLP DOI BibTeX RDF |
|
1 | W. Douglas Maughan |
Standards for computer systems security: An interoperability analysis of SDNS SP3 and ISO NLSP. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Eighth Annual Computer Security Applications Conference, ACSAC 1992, November 30 - December 4, 1992, San Antonio, Texas, USA, pp. 193-201, 1992, IEEE. The full citation details ...](Pics/full.jpeg) |
1992 |
DBLP DOI BibTeX RDF |
|
1 | Christine Arangio, Tom Chen, Steve Neidhardt |
Security Products (Security Pro) Transition Analysis Facility (STAF): Pragmatic concepts for MLS technology transition. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Eighth Annual Computer Security Applications Conference, ACSAC 1992, November 30 - December 4, 1992, San Antonio, Texas, USA, pp. 20-27, 1992, IEEE. The full citation details ...](Pics/full.jpeg) |
1992 |
DBLP DOI BibTeX RDF |
|
1 | Günther Pernul |
Security constraint processing during multilevel secure database design. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Eighth Annual Computer Security Applications Conference, ACSAC 1992, November 30 - December 4, 1992, San Antonio, Texas, USA, pp. 75-84, 1992, IEEE. The full citation details ...](Pics/full.jpeg) |
1992 |
DBLP DOI BibTeX RDF |
|
1 | Deborah J. Bodeau |
A conceptual model for computer security risk analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Eighth Annual Computer Security Applications Conference, ACSAC 1992, November 30 - December 4, 1992, San Antonio, Texas, USA, pp. 56-63, 1992, IEEE. The full citation details ...](Pics/full.jpeg) |
1992 |
DBLP DOI BibTeX RDF |
|
1 | Peter A. Loscocco, William R. Kutz, Dale M. Johnson, Ronald J. Watro |
Dealing with the dynamics of security: Flexibility with utility in an MLS LAN. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Eighth Annual Computer Security Applications Conference, ACSAC 1992, November 30 - December 4, 1992, San Antonio, Texas, USA, pp. 180-192, 1992, IEEE. The full citation details ...](Pics/full.jpeg) |
1992 |
DBLP DOI BibTeX RDF |
|
1 | Amy Wu, Eric R. Anderson 0001, Cristi Garvey |
Secure system architectures and integration. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Eighth Annual Computer Security Applications Conference, ACSAC 1992, November 30 - December 4, 1992, San Antonio, Texas, USA, pp. 2-9, 1992, IEEE. The full citation details ...](Pics/full.jpeg) |
1992 |
DBLP DOI BibTeX RDF |
|
1 | James O. Bondi |
Trustable computing in next-generation avionic architectures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Eighth Annual Computer Security Applications Conference, ACSAC 1992, November 30 - December 4, 1992, San Antonio, Texas, USA, pp. 10-19, 1992, IEEE. The full citation details ...](Pics/full.jpeg) |
1992 |
DBLP DOI BibTeX RDF |
|
1 | C. J. Testa, B. D. Wilner, Virgil D. Gligor |
Trusted RUBIX architecture and policy model interpretation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Eighth Annual Computer Security Applications Conference, ACSAC 1992, November 30 - December 4, 1992, San Antonio, Texas, USA, pp. 97-110, 1992, IEEE. The full citation details ...](Pics/full.jpeg) |
1992 |
DBLP DOI BibTeX RDF |
|
1 | S. P. Bennett, Muninder P. Kailay |
An application of qualitative risk analysis to computer security for the commercial sector. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Eighth Annual Computer Security Applications Conference, ACSAC 1992, November 30 - December 4, 1992, San Antonio, Texas, USA, pp. 64-73, 1992, IEEE. The full citation details ...](Pics/full.jpeg) |
1992 |
DBLP DOI BibTeX RDF |
|
1 | John A. McDermid, Qi Shi 0001 |
Secure composition of systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Eighth Annual Computer Security Applications Conference, ACSAC 1992, November 30 - December 4, 1992, San Antonio, Texas, USA, pp. 112-122, 1992, IEEE. The full citation details ...](Pics/full.jpeg) |
1992 |
DBLP DOI BibTeX RDF |
|
1 | James P. Anderson |
Computer security myths mythtakes or 'The real security problem is...'. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Eighth Annual Computer Security Applications Conference, ACSAC 1992, November 30 - December 4, 1992, San Antonio, Texas, USA, 1992, IEEE. The full citation details ...](Pics/full.jpeg) |
1992 |
DBLP DOI BibTeX RDF |
|
1 | Jeffrey Picciotto, Jeremy Epstein |
A comparison of trusted X security policies, architectures, and interoperability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Eighth Annual Computer Security Applications Conference, ACSAC 1992, November 30 - December 4, 1992, San Antonio, Texas, USA, pp. 142-152, 1992, IEEE. The full citation details ...](Pics/full.jpeg) |
1992 |
DBLP DOI BibTeX RDF |
|
1 | William Brierley |
Integrating cryptography into trusted systems: A criteria approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Eighth Annual Computer Security Applications Conference, ACSAC 1992, November 30 - December 4, 1992, San Antonio, Texas, USA, pp. 30-36, 1992, IEEE. The full citation details ...](Pics/full.jpeg) |
1992 |
DBLP DOI BibTeX RDF |
|
1 | Selwyn Russell |
Paradigms for verification of authorization at source of electronic documents in an integrated environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Eighth Annual Computer Security Applications Conference, ACSAC 1992, November 30 - December 4, 1992, San Antonio, Texas, USA, pp. 203-209, 1992, IEEE. The full citation details ...](Pics/full.jpeg) |
1992 |
DBLP DOI BibTeX RDF |
|
1 | |
Seventh Annual Computer Security Applications Conference, ACSAC 1991, 2-6 December, 1991, San Antonio, Texas, USA ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![IEEE The full citation details ...](Pics/full.jpeg) |
1991 |
DBLP BibTeX RDF |
|
1 | Paul Ammann, Ravi S. Sandhu, Gurpreet S. Suri |
A distributed implementation of the extended schematic protection model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Seventh Annual Computer Security Applications Conference, ACSAC 1991, 2-6 December, 1991, San Antonio, Texas, USA, pp. 152-164, 1991, IEEE. The full citation details ...](Pics/full.jpeg) |
1991 |
DBLP DOI BibTeX RDF |
|
1 | Maria M. King |
Rebus passwords. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Seventh Annual Computer Security Applications Conference, ACSAC 1991, 2-6 December, 1991, San Antonio, Texas, USA, pp. 239-243, 1991, IEEE. The full citation details ...](Pics/full.jpeg) |
1991 |
DBLP DOI BibTeX RDF |
|
1 | R. A. Gove, Lisa M. Jaworski, John G. Williams |
To Bell and back: developing a formal security policy model for a C 2 system. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Seventh Annual Computer Security Applications Conference, ACSAC 1991, 2-6 December, 1991, San Antonio, Texas, USA, pp. 143-151, 1991, IEEE. The full citation details ...](Pics/full.jpeg) |
1991 |
DBLP DOI BibTeX RDF |
|
1 | John P. McDermott, Sushil Jajodia, Ravi S. Sandhu |
A single-level scheduler for the replicated architecture for multilevel-secure databases. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Seventh Annual Computer Security Applications Conference, ACSAC 1991, 2-6 December, 1991, San Antonio, Texas, USA, pp. 2-11, 1991, IEEE. The full citation details ...](Pics/full.jpeg) |
1991 |
DBLP DOI BibTeX RDF |
|
1 | Dale A. Moir |
An implementation of access control using a salient feature of primes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Seventh Annual Computer Security Applications Conference, ACSAC 1991, 2-6 December, 1991, San Antonio, Texas, USA, pp. 56-64, 1991, IEEE. The full citation details ...](Pics/full.jpeg) |
1991 |
DBLP DOI BibTeX RDF |
|
1 | John P. Nestor |
Security modelling using hierarchical state machines. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Seventh Annual Computer Security Applications Conference, ACSAC 1991, 2-6 December, 1991, San Antonio, Texas, USA, pp. 110-119, 1991, IEEE. The full citation details ...](Pics/full.jpeg) |
1991 |
DBLP DOI BibTeX RDF |
|
1 | Marie Collins, William R. Ford, Bhavani Thuraisingham |
Security constraint processing during the update operation in a multilevel secure database management system. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Seventh Annual Computer Security Applications Conference, ACSAC 1991, 2-6 December, 1991, San Antonio, Texas, USA, pp. 23-32, 1991, IEEE. The full citation details ...](Pics/full.jpeg) |
1991 |
DBLP DOI BibTeX RDF |
|
1 | Edward A. Schneider |
Verification of the security of a secure network component. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Seventh Annual Computer Security Applications Conference, ACSAC 1991, 2-6 December, 1991, San Antonio, Texas, USA, pp. 132-142, 1991, IEEE. The full citation details ...](Pics/full.jpeg) |
1991 |
DBLP DOI BibTeX RDF |
|
1 | Jeffrey Picciotto |
Towards trusted cut and paste in the X Window System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Seventh Annual Computer Security Applications Conference, ACSAC 1991, 2-6 December, 1991, San Antonio, Texas, USA, pp. 34-43, 1991, IEEE. The full citation details ...](Pics/full.jpeg) |
1991 |
DBLP DOI BibTeX RDF |
|
1 | Samuel I. Schaen, Brian W. McKenney |
Network auditing: issues and recommendations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Seventh Annual Computer Security Applications Conference, ACSAC 1991, 2-6 December, 1991, San Antonio, Texas, USA, pp. 66-79, 1991, IEEE. The full citation details ...](Pics/full.jpeg) |
1991 |
DBLP DOI BibTeX RDF |
|
1 | Daniel Galik, Brian Tretick |
Fielding multilevel security into command and control systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Seventh Annual Computer Security Applications Conference, ACSAC 1991, 2-6 December, 1991, San Antonio, Texas, USA, pp. 202-208, 1991, IEEE. The full citation details ...](Pics/full.jpeg) |
1991 |
DBLP DOI BibTeX RDF |
|
1 | Richard E. Newman-Wolfe, Balaji R. Venkatraman |
High level prevention of traffic analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Seventh Annual Computer Security Applications Conference, ACSAC 1991, 2-6 December, 1991, San Antonio, Texas, USA, pp. 102-109, 1991, IEEE. The full citation details ...](Pics/full.jpeg) |
1991 |
DBLP DOI BibTeX RDF |
|
1 | Günther Pernul, Gottfried Luef |
A multilevel secure relational data model based on views. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Seventh Annual Computer Security Applications Conference, ACSAC 1991, 2-6 December, 1991, San Antonio, Texas, USA, pp. 166-177, 1991, IEEE. The full citation details ...](Pics/full.jpeg) |
1991 |
DBLP DOI BibTeX RDF |
|
1 | Doug Nelson, Chip Paradise |
Using polyinstantiation to develop an MLS application. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Seventh Annual Computer Security Applications Conference, ACSAC 1991, 2-6 December, 1991, San Antonio, Texas, USA, pp. 12-22, 1991, IEEE. The full citation details ...](Pics/full.jpeg) |
1991 |
DBLP DOI BibTeX RDF |
|
1 | Boris Y. Kogan, Sushil Jajodia |
An audit model for object-oriented databases. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Seventh Annual Computer Security Applications Conference, ACSAC 1991, 2-6 December, 1991, San Antonio, Texas, USA, pp. 90-99, 1991, IEEE. The full citation details ...](Pics/full.jpeg) |
1991 |
DBLP DOI BibTeX RDF |
|
1 | Bob P. Weems, Wen-Gong Shieh, Muhammad Jaseemuddin |
Complete containment sets and their application to the inference problem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Seventh Annual Computer Security Applications Conference, ACSAC 1991, 2-6 December, 1991, San Antonio, Texas, USA, pp. 187-200, 1991, IEEE. The full citation details ...](Pics/full.jpeg) |
1991 |
DBLP DOI BibTeX RDF |
|
1 | Linda B. Lankewicz, Mark Benard |
Real-time anomaly detection using a nonparametric pattern recognition approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Seventh Annual Computer Security Applications Conference, ACSAC 1991, 2-6 December, 1991, San Antonio, Texas, USA, pp. 80-89, 1991, IEEE. The full citation details ...](Pics/full.jpeg) |
1991 |
DBLP DOI BibTeX RDF |
|
1 | Patrick W. Mallet |
Considerations for applying disk encryptors to environments subject to hostile overrun. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Seventh Annual Computer Security Applications Conference, ACSAC 1991, 2-6 December, 1991, San Antonio, Texas, USA, pp. 218-222, 1991, IEEE. The full citation details ...](Pics/full.jpeg) |
1991 |
DBLP DOI BibTeX RDF |
|
1 | Howard L. Johnson, Chuck Arvin, Earl Jenkinson, Bob Pierce |
Proposed security for critical Air Force missions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Seventh Annual Computer Security Applications Conference, ACSAC 1991, 2-6 December, 1991, San Antonio, Texas, USA, pp. 209-217, 1991, IEEE. The full citation details ...](Pics/full.jpeg) |
1991 |
DBLP DOI BibTeX RDF |
|
1 | S. C. Hansen, Elizabeth A. Unger |
Domain reduction dependencies: A new type of dependency for statistical database security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Seventh Annual Computer Security Applications Conference, ACSAC 1991, 2-6 December, 1991, San Antonio, Texas, USA, pp. 178-186, 1991, IEEE. The full citation details ...](Pics/full.jpeg) |
1991 |
DBLP DOI BibTeX RDF |
|
1 | Robert E. Niemeyer, V. A. Ashby |
Observations on integrating multilevel secure components into system high distributed systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Seventh Annual Computer Security Applications Conference, ACSAC 1991, 2-6 December, 1991, San Antonio, Texas, USA, pp. 230-238, 1991, IEEE. The full citation details ...](Pics/full.jpeg) |
1991 |
DBLP DOI BibTeX RDF |
|
1 | Joseph C. Chao, Mahalakshmi Komaravolu, Carol Lin, Gavin Yiu |
Modeling internal controls of automated teller machine (ATM) systems: A computerized decision aid for design and evaluation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Seventh Annual Computer Security Applications Conference, ACSAC 1991, 2-6 December, 1991, San Antonio, Texas, USA, pp. 120-129, 1991, IEEE. The full citation details ...](Pics/full.jpeg) |
1991 |
DBLP DOI BibTeX RDF |
|
1 | Jeremy Epstein, John McHugh, Rita Pascale, Hilarie K. Orman, Glenn S. Benson, Charles R. Martin, Ann B. Marmor-Squires, Bonnie P. Danner, Martha A. Branstad |
A prototype B3 trusted X Window System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Seventh Annual Computer Security Applications Conference, ACSAC 1991, 2-6 December, 1991, San Antonio, Texas, USA, pp. 44-55, 1991, IEEE. The full citation details ...](Pics/full.jpeg) |
1991 |
DBLP DOI BibTeX RDF |
|
1 | Charles R. Pierce |
Security considerations in the acquisition of computer systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Seventh Annual Computer Security Applications Conference, ACSAC 1991, 2-6 December, 1991, San Antonio, Texas, USA, pp. 224-229, 1991, IEEE. The full citation details ...](Pics/full.jpeg) |
1991 |
DBLP DOI BibTeX RDF |
|
1 | Hal Tipton |
Professional certification for security practitioners. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Sixth Annual Computer Security Applications Conference, ACSAC 1990, 3-7 December, 1990, Tucson, Arizona, USA, 1990, IEEE. The full citation details ...](Pics/full.jpeg) |
1990 |
DBLP DOI BibTeX RDF |
|
1 | Eugen M. Bacic |
The Canadian trusted computer product evaluation criteria. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Sixth Annual Computer Security Applications Conference, ACSAC 1990, 3-7 December, 1990, Tucson, Arizona, USA, pp. 188-196, 1990, IEEE. The full citation details ...](Pics/full.jpeg) |
1990 |
DBLP DOI BibTeX RDF |
|
1 | William Wilson, Joel Sachs, David Wichers, Peter K. Boucher |
MLS and trust issues at the user interface in MLS AISs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Sixth Annual Computer Security Applications Conference, ACSAC 1990, 3-7 December, 1990, Tucson, Arizona, USA, pp. 204-208, 1990, IEEE. The full citation details ...](Pics/full.jpeg) |
1990 |
DBLP DOI BibTeX RDF |
|
1 | John P. McDermott, Judith N. Froscher, Christian N. Payne, Herman Otto Lubbes |
Informal top-level specifications for trusted application systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Sixth Annual Computer Security Applications Conference, ACSAC 1990, 3-7 December, 1990, Tucson, Arizona, USA, pp. 423-433, 1990, IEEE. The full citation details ...](Pics/full.jpeg) |
1990 |
DBLP DOI BibTeX RDF |
|
1 | Cynthia E. Irvine, Roger R. Schell, Linda L. Vetter |
Architecture for an embedded secure data base management system. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Sixth Annual Computer Security Applications Conference, ACSAC 1990, 3-7 December, 1990, Tucson, Arizona, USA, pp. 125-136, 1990, IEEE. The full citation details ...](Pics/full.jpeg) |
1990 |
DBLP DOI BibTeX RDF |
|
1 | Eric S. Maiwald |
A solution to the cascade problem for dynamic network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Sixth Annual Computer Security Applications Conference, ACSAC 1990, 3-7 December, 1990, Tucson, Arizona, USA, pp. 2-, 1990, IEEE. The full citation details ...](Pics/full.jpeg) |
1990 |
DBLP DOI BibTeX RDF |
|
1 | R. Ward, P. Skeffington |
Network management security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Sixth Annual Computer Security Applications Conference, ACSAC 1990, 3-7 December, 1990, Tucson, Arizona, USA, pp. 173-180, 1990, IEEE. The full citation details ...](Pics/full.jpeg) |
1990 |
DBLP DOI BibTeX RDF |
|
1 | Vijay Varadharajan, Stewart Black |
A multilevel security model for a distributed object-oriented system. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Sixth Annual Computer Security Applications Conference, ACSAC 1990, 3-7 December, 1990, Tucson, Arizona, USA, pp. 68-78, 1990, IEEE. The full citation details ...](Pics/full.jpeg) |
1990 |
DBLP DOI BibTeX RDF |
|
1 | Deborah J. Bodeau, Mary Jo Reece |
A multilevel-mode system for space applications: lessons learned. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Sixth Annual Computer Security Applications Conference, ACSAC 1990, 3-7 December, 1990, Tucson, Arizona, USA, pp. 406-413, 1990, IEEE. The full citation details ...](Pics/full.jpeg) |
1990 |
DBLP DOI BibTeX RDF |
|
1 | Teresa F. Lunt, Ann Tamaru, Fred Gilham, R. Jagannathan, Peter G. Neumann, Caveh Jalali |
IDES: a progress report [Intrusion-Detection Expert System]. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Sixth Annual Computer Security Applications Conference, ACSAC 1990, 3-7 December, 1990, Tucson, Arizona, USA, pp. 273-285, 1990, IEEE. The full citation details ...](Pics/full.jpeg) |
1990 |
DBLP DOI BibTeX RDF |
|
1 | William T. Maimone, Ira B. Greenberg |
Single-level multiversion schedulers for multilevel secure database systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Sixth Annual Computer Security Applications Conference, ACSAC 1990, 3-7 December, 1990, Tucson, Arizona, USA, pp. 137-147, 1990, IEEE. The full citation details ...](Pics/full.jpeg) |
1990 |
DBLP DOI BibTeX RDF |
|
1 | Eugen M. Bacic |
Process Execution Controls: revisited. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Sixth Annual Computer Security Applications Conference, ACSAC 1990, 3-7 December, 1990, Tucson, Arizona, USA, pp. 334-339, 1990, IEEE. The full citation details ...](Pics/full.jpeg) |
1990 |
DBLP DOI BibTeX RDF |
|
1 | Steve H. Weingart, Steve R. White, William C. Arnold, Glen P. Double |
An evaluation system for the physical security of computing systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Sixth Annual Computer Security Applications Conference, ACSAC 1990, 3-7 December, 1990, Tucson, Arizona, USA, pp. 232-243, 1990, IEEE. The full citation details ...](Pics/full.jpeg) |
1990 |
DBLP DOI BibTeX RDF |
|
1 | Kevin V. Murphy, Gunnar Soberg |
ODA and POSIX: label liaisons. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Sixth Annual Computer Security Applications Conference, ACSAC 1990, 3-7 December, 1990, Tucson, Arizona, USA, pp. 162-172, 1990, IEEE. The full citation details ...](Pics/full.jpeg) |
1990 |
DBLP DOI BibTeX RDF |
|
1 | Lance J. Hoffman, Russell J. Davis |
Security pipeline interface (SPI). ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Sixth Annual Computer Security Applications Conference, ACSAC 1990, 3-7 December, 1990, Tucson, Arizona, USA, pp. 349-355, 1990, IEEE. The full citation details ...](Pics/full.jpeg) |
1990 |
DBLP DOI BibTeX RDF |
|
1 | Michael Roe, Tom Casey |
Integrating cryptography in the trusted computing base. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Sixth Annual Computer Security Applications Conference, ACSAC 1990, 3-7 December, 1990, Tucson, Arizona, USA, pp. 50-56, 1990, IEEE. The full citation details ...](Pics/full.jpeg) |
1990 |
DBLP DOI BibTeX RDF |
|
1 | Thomas D. Garvey, Teresa F. Lunt |
Multilevel security for knowledge based systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Sixth Annual Computer Security Applications Conference, ACSAC 1990, 3-7 December, 1990, Tucson, Arizona, USA, pp. 148-159, 1990, IEEE. The full citation details ...](Pics/full.jpeg) |
1990 |
DBLP DOI BibTeX RDF |
|
1 | Bonnie P. Danner, Ann B. Marmor-Squires |
An advanced process model's application to trusted X Window system development. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Sixth Annual Computer Security Applications Conference, ACSAC 1990, 3-7 December, 1990, Tucson, Arizona, USA, pp. 209-220, 1990, IEEE. The full citation details ...](Pics/full.jpeg) |
1990 |
DBLP DOI BibTeX RDF |
|
1 | Raymond M. Wong |
A comparison of secure UNIX operating systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Sixth Annual Computer Security Applications Conference, ACSAC 1990, 3-7 December, 1990, Tucson, Arizona, USA, pp. 322-333, 1990, IEEE. The full citation details ...](Pics/full.jpeg) |
1990 |
DBLP DOI BibTeX RDF |
|
1 | Hidenori Nakamura, Kazuyuki Takagi, Ken-ichi Okada, Yutaka Matsushita |
Hierarchical group oriented key management method HGK. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Sixth Annual Computer Security Applications Conference, ACSAC 1990, 3-7 December, 1990, Tucson, Arizona, USA, pp. 44-49, 1990, IEEE. The full citation details ...](Pics/full.jpeg) |
1990 |
DBLP DOI BibTeX RDF |
|
1 | Patrick W. Mallett |
An example application of the trusted network interpretation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Sixth Annual Computer Security Applications Conference, ACSAC 1990, 3-7 December, 1990, Tucson, Arizona, USA, pp. 9-19, 1990, IEEE. The full citation details ...](Pics/full.jpeg) |
1990 |
DBLP DOI BibTeX RDF |
|
1 | Lynn McNulty |
Professional certification for computer security professionals. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Sixth Annual Computer Security Applications Conference, ACSAC 1990, 3-7 December, 1990, Tucson, Arizona, USA, 1990, IEEE. The full citation details ...](Pics/full.jpeg) |
1990 |
DBLP DOI BibTeX RDF |
|
1 | Archibald McKinlay |
Software safety and security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Sixth Annual Computer Security Applications Conference, ACSAC 1990, 3-7 December, 1990, Tucson, Arizona, USA, pp. 313-320, 1990, IEEE. The full citation details ...](Pics/full.jpeg) |
1990 |
DBLP DOI BibTeX RDF |
|
1 | Matt Bishop |
A security analysis of the NTP protocol version 2. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Sixth Annual Computer Security Applications Conference, ACSAC 1990, 3-7 December, 1990, Tucson, Arizona, USA, pp. 20-29, 1990, IEEE. The full citation details ...](Pics/full.jpeg) |
1990 |
DBLP DOI BibTeX RDF |
|
1 | Dan J. Thomsen, J. Thomas Haigh |
A comparison of type enforcement and Unix setuid implementation of well-formed transactions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Sixth Annual Computer Security Applications Conference, ACSAC 1990, 3-7 December, 1990, Tucson, Arizona, USA, pp. 304-312, 1990, IEEE. The full citation details ...](Pics/full.jpeg) |
1990 |
DBLP DOI BibTeX RDF |
|
1 | Judith N. Froscher, John P. McDermott, Christian N. Payne, Herman Otto Lubbes |
Successful acquisition of certifiable application systems (or: How not to shake hands with the tar baby). ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Sixth Annual Computer Security Applications Conference, ACSAC 1990, 3-7 December, 1990, Tucson, Arizona, USA, pp. 414-422, 1990, IEEE. The full citation details ...](Pics/full.jpeg) |
1990 |
DBLP DOI BibTeX RDF |
|
1 | William M. Garrabrants, Alfred W. Ellis III, Lance J. Hoffman, Magdi N. Kamel |
CERTS: a comparative evaluation method for risk management methodologies and tools. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Sixth Annual Computer Security Applications Conference, ACSAC 1990, 3-7 December, 1990, Tucson, Arizona, USA, pp. 251-257, 1990, IEEE. The full citation details ...](Pics/full.jpeg) |
1990 |
DBLP DOI BibTeX RDF |
|
1 | Frank L. Mayer |
A brief comparison of two different environmental guidelines for determining 'levels of trust' [computer security]. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Sixth Annual Computer Security Applications Conference, ACSAC 1990, 3-7 December, 1990, Tucson, Arizona, USA, pp. 244-250, 1990, IEEE. The full citation details ...](Pics/full.jpeg) |
1990 |
DBLP DOI BibTeX RDF |
|
1 | Russell J. Davis |
Software checking with the Auditor's Aid. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Sixth Annual Computer Security Applications Conference, ACSAC 1990, 3-7 December, 1990, Tucson, Arizona, USA, pp. 298-303, 1990, IEEE. The full citation details ...](Pics/full.jpeg) |
1990 |
DBLP DOI BibTeX RDF |
|
1 | Paul A. Lambert |
The lowdown on lower layer security protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Sixth Annual Computer Security Applications Conference, ACSAC 1990, 3-7 December, 1990, Tucson, Arizona, USA, pp. 181-187, 1990, IEEE. The full citation details ...](Pics/full.jpeg) |
1990 |
DBLP DOI BibTeX RDF |
|
1 | |
Sixth Annual Computer Security Applications Conference, ACSAC 1990, 3-7 December, 1990, Tucson, Arizona, USA ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![IEEE The full citation details ...](Pics/full.jpeg) |
1990 |
DBLP BibTeX RDF |
|
1 | Elizabeth A. Unger, Sallie Keller-McNulty, Paul Connelly |
Natural change in dynamic databases as a deterrent to compromise by trackers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Sixth Annual Computer Security Applications Conference, ACSAC 1990, 3-7 December, 1990, Tucson, Arizona, USA, pp. 116-124, 1990, IEEE. The full citation details ...](Pics/full.jpeg) |
1990 |
DBLP DOI BibTeX RDF |
|
1 | Samuel Doncaster, Michael Endsley, Greg Factor |
Rehosting existing command and control systems into a multilevel secure environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Sixth Annual Computer Security Applications Conference, ACSAC 1990, 3-7 December, 1990, Tucson, Arizona, USA, pp. 434-445, 1990, IEEE. The full citation details ...](Pics/full.jpeg) |
1990 |
DBLP DOI BibTeX RDF |
|
1 | J. Noelle McAuliffe, Dawn Wolcott, Lorrayne J. Schaefer, Nancy L. Kelem, Brian Hubbard, Theresa K. Haley |
Is your computer being misused? A survey of current intrusion detection system technology. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Sixth Annual Computer Security Applications Conference, ACSAC 1990, 3-7 December, 1990, Tucson, Arizona, USA, pp. 260-272, 1990, IEEE. The full citation details ...](Pics/full.jpeg) |
1990 |
DBLP DOI BibTeX RDF |
|
1 | Robert T. Vitter |
ICCP Systems Security specialty exam. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Sixth Annual Computer Security Applications Conference, ACSAC 1990, 3-7 December, 1990, Tucson, Arizona, USA, 1990, IEEE. The full citation details ...](Pics/full.jpeg) |
1990 |
DBLP DOI BibTeX RDF |
|
1 | Wen-Gong Shieh, Bob P. Weems, Krishna M. Kavi |
An n-grid model for group authorization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Sixth Annual Computer Security Applications Conference, ACSAC 1990, 3-7 December, 1990, Tucson, Arizona, USA, pp. 384-392, 1990, IEEE. The full citation details ...](Pics/full.jpeg) |
1990 |
DBLP DOI BibTeX RDF |
|
1 | Sushil Jajodia, Ravi S. Sandhu, Edgar H. Sibley |
Update semantics for multilevel relations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Sixth Annual Computer Security Applications Conference, ACSAC 1990, 3-7 December, 1990, Tucson, Arizona, USA, pp. 103-112, 1990, IEEE. The full citation details ...](Pics/full.jpeg) |
1990 |
DBLP DOI BibTeX RDF |
|
1 | Paul Ammann, Ravi S. Sandhu |
Extending the creation operation in the Schematic Protection Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Sixth Annual Computer Security Applications Conference, ACSAC 1990, 3-7 December, 1990, Tucson, Arizona, USA, 1990, IEEE. The full citation details ...](Pics/full.jpeg) |
1990 |
DBLP DOI BibTeX RDF |
|
1 | Tsau Young Lin |
Probabilistic measure on aggregations [data security]. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Sixth Annual Computer Security Applications Conference, ACSAC 1990, 3-7 December, 1990, Tucson, Arizona, USA, pp. 286-294, 1990, IEEE. The full citation details ...](Pics/full.jpeg) |
1990 |
DBLP DOI BibTeX RDF |
|
1 | Elizabeth A. Unger, Lein Harn, Vijay Kumar 0002 |
Entropy as a measure of database information. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Sixth Annual Computer Security Applications Conference, ACSAC 1990, 3-7 December, 1990, Tucson, Arizona, USA, pp. 80-87, 1990, IEEE. The full citation details ...](Pics/full.jpeg) |
1990 |
DBLP DOI BibTeX RDF |
|
1 | Jeremy Epstein |
A prototype for Trusted X labeling policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Sixth Annual Computer Security Applications Conference, ACSAC 1990, 3-7 December, 1990, Tucson, Arizona, USA, pp. 221-230, 1990, IEEE. The full citation details ...](Pics/full.jpeg) |
1990 |
DBLP DOI BibTeX RDF |
|