The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "ACSAC"( http://dblp.L3S.de/Venues/ACSAC )

URL (DBLP): http://dblp.uni-trier.de/db/conf/aPcsac

Publication years (Num. hits)
1989 (62) 1990 (46) 1991 (25) 1992 (25) 1993 (29) 1994 (33) 1996 (29) 1997 (30) 1998 (36) 1999 (44) 2000 (43) 2001 (65) 2002 (42) 2003 (44) 2004 (42) 2005 (61) 2006 (45) 2007 (45) 2008 (99) 2009 (49) 2010 (43) 2011 (43) 2012 (47) 2013 (37) 2014 (49) 2015 (48) 2016 (49) 2017 (49) 2018 (61) 2019 (61) 2020 (71) 2021 (81) 2022 (74) 2023 (60)
Publication types (Num. hits)
inproceedings(1631) proceedings(36)
Venues (Conferences, Journals, ...)
ACSAC(1667)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 738 occurrences of 436 keywords

Results
Found 1667 publication records. Showing 1667 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Nora Boulahia-Cuppens, Frédéric Cuppens, Alban Gabillon, Kioumars Yazdanian MultiView model for object-oriented database. Search on Bibsonomy ACSAC The full citation details ... 1993 DBLP  DOI  BibTeX  RDF
1Brian Tretick Operational requirements for multilevel security. Search on Bibsonomy ACSAC The full citation details ... 1993 DBLP  DOI  BibTeX  RDF
1Eugen M. Bacic, A. Robison The rationale behind the Canadian criteria. Search on Bibsonomy ACSAC The full citation details ... 1993 DBLP  DOI  BibTeX  RDF
1Günther Pernul, Werner Winiwarter, A Min Tjoa The deductive filter approach to MLS database prototyping. Search on Bibsonomy ACSAC The full citation details ... 1993 DBLP  DOI  BibTeX  RDF
1Balaji R. Venkatraman, Richard E. Newman-Wolfe Transmission schedules to prevent traffic analysis. Search on Bibsonomy ACSAC The full citation details ... 1993 DBLP  DOI  BibTeX  RDF
1Qi Shi 0001, John A. McDermid, Jonathan D. Moffett Applying noninterference to composition of systems: a more practical approach. Search on Bibsonomy ACSAC The full citation details ... 1993 DBLP  DOI  BibTeX  RDF
1Deborah J. Bodeau, Frederick N. Chase Modeling constructs for describing a complex system-of-systems. Search on Bibsonomy ACSAC The full citation details ... 1993 DBLP  DOI  BibTeX  RDF
1W. A. Jansen A second look at the SDNS key management protocol. Search on Bibsonomy ACSAC The full citation details ... 1993 DBLP  DOI  BibTeX  RDF
1Richard E. Smith MLS file service for network data sharing. Search on Bibsonomy ACSAC The full citation details ... 1993 DBLP  DOI  BibTeX  RDF
1Phillip A. Porras, Richard A. Kemmerer Penetration state transition analysis: A rule-based intrusion detection approach. Search on Bibsonomy ACSAC The full citation details ... 1992 DBLP  DOI  BibTeX  RDF
1Deborah J. Bodeau, Nancy R. Brusil, Irene N. Chang, Mary Jo Reece Security test and evaluation for multilevel-mode accreditation: Lessons learned. Search on Bibsonomy ACSAC The full citation details ... 1992 DBLP  DOI  BibTeX  RDF
1 Eighth Annual Computer Security Applications Conference, ACSAC 1992, November 30 - December 4, 1992, San Antonio, Texas, USA Search on Bibsonomy ACSAC The full citation details ... 1992 DBLP  BibTeX  RDF
1Sandeep Kumar, Eugene H. Spafford A generic virus scanner for C++. Search on Bibsonomy ACSAC The full citation details ... 1992 DBLP  DOI  BibTeX  RDF
1Richard E. Newman-Wolfe, Balaji R. Venkatraman Performance analysis of a method for high level prevention of traffic analysis. Search on Bibsonomy ACSAC The full citation details ... 1992 DBLP  DOI  BibTeX  RDF
1Michael V. Joyce Access control and applications on trusted systems. Search on Bibsonomy ACSAC The full citation details ... 1992 DBLP  DOI  BibTeX  RDF
1Charles W. Kurak Jr., John McHugh A cautionary note on image downgrading. Search on Bibsonomy ACSAC The full citation details ... 1992 DBLP  DOI  BibTeX  RDF
1Ricki Andrew Vick An overview of the AMC WWMCCS CAT Guard. Search on Bibsonomy ACSAC The full citation details ... 1992 DBLP  DOI  BibTeX  RDF
1Sharon R. Lewis, Simon R. Wiseman, Neil D. Poulter Providing security in a phone book database using triggers. Search on Bibsonomy ACSAC The full citation details ... 1992 DBLP  DOI  BibTeX  RDF
1Semyon Dukach SNPP: A simple network payment protocol. Search on Bibsonomy ACSAC The full citation details ... 1992 DBLP  DOI  BibTeX  RDF
1Paul Ammann, Ravi S. Sandhu Implementing transaction control expressions by checking for absence of access rights. Search on Bibsonomy ACSAC The full citation details ... 1992 DBLP  DOI  BibTeX  RDF
1W. Douglas Maughan Standards for computer systems security: An interoperability analysis of SDNS SP3 and ISO NLSP. Search on Bibsonomy ACSAC The full citation details ... 1992 DBLP  DOI  BibTeX  RDF
1Christine Arangio, Tom Chen, Steve Neidhardt Security Products (Security Pro) Transition Analysis Facility (STAF): Pragmatic concepts for MLS technology transition. Search on Bibsonomy ACSAC The full citation details ... 1992 DBLP  DOI  BibTeX  RDF
1Günther Pernul Security constraint processing during multilevel secure database design. Search on Bibsonomy ACSAC The full citation details ... 1992 DBLP  DOI  BibTeX  RDF
1Deborah J. Bodeau A conceptual model for computer security risk analysis. Search on Bibsonomy ACSAC The full citation details ... 1992 DBLP  DOI  BibTeX  RDF
1Peter A. Loscocco, William R. Kutz, Dale M. Johnson, Ronald J. Watro Dealing with the dynamics of security: Flexibility with utility in an MLS LAN. Search on Bibsonomy ACSAC The full citation details ... 1992 DBLP  DOI  BibTeX  RDF
1Amy Wu, Eric R. Anderson 0001, Cristi Garvey Secure system architectures and integration. Search on Bibsonomy ACSAC The full citation details ... 1992 DBLP  DOI  BibTeX  RDF
1James O. Bondi Trustable computing in next-generation avionic architectures. Search on Bibsonomy ACSAC The full citation details ... 1992 DBLP  DOI  BibTeX  RDF
1C. J. Testa, B. D. Wilner, Virgil D. Gligor Trusted RUBIX architecture and policy model interpretation. Search on Bibsonomy ACSAC The full citation details ... 1992 DBLP  DOI  BibTeX  RDF
1S. P. Bennett, Muninder P. Kailay An application of qualitative risk analysis to computer security for the commercial sector. Search on Bibsonomy ACSAC The full citation details ... 1992 DBLP  DOI  BibTeX  RDF
1John A. McDermid, Qi Shi 0001 Secure composition of systems. Search on Bibsonomy ACSAC The full citation details ... 1992 DBLP  DOI  BibTeX  RDF
1James P. Anderson Computer security myths mythtakes or 'The real security problem is...'. Search on Bibsonomy ACSAC The full citation details ... 1992 DBLP  DOI  BibTeX  RDF
1Jeffrey Picciotto, Jeremy Epstein A comparison of trusted X security policies, architectures, and interoperability. Search on Bibsonomy ACSAC The full citation details ... 1992 DBLP  DOI  BibTeX  RDF
1William Brierley Integrating cryptography into trusted systems: A criteria approach. Search on Bibsonomy ACSAC The full citation details ... 1992 DBLP  DOI  BibTeX  RDF
1Selwyn Russell Paradigms for verification of authorization at source of electronic documents in an integrated environment. Search on Bibsonomy ACSAC The full citation details ... 1992 DBLP  DOI  BibTeX  RDF
1 Seventh Annual Computer Security Applications Conference, ACSAC 1991, 2-6 December, 1991, San Antonio, Texas, USA Search on Bibsonomy ACSAC The full citation details ... 1991 DBLP  BibTeX  RDF
1Paul Ammann, Ravi S. Sandhu, Gurpreet S. Suri A distributed implementation of the extended schematic protection model. Search on Bibsonomy ACSAC The full citation details ... 1991 DBLP  DOI  BibTeX  RDF
1Maria M. King Rebus passwords. Search on Bibsonomy ACSAC The full citation details ... 1991 DBLP  DOI  BibTeX  RDF
1R. A. Gove, Lisa M. Jaworski, John G. Williams To Bell and back: developing a formal security policy model for a C 2 system. Search on Bibsonomy ACSAC The full citation details ... 1991 DBLP  DOI  BibTeX  RDF
1John P. McDermott, Sushil Jajodia, Ravi S. Sandhu A single-level scheduler for the replicated architecture for multilevel-secure databases. Search on Bibsonomy ACSAC The full citation details ... 1991 DBLP  DOI  BibTeX  RDF
1Dale A. Moir An implementation of access control using a salient feature of primes. Search on Bibsonomy ACSAC The full citation details ... 1991 DBLP  DOI  BibTeX  RDF
1John P. Nestor Security modelling using hierarchical state machines. Search on Bibsonomy ACSAC The full citation details ... 1991 DBLP  DOI  BibTeX  RDF
1Marie Collins, William R. Ford, Bhavani Thuraisingham Security constraint processing during the update operation in a multilevel secure database management system. Search on Bibsonomy ACSAC The full citation details ... 1991 DBLP  DOI  BibTeX  RDF
1Edward A. Schneider Verification of the security of a secure network component. Search on Bibsonomy ACSAC The full citation details ... 1991 DBLP  DOI  BibTeX  RDF
1Jeffrey Picciotto Towards trusted cut and paste in the X Window System. Search on Bibsonomy ACSAC The full citation details ... 1991 DBLP  DOI  BibTeX  RDF
1Samuel I. Schaen, Brian W. McKenney Network auditing: issues and recommendations. Search on Bibsonomy ACSAC The full citation details ... 1991 DBLP  DOI  BibTeX  RDF
1Daniel Galik, Brian Tretick Fielding multilevel security into command and control systems. Search on Bibsonomy ACSAC The full citation details ... 1991 DBLP  DOI  BibTeX  RDF
1Richard E. Newman-Wolfe, Balaji R. Venkatraman High level prevention of traffic analysis. Search on Bibsonomy ACSAC The full citation details ... 1991 DBLP  DOI  BibTeX  RDF
1Günther Pernul, Gottfried Luef A multilevel secure relational data model based on views. Search on Bibsonomy ACSAC The full citation details ... 1991 DBLP  DOI  BibTeX  RDF
1Doug Nelson, Chip Paradise Using polyinstantiation to develop an MLS application. Search on Bibsonomy ACSAC The full citation details ... 1991 DBLP  DOI  BibTeX  RDF
1Boris Y. Kogan, Sushil Jajodia An audit model for object-oriented databases. Search on Bibsonomy ACSAC The full citation details ... 1991 DBLP  DOI  BibTeX  RDF
1Bob P. Weems, Wen-Gong Shieh, Muhammad Jaseemuddin Complete containment sets and their application to the inference problem. Search on Bibsonomy ACSAC The full citation details ... 1991 DBLP  DOI  BibTeX  RDF
1Linda B. Lankewicz, Mark Benard Real-time anomaly detection using a nonparametric pattern recognition approach. Search on Bibsonomy ACSAC The full citation details ... 1991 DBLP  DOI  BibTeX  RDF
1Patrick W. Mallet Considerations for applying disk encryptors to environments subject to hostile overrun. Search on Bibsonomy ACSAC The full citation details ... 1991 DBLP  DOI  BibTeX  RDF
1Howard L. Johnson, Chuck Arvin, Earl Jenkinson, Bob Pierce Proposed security for critical Air Force missions. Search on Bibsonomy ACSAC The full citation details ... 1991 DBLP  DOI  BibTeX  RDF
1S. C. Hansen, Elizabeth A. Unger Domain reduction dependencies: A new type of dependency for statistical database security. Search on Bibsonomy ACSAC The full citation details ... 1991 DBLP  DOI  BibTeX  RDF
1Robert E. Niemeyer, V. A. Ashby Observations on integrating multilevel secure components into system high distributed systems. Search on Bibsonomy ACSAC The full citation details ... 1991 DBLP  DOI  BibTeX  RDF
1Joseph C. Chao, Mahalakshmi Komaravolu, Carol Lin, Gavin Yiu Modeling internal controls of automated teller machine (ATM) systems: A computerized decision aid for design and evaluation. Search on Bibsonomy ACSAC The full citation details ... 1991 DBLP  DOI  BibTeX  RDF
1Jeremy Epstein, John McHugh, Rita Pascale, Hilarie K. Orman, Glenn S. Benson, Charles R. Martin, Ann B. Marmor-Squires, Bonnie P. Danner, Martha A. Branstad A prototype B3 trusted X Window System. Search on Bibsonomy ACSAC The full citation details ... 1991 DBLP  DOI  BibTeX  RDF
1Charles R. Pierce Security considerations in the acquisition of computer systems. Search on Bibsonomy ACSAC The full citation details ... 1991 DBLP  DOI  BibTeX  RDF
1Hal Tipton Professional certification for security practitioners. Search on Bibsonomy ACSAC The full citation details ... 1990 DBLP  DOI  BibTeX  RDF
1Eugen M. Bacic The Canadian trusted computer product evaluation criteria. Search on Bibsonomy ACSAC The full citation details ... 1990 DBLP  DOI  BibTeX  RDF
1William Wilson, Joel Sachs, David Wichers, Peter K. Boucher MLS and trust issues at the user interface in MLS AISs. Search on Bibsonomy ACSAC The full citation details ... 1990 DBLP  DOI  BibTeX  RDF
1John P. McDermott, Judith N. Froscher, Christian N. Payne, Herman Otto Lubbes Informal top-level specifications for trusted application systems. Search on Bibsonomy ACSAC The full citation details ... 1990 DBLP  DOI  BibTeX  RDF
1Cynthia E. Irvine, Roger R. Schell, Linda L. Vetter Architecture for an embedded secure data base management system. Search on Bibsonomy ACSAC The full citation details ... 1990 DBLP  DOI  BibTeX  RDF
1Eric S. Maiwald A solution to the cascade problem for dynamic network. Search on Bibsonomy ACSAC The full citation details ... 1990 DBLP  DOI  BibTeX  RDF
1R. Ward, P. Skeffington Network management security. Search on Bibsonomy ACSAC The full citation details ... 1990 DBLP  DOI  BibTeX  RDF
1Vijay Varadharajan, Stewart Black A multilevel security model for a distributed object-oriented system. Search on Bibsonomy ACSAC The full citation details ... 1990 DBLP  DOI  BibTeX  RDF
1Deborah J. Bodeau, Mary Jo Reece A multilevel-mode system for space applications: lessons learned. Search on Bibsonomy ACSAC The full citation details ... 1990 DBLP  DOI  BibTeX  RDF
1Teresa F. Lunt, Ann Tamaru, Fred Gilham, R. Jagannathan, Peter G. Neumann, Caveh Jalali IDES: a progress report [Intrusion-Detection Expert System]. Search on Bibsonomy ACSAC The full citation details ... 1990 DBLP  DOI  BibTeX  RDF
1William T. Maimone, Ira B. Greenberg Single-level multiversion schedulers for multilevel secure database systems. Search on Bibsonomy ACSAC The full citation details ... 1990 DBLP  DOI  BibTeX  RDF
1Eugen M. Bacic Process Execution Controls: revisited. Search on Bibsonomy ACSAC The full citation details ... 1990 DBLP  DOI  BibTeX  RDF
1Steve H. Weingart, Steve R. White, William C. Arnold, Glen P. Double An evaluation system for the physical security of computing systems. Search on Bibsonomy ACSAC The full citation details ... 1990 DBLP  DOI  BibTeX  RDF
1Kevin V. Murphy, Gunnar Soberg ODA and POSIX: label liaisons. Search on Bibsonomy ACSAC The full citation details ... 1990 DBLP  DOI  BibTeX  RDF
1Lance J. Hoffman, Russell J. Davis Security pipeline interface (SPI). Search on Bibsonomy ACSAC The full citation details ... 1990 DBLP  DOI  BibTeX  RDF
1Michael Roe, Tom Casey Integrating cryptography in the trusted computing base. Search on Bibsonomy ACSAC The full citation details ... 1990 DBLP  DOI  BibTeX  RDF
1Thomas D. Garvey, Teresa F. Lunt Multilevel security for knowledge based systems. Search on Bibsonomy ACSAC The full citation details ... 1990 DBLP  DOI  BibTeX  RDF
1Bonnie P. Danner, Ann B. Marmor-Squires An advanced process model's application to trusted X Window system development. Search on Bibsonomy ACSAC The full citation details ... 1990 DBLP  DOI  BibTeX  RDF
1Raymond M. Wong A comparison of secure UNIX operating systems. Search on Bibsonomy ACSAC The full citation details ... 1990 DBLP  DOI  BibTeX  RDF
1Hidenori Nakamura, Kazuyuki Takagi, Ken-ichi Okada, Yutaka Matsushita Hierarchical group oriented key management method HGK. Search on Bibsonomy ACSAC The full citation details ... 1990 DBLP  DOI  BibTeX  RDF
1Patrick W. Mallett An example application of the trusted network interpretation. Search on Bibsonomy ACSAC The full citation details ... 1990 DBLP  DOI  BibTeX  RDF
1Lynn McNulty Professional certification for computer security professionals. Search on Bibsonomy ACSAC The full citation details ... 1990 DBLP  DOI  BibTeX  RDF
1Archibald McKinlay Software safety and security. Search on Bibsonomy ACSAC The full citation details ... 1990 DBLP  DOI  BibTeX  RDF
1Matt Bishop A security analysis of the NTP protocol version 2. Search on Bibsonomy ACSAC The full citation details ... 1990 DBLP  DOI  BibTeX  RDF
1Dan J. Thomsen, J. Thomas Haigh A comparison of type enforcement and Unix setuid implementation of well-formed transactions. Search on Bibsonomy ACSAC The full citation details ... 1990 DBLP  DOI  BibTeX  RDF
1Judith N. Froscher, John P. McDermott, Christian N. Payne, Herman Otto Lubbes Successful acquisition of certifiable application systems (or: How not to shake hands with the tar baby). Search on Bibsonomy ACSAC The full citation details ... 1990 DBLP  DOI  BibTeX  RDF
1William M. Garrabrants, Alfred W. Ellis III, Lance J. Hoffman, Magdi N. Kamel CERTS: a comparative evaluation method for risk management methodologies and tools. Search on Bibsonomy ACSAC The full citation details ... 1990 DBLP  DOI  BibTeX  RDF
1Frank L. Mayer A brief comparison of two different environmental guidelines for determining 'levels of trust' [computer security]. Search on Bibsonomy ACSAC The full citation details ... 1990 DBLP  DOI  BibTeX  RDF
1Russell J. Davis Software checking with the Auditor's Aid. Search on Bibsonomy ACSAC The full citation details ... 1990 DBLP  DOI  BibTeX  RDF
1Paul A. Lambert The lowdown on lower layer security protocols. Search on Bibsonomy ACSAC The full citation details ... 1990 DBLP  DOI  BibTeX  RDF
1 Sixth Annual Computer Security Applications Conference, ACSAC 1990, 3-7 December, 1990, Tucson, Arizona, USA Search on Bibsonomy ACSAC The full citation details ... 1990 DBLP  BibTeX  RDF
1Elizabeth A. Unger, Sallie Keller-McNulty, Paul Connelly Natural change in dynamic databases as a deterrent to compromise by trackers. Search on Bibsonomy ACSAC The full citation details ... 1990 DBLP  DOI  BibTeX  RDF
1Samuel Doncaster, Michael Endsley, Greg Factor Rehosting existing command and control systems into a multilevel secure environment. Search on Bibsonomy ACSAC The full citation details ... 1990 DBLP  DOI  BibTeX  RDF
1J. Noelle McAuliffe, Dawn Wolcott, Lorrayne J. Schaefer, Nancy L. Kelem, Brian Hubbard, Theresa K. Haley Is your computer being misused? A survey of current intrusion detection system technology. Search on Bibsonomy ACSAC The full citation details ... 1990 DBLP  DOI  BibTeX  RDF
1Robert T. Vitter ICCP Systems Security specialty exam. Search on Bibsonomy ACSAC The full citation details ... 1990 DBLP  DOI  BibTeX  RDF
1Wen-Gong Shieh, Bob P. Weems, Krishna M. Kavi An n-grid model for group authorization. Search on Bibsonomy ACSAC The full citation details ... 1990 DBLP  DOI  BibTeX  RDF
1Sushil Jajodia, Ravi S. Sandhu, Edgar H. Sibley Update semantics for multilevel relations. Search on Bibsonomy ACSAC The full citation details ... 1990 DBLP  DOI  BibTeX  RDF
1Paul Ammann, Ravi S. Sandhu Extending the creation operation in the Schematic Protection Model. Search on Bibsonomy ACSAC The full citation details ... 1990 DBLP  DOI  BibTeX  RDF
1Tsau Young Lin Probabilistic measure on aggregations [data security]. Search on Bibsonomy ACSAC The full citation details ... 1990 DBLP  DOI  BibTeX  RDF
1Elizabeth A. Unger, Lein Harn, Vijay Kumar 0002 Entropy as a measure of database information. Search on Bibsonomy ACSAC The full citation details ... 1990 DBLP  DOI  BibTeX  RDF
1Jeremy Epstein A prototype for Trusted X labeling policies. Search on Bibsonomy ACSAC The full citation details ... 1990 DBLP  DOI  BibTeX  RDF
Displaying result #1501 - #1600 of 1667 (100 per page; Change: )
Pages: [<<][6][7][8][9][10][11][12][13][14][15][16][17][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license