Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Nora Boulahia-Cuppens, Frédéric Cuppens, Alban Gabillon, Kioumars Yazdanian |
MultiView model for object-oriented database. |
ACSAC |
1993 |
DBLP DOI BibTeX RDF |
|
1 | Brian Tretick |
Operational requirements for multilevel security. |
ACSAC |
1993 |
DBLP DOI BibTeX RDF |
|
1 | Eugen M. Bacic, A. Robison |
The rationale behind the Canadian criteria. |
ACSAC |
1993 |
DBLP DOI BibTeX RDF |
|
1 | Günther Pernul, Werner Winiwarter, A Min Tjoa |
The deductive filter approach to MLS database prototyping. |
ACSAC |
1993 |
DBLP DOI BibTeX RDF |
|
1 | Balaji R. Venkatraman, Richard E. Newman-Wolfe |
Transmission schedules to prevent traffic analysis. |
ACSAC |
1993 |
DBLP DOI BibTeX RDF |
|
1 | Qi Shi 0001, John A. McDermid, Jonathan D. Moffett |
Applying noninterference to composition of systems: a more practical approach. |
ACSAC |
1993 |
DBLP DOI BibTeX RDF |
|
1 | Deborah J. Bodeau, Frederick N. Chase |
Modeling constructs for describing a complex system-of-systems. |
ACSAC |
1993 |
DBLP DOI BibTeX RDF |
|
1 | W. A. Jansen |
A second look at the SDNS key management protocol. |
ACSAC |
1993 |
DBLP DOI BibTeX RDF |
|
1 | Richard E. Smith |
MLS file service for network data sharing. |
ACSAC |
1993 |
DBLP DOI BibTeX RDF |
|
1 | Phillip A. Porras, Richard A. Kemmerer |
Penetration state transition analysis: A rule-based intrusion detection approach. |
ACSAC |
1992 |
DBLP DOI BibTeX RDF |
|
1 | Deborah J. Bodeau, Nancy R. Brusil, Irene N. Chang, Mary Jo Reece |
Security test and evaluation for multilevel-mode accreditation: Lessons learned. |
ACSAC |
1992 |
DBLP DOI BibTeX RDF |
|
1 | |
Eighth Annual Computer Security Applications Conference, ACSAC 1992, November 30 - December 4, 1992, San Antonio, Texas, USA |
ACSAC |
1992 |
DBLP BibTeX RDF |
|
1 | Sandeep Kumar, Eugene H. Spafford |
A generic virus scanner for C++. |
ACSAC |
1992 |
DBLP DOI BibTeX RDF |
|
1 | Richard E. Newman-Wolfe, Balaji R. Venkatraman |
Performance analysis of a method for high level prevention of traffic analysis. |
ACSAC |
1992 |
DBLP DOI BibTeX RDF |
|
1 | Michael V. Joyce |
Access control and applications on trusted systems. |
ACSAC |
1992 |
DBLP DOI BibTeX RDF |
|
1 | Charles W. Kurak Jr., John McHugh |
A cautionary note on image downgrading. |
ACSAC |
1992 |
DBLP DOI BibTeX RDF |
|
1 | Ricki Andrew Vick |
An overview of the AMC WWMCCS CAT Guard. |
ACSAC |
1992 |
DBLP DOI BibTeX RDF |
|
1 | Sharon R. Lewis, Simon R. Wiseman, Neil D. Poulter |
Providing security in a phone book database using triggers. |
ACSAC |
1992 |
DBLP DOI BibTeX RDF |
|
1 | Semyon Dukach |
SNPP: A simple network payment protocol. |
ACSAC |
1992 |
DBLP DOI BibTeX RDF |
|
1 | Paul Ammann, Ravi S. Sandhu |
Implementing transaction control expressions by checking for absence of access rights. |
ACSAC |
1992 |
DBLP DOI BibTeX RDF |
|
1 | W. Douglas Maughan |
Standards for computer systems security: An interoperability analysis of SDNS SP3 and ISO NLSP. |
ACSAC |
1992 |
DBLP DOI BibTeX RDF |
|
1 | Christine Arangio, Tom Chen, Steve Neidhardt |
Security Products (Security Pro) Transition Analysis Facility (STAF): Pragmatic concepts for MLS technology transition. |
ACSAC |
1992 |
DBLP DOI BibTeX RDF |
|
1 | Günther Pernul |
Security constraint processing during multilevel secure database design. |
ACSAC |
1992 |
DBLP DOI BibTeX RDF |
|
1 | Deborah J. Bodeau |
A conceptual model for computer security risk analysis. |
ACSAC |
1992 |
DBLP DOI BibTeX RDF |
|
1 | Peter A. Loscocco, William R. Kutz, Dale M. Johnson, Ronald J. Watro |
Dealing with the dynamics of security: Flexibility with utility in an MLS LAN. |
ACSAC |
1992 |
DBLP DOI BibTeX RDF |
|
1 | Amy Wu, Eric R. Anderson 0001, Cristi Garvey |
Secure system architectures and integration. |
ACSAC |
1992 |
DBLP DOI BibTeX RDF |
|
1 | James O. Bondi |
Trustable computing in next-generation avionic architectures. |
ACSAC |
1992 |
DBLP DOI BibTeX RDF |
|
1 | C. J. Testa, B. D. Wilner, Virgil D. Gligor |
Trusted RUBIX architecture and policy model interpretation. |
ACSAC |
1992 |
DBLP DOI BibTeX RDF |
|
1 | S. P. Bennett, Muninder P. Kailay |
An application of qualitative risk analysis to computer security for the commercial sector. |
ACSAC |
1992 |
DBLP DOI BibTeX RDF |
|
1 | John A. McDermid, Qi Shi 0001 |
Secure composition of systems. |
ACSAC |
1992 |
DBLP DOI BibTeX RDF |
|
1 | James P. Anderson |
Computer security myths mythtakes or 'The real security problem is...'. |
ACSAC |
1992 |
DBLP DOI BibTeX RDF |
|
1 | Jeffrey Picciotto, Jeremy Epstein |
A comparison of trusted X security policies, architectures, and interoperability. |
ACSAC |
1992 |
DBLP DOI BibTeX RDF |
|
1 | William Brierley |
Integrating cryptography into trusted systems: A criteria approach. |
ACSAC |
1992 |
DBLP DOI BibTeX RDF |
|
1 | Selwyn Russell |
Paradigms for verification of authorization at source of electronic documents in an integrated environment. |
ACSAC |
1992 |
DBLP DOI BibTeX RDF |
|
1 | |
Seventh Annual Computer Security Applications Conference, ACSAC 1991, 2-6 December, 1991, San Antonio, Texas, USA |
ACSAC |
1991 |
DBLP BibTeX RDF |
|
1 | Paul Ammann, Ravi S. Sandhu, Gurpreet S. Suri |
A distributed implementation of the extended schematic protection model. |
ACSAC |
1991 |
DBLP DOI BibTeX RDF |
|
1 | Maria M. King |
Rebus passwords. |
ACSAC |
1991 |
DBLP DOI BibTeX RDF |
|
1 | R. A. Gove, Lisa M. Jaworski, John G. Williams |
To Bell and back: developing a formal security policy model for a C 2 system. |
ACSAC |
1991 |
DBLP DOI BibTeX RDF |
|
1 | John P. McDermott, Sushil Jajodia, Ravi S. Sandhu |
A single-level scheduler for the replicated architecture for multilevel-secure databases. |
ACSAC |
1991 |
DBLP DOI BibTeX RDF |
|
1 | Dale A. Moir |
An implementation of access control using a salient feature of primes. |
ACSAC |
1991 |
DBLP DOI BibTeX RDF |
|
1 | John P. Nestor |
Security modelling using hierarchical state machines. |
ACSAC |
1991 |
DBLP DOI BibTeX RDF |
|
1 | Marie Collins, William R. Ford, Bhavani Thuraisingham |
Security constraint processing during the update operation in a multilevel secure database management system. |
ACSAC |
1991 |
DBLP DOI BibTeX RDF |
|
1 | Edward A. Schneider |
Verification of the security of a secure network component. |
ACSAC |
1991 |
DBLP DOI BibTeX RDF |
|
1 | Jeffrey Picciotto |
Towards trusted cut and paste in the X Window System. |
ACSAC |
1991 |
DBLP DOI BibTeX RDF |
|
1 | Samuel I. Schaen, Brian W. McKenney |
Network auditing: issues and recommendations. |
ACSAC |
1991 |
DBLP DOI BibTeX RDF |
|
1 | Daniel Galik, Brian Tretick |
Fielding multilevel security into command and control systems. |
ACSAC |
1991 |
DBLP DOI BibTeX RDF |
|
1 | Richard E. Newman-Wolfe, Balaji R. Venkatraman |
High level prevention of traffic analysis. |
ACSAC |
1991 |
DBLP DOI BibTeX RDF |
|
1 | Günther Pernul, Gottfried Luef |
A multilevel secure relational data model based on views. |
ACSAC |
1991 |
DBLP DOI BibTeX RDF |
|
1 | Doug Nelson, Chip Paradise |
Using polyinstantiation to develop an MLS application. |
ACSAC |
1991 |
DBLP DOI BibTeX RDF |
|
1 | Boris Y. Kogan, Sushil Jajodia |
An audit model for object-oriented databases. |
ACSAC |
1991 |
DBLP DOI BibTeX RDF |
|
1 | Bob P. Weems, Wen-Gong Shieh, Muhammad Jaseemuddin |
Complete containment sets and their application to the inference problem. |
ACSAC |
1991 |
DBLP DOI BibTeX RDF |
|
1 | Linda B. Lankewicz, Mark Benard |
Real-time anomaly detection using a nonparametric pattern recognition approach. |
ACSAC |
1991 |
DBLP DOI BibTeX RDF |
|
1 | Patrick W. Mallet |
Considerations for applying disk encryptors to environments subject to hostile overrun. |
ACSAC |
1991 |
DBLP DOI BibTeX RDF |
|
1 | Howard L. Johnson, Chuck Arvin, Earl Jenkinson, Bob Pierce |
Proposed security for critical Air Force missions. |
ACSAC |
1991 |
DBLP DOI BibTeX RDF |
|
1 | S. C. Hansen, Elizabeth A. Unger |
Domain reduction dependencies: A new type of dependency for statistical database security. |
ACSAC |
1991 |
DBLP DOI BibTeX RDF |
|
1 | Robert E. Niemeyer, V. A. Ashby |
Observations on integrating multilevel secure components into system high distributed systems. |
ACSAC |
1991 |
DBLP DOI BibTeX RDF |
|
1 | Joseph C. Chao, Mahalakshmi Komaravolu, Carol Lin, Gavin Yiu |
Modeling internal controls of automated teller machine (ATM) systems: A computerized decision aid for design and evaluation. |
ACSAC |
1991 |
DBLP DOI BibTeX RDF |
|
1 | Jeremy Epstein, John McHugh, Rita Pascale, Hilarie K. Orman, Glenn S. Benson, Charles R. Martin, Ann B. Marmor-Squires, Bonnie P. Danner, Martha A. Branstad |
A prototype B3 trusted X Window System. |
ACSAC |
1991 |
DBLP DOI BibTeX RDF |
|
1 | Charles R. Pierce |
Security considerations in the acquisition of computer systems. |
ACSAC |
1991 |
DBLP DOI BibTeX RDF |
|
1 | Hal Tipton |
Professional certification for security practitioners. |
ACSAC |
1990 |
DBLP DOI BibTeX RDF |
|
1 | Eugen M. Bacic |
The Canadian trusted computer product evaluation criteria. |
ACSAC |
1990 |
DBLP DOI BibTeX RDF |
|
1 | William Wilson, Joel Sachs, David Wichers, Peter K. Boucher |
MLS and trust issues at the user interface in MLS AISs. |
ACSAC |
1990 |
DBLP DOI BibTeX RDF |
|
1 | John P. McDermott, Judith N. Froscher, Christian N. Payne, Herman Otto Lubbes |
Informal top-level specifications for trusted application systems. |
ACSAC |
1990 |
DBLP DOI BibTeX RDF |
|
1 | Cynthia E. Irvine, Roger R. Schell, Linda L. Vetter |
Architecture for an embedded secure data base management system. |
ACSAC |
1990 |
DBLP DOI BibTeX RDF |
|
1 | Eric S. Maiwald |
A solution to the cascade problem for dynamic network. |
ACSAC |
1990 |
DBLP DOI BibTeX RDF |
|
1 | R. Ward, P. Skeffington |
Network management security. |
ACSAC |
1990 |
DBLP DOI BibTeX RDF |
|
1 | Vijay Varadharajan, Stewart Black |
A multilevel security model for a distributed object-oriented system. |
ACSAC |
1990 |
DBLP DOI BibTeX RDF |
|
1 | Deborah J. Bodeau, Mary Jo Reece |
A multilevel-mode system for space applications: lessons learned. |
ACSAC |
1990 |
DBLP DOI BibTeX RDF |
|
1 | Teresa F. Lunt, Ann Tamaru, Fred Gilham, R. Jagannathan, Peter G. Neumann, Caveh Jalali |
IDES: a progress report [Intrusion-Detection Expert System]. |
ACSAC |
1990 |
DBLP DOI BibTeX RDF |
|
1 | William T. Maimone, Ira B. Greenberg |
Single-level multiversion schedulers for multilevel secure database systems. |
ACSAC |
1990 |
DBLP DOI BibTeX RDF |
|
1 | Eugen M. Bacic |
Process Execution Controls: revisited. |
ACSAC |
1990 |
DBLP DOI BibTeX RDF |
|
1 | Steve H. Weingart, Steve R. White, William C. Arnold, Glen P. Double |
An evaluation system for the physical security of computing systems. |
ACSAC |
1990 |
DBLP DOI BibTeX RDF |
|
1 | Kevin V. Murphy, Gunnar Soberg |
ODA and POSIX: label liaisons. |
ACSAC |
1990 |
DBLP DOI BibTeX RDF |
|
1 | Lance J. Hoffman, Russell J. Davis |
Security pipeline interface (SPI). |
ACSAC |
1990 |
DBLP DOI BibTeX RDF |
|
1 | Michael Roe, Tom Casey |
Integrating cryptography in the trusted computing base. |
ACSAC |
1990 |
DBLP DOI BibTeX RDF |
|
1 | Thomas D. Garvey, Teresa F. Lunt |
Multilevel security for knowledge based systems. |
ACSAC |
1990 |
DBLP DOI BibTeX RDF |
|
1 | Bonnie P. Danner, Ann B. Marmor-Squires |
An advanced process model's application to trusted X Window system development. |
ACSAC |
1990 |
DBLP DOI BibTeX RDF |
|
1 | Raymond M. Wong |
A comparison of secure UNIX operating systems. |
ACSAC |
1990 |
DBLP DOI BibTeX RDF |
|
1 | Hidenori Nakamura, Kazuyuki Takagi, Ken-ichi Okada, Yutaka Matsushita |
Hierarchical group oriented key management method HGK. |
ACSAC |
1990 |
DBLP DOI BibTeX RDF |
|
1 | Patrick W. Mallett |
An example application of the trusted network interpretation. |
ACSAC |
1990 |
DBLP DOI BibTeX RDF |
|
1 | Lynn McNulty |
Professional certification for computer security professionals. |
ACSAC |
1990 |
DBLP DOI BibTeX RDF |
|
1 | Archibald McKinlay |
Software safety and security. |
ACSAC |
1990 |
DBLP DOI BibTeX RDF |
|
1 | Matt Bishop |
A security analysis of the NTP protocol version 2. |
ACSAC |
1990 |
DBLP DOI BibTeX RDF |
|
1 | Dan J. Thomsen, J. Thomas Haigh |
A comparison of type enforcement and Unix setuid implementation of well-formed transactions. |
ACSAC |
1990 |
DBLP DOI BibTeX RDF |
|
1 | Judith N. Froscher, John P. McDermott, Christian N. Payne, Herman Otto Lubbes |
Successful acquisition of certifiable application systems (or: How not to shake hands with the tar baby). |
ACSAC |
1990 |
DBLP DOI BibTeX RDF |
|
1 | William M. Garrabrants, Alfred W. Ellis III, Lance J. Hoffman, Magdi N. Kamel |
CERTS: a comparative evaluation method for risk management methodologies and tools. |
ACSAC |
1990 |
DBLP DOI BibTeX RDF |
|
1 | Frank L. Mayer |
A brief comparison of two different environmental guidelines for determining 'levels of trust' [computer security]. |
ACSAC |
1990 |
DBLP DOI BibTeX RDF |
|
1 | Russell J. Davis |
Software checking with the Auditor's Aid. |
ACSAC |
1990 |
DBLP DOI BibTeX RDF |
|
1 | Paul A. Lambert |
The lowdown on lower layer security protocols. |
ACSAC |
1990 |
DBLP DOI BibTeX RDF |
|
1 | |
Sixth Annual Computer Security Applications Conference, ACSAC 1990, 3-7 December, 1990, Tucson, Arizona, USA |
ACSAC |
1990 |
DBLP BibTeX RDF |
|
1 | Elizabeth A. Unger, Sallie Keller-McNulty, Paul Connelly |
Natural change in dynamic databases as a deterrent to compromise by trackers. |
ACSAC |
1990 |
DBLP DOI BibTeX RDF |
|
1 | Samuel Doncaster, Michael Endsley, Greg Factor |
Rehosting existing command and control systems into a multilevel secure environment. |
ACSAC |
1990 |
DBLP DOI BibTeX RDF |
|
1 | J. Noelle McAuliffe, Dawn Wolcott, Lorrayne J. Schaefer, Nancy L. Kelem, Brian Hubbard, Theresa K. Haley |
Is your computer being misused? A survey of current intrusion detection system technology. |
ACSAC |
1990 |
DBLP DOI BibTeX RDF |
|
1 | Robert T. Vitter |
ICCP Systems Security specialty exam. |
ACSAC |
1990 |
DBLP DOI BibTeX RDF |
|
1 | Wen-Gong Shieh, Bob P. Weems, Krishna M. Kavi |
An n-grid model for group authorization. |
ACSAC |
1990 |
DBLP DOI BibTeX RDF |
|
1 | Sushil Jajodia, Ravi S. Sandhu, Edgar H. Sibley |
Update semantics for multilevel relations. |
ACSAC |
1990 |
DBLP DOI BibTeX RDF |
|
1 | Paul Ammann, Ravi S. Sandhu |
Extending the creation operation in the Schematic Protection Model. |
ACSAC |
1990 |
DBLP DOI BibTeX RDF |
|
1 | Tsau Young Lin |
Probabilistic measure on aggregations [data security]. |
ACSAC |
1990 |
DBLP DOI BibTeX RDF |
|
1 | Elizabeth A. Unger, Lein Harn, Vijay Kumar 0002 |
Entropy as a measure of database information. |
ACSAC |
1990 |
DBLP DOI BibTeX RDF |
|
1 | Jeremy Epstein |
A prototype for Trusted X labeling policies. |
ACSAC |
1990 |
DBLP DOI BibTeX RDF |
|