|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 738 occurrences of 436 keywords
|
|
|
Results
Found 1667 publication records. Showing 1667 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Simon N. Foley |
Supporting Secure Canonical Upgrade Policies in Multilevel Secure Object Stores. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 13th Annual Computer Security Applications Conference (ACSAC 1997), 8-12 December 1997, San Diego, CA, USA, pp. 69-80, 1997, IEEE Computer Society, 0-8186-8274-4. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
secure canonical upgrade policies, multilevel secure object stores, multilevel relabel policies, high-level subjects, low-level security labels, message filter model, object-oriented database, security of data |
1 | Sharon R. Lewis, Simon R. Wiseman |
Securing an Object Relational Database. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 13th Annual Computer Security Applications Conference (ACSAC 1997), 8-12 December 1997, San Diego, CA, USA, pp. 59-68, 1997, IEEE Computer Society, 0-8186-8274-4. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
bject-oriented databases, object relational database security, Trojan Horse software, business constraints, accounting information, risks, COTS, commercial off the shelf, data access, security labelling |
1 | Carl E. Landwehr |
Protecting Unattended Computers Without Software. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 13th Annual Computer Security Applications Conference (ACSAC 1997), 8-12 December 1997, San Diego, CA, USA, pp. 274-, 1997, IEEE Computer Society, 0-8186-8274-4. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
unattended computer protection, hardware-based system, unauthorized use, physical access, prototype, workstations, office automation, assurance, office environment |
1 | S. Cheung |
An Efficient Message Authentication Scheme for Link State Routing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 13th Annual Computer Security Applications Conference (ACSAC 1997), 8-12 December 1997, San Diego, CA, USA, pp. 90-98, 1997, IEEE Computer Society, 0-8186-8274-4. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
message authentication scheme, routing cost reduction, routing updates, border routers, public-key based schemes, computationally expensive, detection-diagnosis-recovery approach, multiple-valued cost metrics, routing protocols, message authentication, link state routing, large networks |
1 | T. F. Himdi, Ravi S. Sandhu |
Lattice Based Models for Controlled Sharing of Confidential Information in the Saudi Hajj System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 13th Annual Computer Security Applications Conference (ACSAC 1997), 8-12 December 1997, San Diego, CA, USA, pp. 164-174, 1997, IEEE Computer Society, 0-8186-8274-4. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
lattice based models, controlled sharing, confidential information, Saudi Hajj system, pilgrimage, annual event, Saudi Arabia, government ministries, trusted environment, Saudi ministries, no obligation access security, Chinese Wall security, information flow policy, interoperability, confidentiality, data sharing, security requirements, security requirement, government data processing, shared data, multi level security |
1 | John P. McDermott, R. Gelinas, S. Ornstein |
Doc, Wyatt, and Virgil: Prototyping Storage Jamming Defenses. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 13th Annual Computer Security Applications Conference (ACSAC 1997), 8-12 December 1997, San Diego, CA, USA, pp. 265-, 1997, IEEE Computer Society, 0-8186-8274-4. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
Doc, Wyatt, Virgil, storage jamming defense, storage jamming attack detection, replay defense, attack source determination, attack pattern determination, object-oriented data storage, application-specific techniques, access control, encryption, auditing, software prototyping, checksums, virus detection, prototype tools, logical replication, information warfare |
1 | F. C. Smith |
Ethical Responsibilities and Legal Liabilities of Network Security Professionals. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 13th Annual Computer Security Applications Conference (ACSAC 1997), 8-12 December 1997, San Diego, CA, USA, pp. 239-250, 1997, IEEE Computer Society, 0-8186-8274-4. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
ethical responsibilities, legal liabilities, network security professionals, tort litigation, unregulated economic environment, public law enforcement, criminal abuses, technical solutions, civil wrongs, individual liberty, group liberty, criminal law, civil law, computer literate lawyers, computer security failures, millennium bug, legal liability, social redress, computer networks, computer networking, morality, network vulnerabilities, Year 2000 problem |
1 | |
13th Annual Computer Security Applications Conference (ACSAC 1997), 8-12 December 1997, San Diego, CA, USA ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![IEEE Computer Society, 0-8186-8274-4 The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP BibTeX RDF |
|
1 | Eberhard von Faber, R. Hammelrath, F.-P. Heider |
The Secure Distribution of Digital Contents. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 13th Annual Computer Security Applications Conference (ACSAC 1997), 8-12 December 1997, San Diego, CA, USA, pp. 16-, 1997, IEEE Computer Society, 0-8186-8274-4. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
secure distribution, encrypted digital contents, freely accessible distribution media, key management system, payment authorisation, casual customers, nonregistered users, software setup, contract conclusion, registration processes, content re-selling, business-to-business environment, cryptography, electronic commerce, workflow management, decryption, payment systems |
1 | P. Greve, J. Hoffman, R. E. Smith |
Using Type Enforcement to Assure a Configurable Guard. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 13th Annual Computer Security Applications Conference (ACSAC 1997), 8-12 December 1997, San Diego, CA, USA, pp. 146-, 1997, IEEE Computer Society, 0-8186-8274-4. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
type enforcement, configurable guard, guard systems, administrator configurable guard, input channel, connected output channel, assured processes, assurance arguments, operational guards, pipeline, electronic mail, electronic mail, trusted components |
1 | R. E. Niemeyer |
Using Web Technologies in Two MLS Environments: A Security Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 13th Annual Computer Security Applications Conference (ACSAC 1997), 8-12 December 1997, San Diego, CA, USA, pp. 205-, 1997, IEEE Computer Society, 0-8186-8274-4. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
World Wide Web technologies, multi-level secure systems, single-level network environments, Web browser software, security sensitivity level, information transfer, security boundaries, security classification, network client, malicious code insertion, Trojan horse code, primary information flow direction, Internet, HTTP, Web server, security of data, intranet, threats, security vulnerabilities, computer viruses, database server, HyperText Transfer Protocol, denial of service attacks |
1 | Dixie B. Baker, Robert M. Barnhart, T. T. Buss |
PCASSO: Applying and Extending State-of-the-Art Security in the Healthcare Domain. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 13th Annual Computer Security Applications Conference (ACSAC 1997), 8-12 December 1997, San Diego, CA, USA, pp. 251-, 1997, IEEE Computer Society, 0-8186-8274-4. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
PCASSO, Patient Centered Access to Secure Systems Online, healthcare domain, patient privacy protection, life-critical information, patient empowerment, safety, security of data, Internet access, security technology, sensitive information |
1 | Christoph L. Schuba, Eugene H. Spafford |
A Reference Model for Firewall Technology. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 13th Annual Computer Security Applications Conference (ACSAC 1997), 8-12 December 1997, San Diego, CA, USA, pp. 133-, 1997, IEEE Computer Society, 0-8186-8274-4. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
firewall technology, technological aspect, specialized engineering solution, firewall systems, integrity assurance, centralized security policy, authentication, access control, audit, reference model, computer network management, networking technologies, communications security |
1 | C. Cant, Simon R. Wiseman |
Simple Assured Bastion Hosts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 13th Annual Computer Security Applications Conference (ACSAC 1997), 8-12 December 1997, San Diego, CA, USA, pp. 24-33, 1997, IEEE Computer Society, 0-8186-8274-4. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
assured firewalls, compartmented mode workstation, ITSEC E3 assurance, evaluation effort reuse, bastion host architecture, unevaluated proxies, information exporting, trusted path export sanction, evaluated release checker, authorisation |
1 | Chih-Hung Wang, Tzonelih Hwang |
Threshold and Generalized DSS Signatures without a Trusted Party. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 13th Annual Computer Security Applications Conference (ACSAC 1997), 8-12 December 1997, San Diego, CA, USA, pp. 221-226, 1997, IEEE Computer Society, 0-8186-8274-4. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
(t+1,n) threshold signature scheme, generalized DSS signatures, trusted party, secret key sharing, valid group signature, Digital Signature Standard, signers, conspiracy, signing procedure, cryptography |
1 | J. Hoffman |
Implementing RBAC on a Type Enforced System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 13th Annual Computer Security Applications Conference (ACSAC 1997), 8-12 December 1997, San Diego, CA, USA, pp. 158-163, 1997, IEEE Computer Society, 0-8186-8274-4. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
type enforced system, security database implementations, RBAC mechanisms, LOCK6, RBAC features, firewall construction, lower level mechanism, type enforcement, Role Based Access Control, authorisation, application domain, application domains, secure operating system |
1 | Karen A. Oostendorp, Lee Badger, C. D. Vance, W. G. Morrison, Michael J. Petkac, David L. Sherman, Daniel F. Sterne |
Domain and Type Enforcement Firewalls. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 13th Annual Computer Security Applications Conference (ACSAC 1997), 8-12 December 1997, San Diego, CA, USA, pp. 122-132, 1997, IEEE Computer Society, 0-8186-8274-4. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
type enforcement firewalls, Internet connected organizations, Internet firewall, system penetration, business practices, external entities, Domain and Type Enforcement, DTE firewall, application level proxies, restrictive domains, network based attacks, local resources, role based security policies, DTE security attributes, DTE clients, Internet, access control, security policies, HTTP, servers, network services, security breaches, FTP |
1 | Bob Askwith, Madjid Merabti, Qi Shi 0001, K. Whiteley |
Achieving User Privacy in Mobile Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 13th Annual Computer Security Applications Conference (ACSAC 1997), 8-12 December 1997, San Diego, CA, USA, pp. 108-, 1997, IEEE Computer Society, 0-8186-8274-4. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
third generation mobile networks, identification privacy, untrusted party, digital mixes, token based scheme, authorised third parties, billing requirements, coin like tokens, authentication, anonymity, cellular radio, user privacy, privacy requirements |
1 | John A. Davidson |
Asymmetric Isolation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 12th Annual Computer Security Applications Conference (ACSAC 1996), 9-13 December 1996, San Diego, CA, USA, pp. 44-54, 1996, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
asymmetric isolation, unidirectional security, risk-free multi-level security, absolute security rule enforcement, security violations, multi-level communication handshaking, multiple single-level nodes, unidirectional links, hardware-enforced security, performance, cost, security of data, legacy systems, mandatory access control, downgrading |
1 | Mark S. Anderson 0001, Christopher James North, John Edmund Griffin, Robert Brunyee Milner, John D. Yesberg, Kenneth Kwok-Hei Yiu |
Starlight: Interactive Link. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 12th Annual Computer Security Applications Conference (ACSAC 1996), 9-13 December 1996, San Diego, CA, USA, pp. 55-63, 1996, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
Interactive Link, Starlight research program, military-relevant information security capabilities, retrofittable device, commercial off-the-shelf workstations, classified networks, unclassified networks, authorising government agencies, untrusted graphical windowing applications, X Windows applications, Microsoft Windows applications, Internet, interactive systems, personal computers, cost-effectiveness, security levels, interactive access |
1 | Myong H. Kang, Ira S. Moskowitz, Bruce E. Montrose, James J. Parsonese |
A Case Study Of Two Nrl Pump Prototypes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 12th Annual Computer Security Applications Conference (ACSAC 1996), 9-13 December 1996, San Diego, CA, USA, pp. 32-43, 1996, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
NRL Pump, data pump, interconnected computer systems, process layer, 4-layer network reference model, DOS-Pump, D-Pump, event-driven Pump, E-Pump, performance, prototypes, congestion control, case study, fairness, open systems, open systems, covert channels, hardware implementation, secure communication, transport layer, reliable communication, threats, denial-of-service attacks |
1 | John Kelsey, Bruce Schneier, Chris Hall |
An Authenticated Camera. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 12th Annual Computer Security Applications Conference (ACSAC 1996), 9-13 December 1996, San Diego, CA, USA, pp. 24-30, 1996, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
authenticated camera, protocols, cameras, digital image, police, base station |
1 | Teresa F. Lunt, John Kimmins, Bob McKosky |
Security and the National Telecommunications Infrastructure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 12th Annual Computer Security Applications Conference (ACSAC 1996), 9-13 December 1996, San Diego, CA, USA, pp. 138, 1996, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
|
1 | Brigitte Althen, Gerd Enste, Brigitte Nebelung |
Innovative Secure Payments On The Internet Using The German Electronic Purse. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 12th Annual Computer Security Applications Conference (ACSAC 1996), 9-13 December 1996, San Diego, CA, USA, pp. 88-93, 1996, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
secure payments, German electronic purse, off-line terminals, merchant's site, Internet, security mechanisms, EFTS |
1 | Andreas Sterbenz |
An Evaluation of the Java Security Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 12th Annual Computer Security Applications Conference (ACSAC 1996), 9-13 December 1996, San Diego, CA, USA, pp. 2-14, 1996, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
Java security model, untrusted programs, secure environment, efficiency, flexibility, security of data |
1 | I-Lung Kao, Randy Chow |
An Extended Capability Architecture To Enforce Dynamic Access Control Policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 12th Annual Computer Security Applications Conference (ACSAC 1996), 9-13 December 1996, San Diego, CA, USA, pp. 148-157, 1996, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
extended capability architecture, dynamic access control policies, user process, object access, access request, centralized access control lists, object protection, capability based systems, static access control policies, access privileges, capability systems, access history, capability management, distributed systems, distributed system, distributed processing, security policies, access rights, object manager, object managers |
1 | Manfred Holzbach |
Security Measures For The Austrian "Paychip" Electronic Purse Application. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 12th Annual Computer Security Applications Conference (ACSAC 1996), 9-13 December 1996, San Diego, CA, USA, pp. 69-77, 1996, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
PAYCHIP, management-oriented description, Austrian nationwide electronic purse scheme, QUICK scheme, national security policy, security level evaluation, payment security maintenance, chip-card based payment infrastructure, Europay Austria, security of data, design principles, security measures |
1 | Joel E. Sachs |
Major Questions in Applying the SSE-CMM. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 12th Annual Computer Security Applications Conference (ACSAC 1996), 9-13 December 1996, San Diego, CA, USA, pp. 247-248, 1996, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
|
1 | Julie L. Connolly |
Operation chain link: the deployment of a firewall at Hanscom Air Force Base. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 12th Annual Computer Security Applications Conference (ACSAC 1996), 9-13 December 1996, San Diego, CA, USA, pp. 170-177, 1996, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
operation chain link, Hanscom Air Force Base, Electronic Systems Center, unclassified network, Internet threats, network security assessments, hacker break-in, firewall development team, firewall deployment, security management, military computing |
1 | Richard E. Smith |
Mandatory Protection for Internet Server Software. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 12th Annual Computer Security Applications Conference (ACSAC 1996), 9-13 December 1996, San Diego, CA, USA, pp. 178-184, 1996, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
multilevel security applications, Internet server software, server overrun, attack code, server host, mandatory protection mechanisms, commercial systems, Unix chroot isolation, type enforcement, server protection, Internet, MLS, security flaws |
1 | Vijay Varadharajan, Yi Mu 0001 |
On The Design Of Secure Electronic Payment Schemes For Internet. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 12th Annual Computer Security Applications Conference (ACSAC 1996), 9-13 December 1996, San Diego, CA, USA, pp. 78-87, 1996, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
secure electronic payment schemes, commercial electronic credit card transactions, iKP, STT, SEPP, permission-based payment protocol, PBP protocol, purchase request phase, payment phase, secret private key, Internet, disputes, EFTS |
1 | Jeremy Epstein, Tim Williams |
Using Fortezza For Transparent File Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 12th Annual Computer Security Applications Conference (ACSAC 1996), 9-13 December 1996, San Diego, CA, USA, pp. 140-147, 1996, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
Fortezza, transparent file encryption, SISTex, Assure Basic product, security features, DOS/Windows environment, DES based file encryption, Fortezza card, Skipjack algorithm, technical problems, access controls, cryptography, Data Encryption Standard, product development |
1 | E. John Sebes, Terry C. Vickers Benzel |
SIGMA: Security For Distributed Object Interoperability Between Trusted And Untrusted Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 12th Annual Computer Security Applications Conference (ACSAC 1996), 9-13 December 1996, San Diego, CA, USA, pp. 158-168, 1996, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
SIGMA project, distributed object interoperability, trusted systems, untrusted systems, object oriented services, CORBA based application interoperation, distributed systems, Common Object Request Broker Architecture, security policy, open systems, distributed computing environments, security technologies |
1 | Richard A. Kemmerer, Tad Taylor |
A Modular Covert Channel Analysis Methodology for Trusted DG/UXTM. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 12th Annual Computer Security Applications Conference (ACSAC 1996), 9-13 December 1996, San Diego, CA, USA, pp. 224-235, 1996, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
modular covert channel analysis methodology, Trusted DG/UX, CCA approach, subsystem architecture, DG/UX kernel, system state, abstract object, Ratings Maintenance Program, RAMP, SRM analysis, exported function, peer subsystems, kernel-wide SRM, commercial strength Unix system, operating system kernels, system calls, modular approach |
1 | Eric M. Kayden |
Using a Proxy X Server to Facilitate COTS Application Integration. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 12th Annual Computer Security Applications Conference (ACSAC 1996), 9-13 December 1996, San Diego, CA, USA, pp. 185-190, 1996, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
proxy X Window System server, COTS application integration, XPatch, trusted X Window system implementations, portability issues, accreditation issues, multiprogramming |
1 | |
12th Annual Computer Security Applications Conference (ACSAC 1996), 9-13 December 1996, San Diego, CA, USA ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![IEEE Computer Society The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP BibTeX RDF |
|
1 | Pierre Bieber |
Formal Techniques for an ITSEC-E4 Secure Gateway. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 12th Annual Computer Security Applications Conference (ACSAC 1996), 9-13 December 1996, San Diego, CA, USA, pp. 236-245, 1996, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
ITSEC-E4 secure gateway, interactive theorem prover, Information Technology Security Evaluation Criteria, formal specification, security policy, security architecture, formal technique, functional specifications |
1 | Herve Hosy, Mary Schanken |
Common Criteria Activities and Alternative Assurance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 12th Annual Computer Security Applications Conference (ACSAC 1996), 9-13 December 1996, San Diego, CA, USA, pp. 65, 1996, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
|
1 | Mary Schanken |
SSE-CMM Pilot Results. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 12th Annual Computer Security Applications Conference (ACSAC 1996), 9-13 December 1996, San Diego, CA, USA, pp. 67, 1996, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
|
1 | Rae K. Burns, Yi-Fang Koh |
A Comparison of Multilevel Structured Query Language (SQL) Implementations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 12th Annual Computer Security Applications Conference (ACSAC 1996), 9-13 December 1996, San Diego, CA, USA, pp. 192-202, 1996, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
|
1 | Mansour Esmaili, Bala Balachandran, Reihaneh Safavi-Naini, Josef Pieprzyk |
Case-Based Reasoning for Intrusion Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 12th Annual Computer Security Applications Conference (ACSAC 1996), 9-13 December 1996, San Diego, CA, USA, pp. 214-223, 1996, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
model based expert systems, case based reasoning approach, artificial intelligence, intrusion detection, authorisation |
1 | Michael Hitchens, Vijay Varadharajan |
esign Choices For Symmetric Key Based Inter-Domain Authentication Protocols In Distributed Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 12th Annual Computer Security Applications Conference (ACSAC 1996), 9-13 December 1996, San Diego, CA, USA, pp. 105-116, 1996, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
design choices, secure interactions, key establishment protocols, client responsibility, trusted server responsibility, inter-domain protocols, symmetric key systems, OSF Distributed Computing Environment, distributed systems, message authentication, authentication protocols, Kerberos |
1 | Randall W. Lichota, Grace L. Hammonds, Stephen H. Brackin |
Verifying The Correctness Of Cryptographic Protocols Using "Convince". ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 12th Annual Computer Security Applications Conference (ACSAC 1996), 9-13 December 1996, San Diego, CA, USA, pp. 117-128, 1996, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
Convince, theorem proving component, commercial computer aided software engineering tool, StP/OMT, textual notations, Higher Order Logic theorem prover, protocols, cryptographic protocols, authentication protocols, front-end, belief logic, correctness verification, automated support |
1 | M. Nash, R. J. Kennett |
Implementing Security Policy in a Large Defense Procurement. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 12th Annual Computer Security Applications Conference (ACSAC 1996), 9-13 December 1996, San Diego, CA, USA, pp. 15-23, 1996, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
|
1 | Luigi Giuri, Pietro Iglio |
A Role-Based Secure Database Design Tool. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 12th Annual Computer Security Applications Conference (ACSAC 1996), 9-13 December 1996, San Diego, CA, USA, pp. 203-212, 1996, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
role based secure database design tool, database design methodologies, secure database design methodology, entity relationship conceptual data model, role based security model, analysis algorithm, potential security design mistakes, translation procedure, SQL specification, conceptual model, entity-relationship modelling |
1 | Michael G. Reed, Paul F. Syverson, David M. Goldschlag |
Proxies For Anonymous Routing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 12th Annual Computer Security Applications Conference (ACSAC 1996), 9-13 December 1996, San Diego, CA, USA, pp. 95-104, 1996, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
anonymous routing, network traffic analysis-resistant method, flexible communications infrastructure, unmodified Internet services, Sun Solaris 2.4, World Wide Web browsing, remote logins, application-independent real-time bi-directional anonymous connections, anonymous connections, identifying information, packet-switched public network, HTTP, proxies, telecommunication network routing, electronic mail, file transfers, eavesdropping, FTP, onion routing, SMTP, public network, user anonymity |
1 | Ning Zhang, Qi Shi 0001 |
Security Issues in an EDI Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 12th Annual Computer Security Applications Conference (ACSAC 1996), 9-13 December 1996, San Diego, CA, USA, pp. 129-136, 1996, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
EDI environment, electronic transmission, trade related documents, EDI system, EDI specific security requirement, non repudiation of receipt, heterogeneous system platform, protocol, electronic data interchange, Electronic Data Interchange, security threats, security issues |
1 | Susan L. Chapin, William R. Herndon, LouAnna Notargiacomo, Melonyi L. Katz, Thomas J. Mowbray |
Security for the Common Object Request Broker Architecture (CORBA). ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 10th Annual Computer Security Applications Conference, ACSAC 1994, 5-9 December, 1994 Orlando, FL, USA, pp. 21-30, 1994, IEEE. The full citation details ...](Pics/full.jpeg) |
1994 |
DBLP DOI BibTeX RDF |
|
1 | Edward Amoroso, Michael Merritt |
Composing system integrity using I/O automata. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 10th Annual Computer Security Applications Conference, ACSAC 1994, 5-9 December, 1994 Orlando, FL, USA, pp. 34-43, 1994, IEEE. The full citation details ...](Pics/full.jpeg) |
1994 |
DBLP DOI BibTeX RDF |
|
1 | Lorrayne J. Schaefer, Brian W. McKenney |
Networked information discovery and retrieval tools: security capabilities and needs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 10th Annual Computer Security Applications Conference, ACSAC 1994, 5-9 December, 1994 Orlando, FL, USA, pp. 145-153, 1994, IEEE. The full citation details ...](Pics/full.jpeg) |
1994 |
DBLP DOI BibTeX RDF |
|
1 | Deborah J. Bodeau |
System-of-systems security engineering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 10th Annual Computer Security Applications Conference, ACSAC 1994, 5-9 December, 1994 Orlando, FL, USA, pp. 228-235, 1994, IEEE. The full citation details ...](Pics/full.jpeg) |
1994 |
DBLP DOI BibTeX RDF |
|
1 | Marcus Brown 0001, Samuel Joe Rogers |
A practical approach to user authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 10th Annual Computer Security Applications Conference, ACSAC 1994, 5-9 December, 1994 Orlando, FL, USA, pp. 108-116, 1994, IEEE. The full citation details ...](Pics/full.jpeg) |
1994 |
DBLP DOI BibTeX RDF |
|
1 | Eric A. Fisch, Gregory B. White, Udo W. Pooch |
The design of an audit trail analysis tool. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 10th Annual Computer Security Applications Conference, ACSAC 1994, 5-9 December, 1994 Orlando, FL, USA, pp. 126-132, 1994, IEEE. The full citation details ...](Pics/full.jpeg) |
1994 |
DBLP DOI BibTeX RDF |
|
1 | George Fink, Karl N. Levitt |
Property-based testing of privileged programs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 10th Annual Computer Security Applications Conference, ACSAC 1994, 5-9 December, 1994 Orlando, FL, USA, pp. 154-163, 1994, IEEE. The full citation details ...](Pics/full.jpeg) |
1994 |
DBLP DOI BibTeX RDF |
|
1 | Calvin Ko, George Fink, Karl N. Levitt |
Automated detection of vulnerabilities in privileged programs by execution monitoring. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 10th Annual Computer Security Applications Conference, ACSAC 1994, 5-9 December, 1994 Orlando, FL, USA, pp. 134-144, 1994, IEEE. The full citation details ...](Pics/full.jpeg) |
1994 |
DBLP DOI BibTeX RDF |
|
1 | Greg King |
Secure system composition: five practical initiatives. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 10th Annual Computer Security Applications Conference, ACSAC 1994, 5-9 December, 1994 Orlando, FL, USA, pp. 67-73, 1994, IEEE. The full citation details ...](Pics/full.jpeg) |
1994 |
DBLP DOI BibTeX RDF |
|
1 | Rob Dobry, Mary Schanken |
Security concerns for distributed systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 10th Annual Computer Security Applications Conference, ACSAC 1994, 5-9 December, 1994 Orlando, FL, USA, pp. 12-20, 1994, IEEE. The full citation details ...](Pics/full.jpeg) |
1994 |
DBLP DOI BibTeX RDF |
|
1 | James W. Freeman, Richard B. Neely, M. A. Heckard |
A validated security policy modeling approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 10th Annual Computer Security Applications Conference, ACSAC 1994, 5-9 December, 1994 Orlando, FL, USA, pp. 189-200, 1994, IEEE. The full citation details ...](Pics/full.jpeg) |
1994 |
DBLP DOI BibTeX RDF |
|
1 | Balaji R. Venkatraman, Richard E. Newman-Wolfe |
Performance analysis of a method for high level prevention of traffic analysis using measurements from a campus network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 10th Annual Computer Security Applications Conference, ACSAC 1994, 5-9 December, 1994 Orlando, FL, USA, pp. 288-297, 1994, IEEE. The full citation details ...](Pics/full.jpeg) |
1994 |
DBLP DOI BibTeX RDF |
|
1 | Judith A. Hemenway, Jonathan Fellows |
Applying the Abadi-Lamport composition theorem in real-world secure system integration environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 10th Annual Computer Security Applications Conference, ACSAC 1994, 5-9 December, 1994 Orlando, FL, USA, pp. 44-53, 1994, IEEE. The full citation details ...](Pics/full.jpeg) |
1994 |
DBLP DOI BibTeX RDF |
|
1 | Ravi S. Sandhu, Edward J. Coyne, Hal L. Feinstein, Charles E. Youman |
Role-based access control: a multi-dimensional view. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 10th Annual Computer Security Applications Conference, ACSAC 1994, 5-9 December, 1994 Orlando, FL, USA, pp. 54-62, 1994, IEEE. The full citation details ...](Pics/full.jpeg) |
1994 |
DBLP DOI BibTeX RDF |
|
1 | Jeremy Epstein |
Editorial: a view of cryptography in TCSEC products. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 10th Annual Computer Security Applications Conference, ACSAC 1994, 5-9 December, 1994 Orlando, FL, USA, pp. 308-309, 1994, IEEE. The full citation details ...](Pics/full.jpeg) |
1994 |
DBLP DOI BibTeX RDF |
|
1 | Judith N. Froscher, Myong H. Kang, John P. McDermott, Oliver Costich, Carl E. Landwehr |
A practical approach to high assurance multilevel secure computing service. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 10th Annual Computer Security Applications Conference, ACSAC 1994, 5-9 December, 1994 Orlando, FL, USA, pp. 2-11, 1994, IEEE. The full citation details ...](Pics/full.jpeg) |
1994 |
DBLP DOI BibTeX RDF |
|
1 | Randall E. Smith |
A secure Email gateway (building an RCAS external interface). ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 10th Annual Computer Security Applications Conference, ACSAC 1994, 5-9 December, 1994 Orlando, FL, USA, pp. 202-211, 1994, IEEE. The full citation details ...](Pics/full.jpeg) |
1994 |
DBLP DOI BibTeX RDF |
|
1 | Peter K. Boucher, Teresa F. Lunt |
A prototype multilevel-secure DoD directory. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 10th Annual Computer Security Applications Conference, ACSAC 1994, 5-9 December, 1994 Orlando, FL, USA, pp. 180-188, 1994, IEEE. The full citation details ...](Pics/full.jpeg) |
1994 |
DBLP DOI BibTeX RDF |
|
1 | C. L. Robinson, Simon R. Wiseman |
Using security models to investigate CMW design and implementation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 10th Annual Computer Security Applications Conference, ACSAC 1994, 5-9 December, 1994 Orlando, FL, USA, pp. 278-287, 1994, IEEE. The full citation details ...](Pics/full.jpeg) |
1994 |
DBLP DOI BibTeX RDF |
|
1 | Vinti Doshi, William R. Herndon, Sushil Jajodia, Catherine D. McCollum |
Benchmarking multilevel secure database systems using the MITRE benchmark. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 10th Annual Computer Security Applications Conference, ACSAC 1994, 5-9 December, 1994 Orlando, FL, USA, pp. 86-95, 1994, IEEE. The full citation details ...](Pics/full.jpeg) |
1994 |
DBLP DOI BibTeX RDF |
|
1 | Bill Neugent |
Where we stand in multilevel security (MLS): requirements, approaches, issues, and lessons learned. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 10th Annual Computer Security Applications Conference, ACSAC 1994, 5-9 December, 1994 Orlando, FL, USA, pp. 304-305, 1994, IEEE. The full citation details ...](Pics/full.jpeg) |
1994 |
DBLP DOI BibTeX RDF |
|
1 | Klaus J. Keus, Markus Ullmann |
Availability: theory and fundamentals for practical evaluation and use. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 10th Annual Computer Security Applications Conference, ACSAC 1994, 5-9 December, 1994 Orlando, FL, USA, pp. 258-264, 1994, IEEE. The full citation details ...](Pics/full.jpeg) |
1994 |
DBLP DOI BibTeX RDF |
|
1 | Eugene D. Myers |
STU-III-multilevel secure computer interface. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 10th Annual Computer Security Applications Conference, ACSAC 1994, 5-9 December, 1994 Orlando, FL, USA, pp. 170-179, 1994, IEEE. The full citation details ...](Pics/full.jpeg) |
1994 |
DBLP DOI BibTeX RDF |
|
1 | Myong H. Kang, Judith N. Froscher, Ravi Mukkamala |
Architectural impact on performance of a multilevel database system. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 10th Annual Computer Security Applications Conference, ACSAC 1994, 5-9 December, 1994 Orlando, FL, USA, pp. 76-85, 1994, IEEE. The full citation details ...](Pics/full.jpeg) |
1994 |
DBLP DOI BibTeX RDF |
|
1 | Mary M. Bernstein, Chulsoo Kim |
AOS: an avionics operating system for multi-level secure real-time environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 10th Annual Computer Security Applications Conference, ACSAC 1994, 5-9 December, 1994 Orlando, FL, USA, pp. 236-245, 1994, IEEE. The full citation details ...](Pics/full.jpeg) |
1994 |
DBLP DOI BibTeX RDF |
|
1 | Paul Proctor |
Audit reduction and misuse detection in heterogeneous environments: framework and application. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 10th Annual Computer Security Applications Conference, ACSAC 1994, 5-9 December, 1994 Orlando, FL, USA, pp. 117-125, 1994, IEEE. The full citation details ...](Pics/full.jpeg) |
1994 |
DBLP DOI BibTeX RDF |
|
1 | Kate Arndt, Michael Burgoon, Jeanne Firey, Keith Rodenhausen |
Ops/Intel interface lessons learned: the integrator's perspective. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 10th Annual Computer Security Applications Conference, ACSAC 1994, 5-9 December, 1994 Orlando, FL, USA, pp. 268-277, 1994, IEEE. The full citation details ...](Pics/full.jpeg) |
1994 |
DBLP DOI BibTeX RDF |
|
1 | Jay J. Kahn, Marshall D. Abrams |
Editorial: why bad things happen to good systems, and what to do about it. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 10th Annual Computer Security Applications Conference, ACSAC 1994, 5-9 December, 1994 Orlando, FL, USA, pp. 306-307, 1994, IEEE. The full citation details ...](Pics/full.jpeg) |
1994 |
DBLP DOI BibTeX RDF |
|
1 | Michael V. Joyce |
The effects of trusted technology on distributed applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 10th Annual Computer Security Applications Conference, ACSAC 1994, 5-9 December, 1994 Orlando, FL, USA, pp. 246-255, 1994, IEEE. The full citation details ...](Pics/full.jpeg) |
1994 |
DBLP DOI BibTeX RDF |
|
1 | Günther Pernul, Gerald Quirchmayr |
Organizing MLS databases from a data modelling point of view. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 10th Annual Computer Security Applications Conference, ACSAC 1994, 5-9 December, 1994 Orlando, FL, USA, pp. 96-105, 1994, IEEE. The full citation details ...](Pics/full.jpeg) |
1994 |
DBLP DOI BibTeX RDF |
|
1 | |
10th Annual Computer Security Applications Conference, ACSAC 1994, 5-9 December, 1994 Orlando, FL, USA ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![IEEE The full citation details ...](Pics/full.jpeg) |
1994 |
DBLP BibTeX RDF |
|
1 | Doug Rosenthal |
EINet: a secure, open network for electronic commerce. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 10th Annual Computer Security Applications Conference, ACSAC 1994, 5-9 December, 1994 Orlando, FL, USA, pp. 219-226, 1994, IEEE. The full citation details ...](Pics/full.jpeg) |
1994 |
DBLP DOI BibTeX RDF |
|
1 | David S. Goldberg |
The MITRE security perimeter. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 10th Annual Computer Security Applications Conference, ACSAC 1994, 5-9 December, 1994 Orlando, FL, USA, pp. 212-218, 1994, IEEE. The full citation details ...](Pics/full.jpeg) |
1994 |
DBLP DOI BibTeX RDF |
|
1 | Mary M. Bernstein, Terry C. Vickers Benzel |
Real-time trust with 'System Build': lessons learned. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Ninth Annual Computer Security Applications Conference, ACSAC 1993, 6-10 Decemver, 1993, Orlando, Florida, USA, pp. 130-136, 1993, IEEE. The full citation details ...](Pics/full.jpeg) |
1993 |
DBLP DOI BibTeX RDF |
|
1 | Daniel P. Faigin, Joseph Donndelinger, J. R. Jones |
A rigorous approach to determining objects. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Ninth Annual Computer Security Applications Conference, ACSAC 1993, 6-10 Decemver, 1993, Orlando, Florida, USA, pp. 159-168, 1993, IEEE. The full citation details ...](Pics/full.jpeg) |
1993 |
DBLP DOI BibTeX RDF |
|
1 | Eric M. Kayden, L. J. Schaefer |
Heterogeneous workstation to STU-III prototype. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Ninth Annual Computer Security Applications Conference, ACSAC 1993, 6-10 Decemver, 1993, Orlando, Florida, USA, pp. 100-107, 1993, IEEE. The full citation details ...](Pics/full.jpeg) |
1993 |
DBLP DOI BibTeX RDF |
|
1 | Deborah J. Bodeau, Vipin Swarup |
Integration of security services into the NORAD/USSPACECOM technical infrastructure: a case study. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Ninth Annual Computer Security Applications Conference, ACSAC 1993, 6-10 Decemver, 1993, Orlando, Florida, USA, pp. 2-10, 1993, IEEE. The full citation details ...](Pics/full.jpeg) |
1993 |
DBLP DOI BibTeX RDF |
|
1 | Selwyn Russell |
Transparent cosignatures for electronic documents. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Ninth Annual Computer Security Applications Conference, ACSAC 1993, 6-10 Decemver, 1993, Orlando, Florida, USA, pp. 82-91, 1993, IEEE. The full citation details ...](Pics/full.jpeg) |
1993 |
DBLP DOI BibTeX RDF |
|
1 | Jeremy Epstein, Rita Pascale |
User interface for a high assurance, windowing system. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Ninth Annual Computer Security Applications Conference, ACSAC 1993, 6-10 Decemver, 1993, Orlando, Florida, USA, pp. 256-264, 1993, IEEE. The full citation details ...](Pics/full.jpeg) |
1993 |
DBLP DOI BibTeX RDF |
|
1 | Raymond K. Clark, Ira B. Greenberg, Peter K. Boucher, Teresa F. Lunt, Peter G. Neumann, Douglas M. Wells, E. Douglas Jensen |
Effects of multilevel security on real-time applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Ninth Annual Computer Security Applications Conference, ACSAC 1993, 6-10 Decemver, 1993, Orlando, Florida, USA, pp. 120-129, 1993, IEEE. The full citation details ...](Pics/full.jpeg) |
1993 |
DBLP DOI BibTeX RDF |
|
1 | Ulf Carlsen |
Using logics to detect implementation-dependent flaws [cryptographic protocol design]. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Ninth Annual Computer Security Applications Conference, ACSAC 1993, 6-10 Decemver, 1993, Orlando, Florida, USA, pp. 64-73, 1993, IEEE. The full citation details ...](Pics/full.jpeg) |
1993 |
DBLP DOI BibTeX RDF |
|
1 | Sharon R. Lewis, Simon R. Wiseman |
Database design and MLS DBMSs: an unhappy alliance? ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Ninth Annual Computer Security Applications Conference, ACSAC 1993, 6-10 Decemver, 1993, Orlando, Florida, USA, pp. 232-243, 1993, IEEE. The full citation details ...](Pics/full.jpeg) |
1993 |
DBLP DOI BibTeX RDF |
|
1 | |
Ninth Annual Computer Security Applications Conference, ACSAC 1993, 6-10 Decemver, 1993, Orlando, Florida, USA ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![IEEE The full citation details ...](Pics/full.jpeg) |
1993 |
DBLP BibTeX RDF |
|
1 | John A. Fitch III, Lance J. Hoffman |
On the shortest path to network security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Ninth Annual Computer Security Applications Conference, ACSAC 1993, 6-10 Decemver, 1993, Orlando, Florida, USA, pp. 149-158, 1993, IEEE. The full citation details ...](Pics/full.jpeg) |
1993 |
DBLP DOI BibTeX RDF |
|
1 | M. O. Aldrich |
A methodology for the use of single level RDBMS software in a multi-level secured system. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Ninth Annual Computer Security Applications Conference, ACSAC 1993, 6-10 Decemver, 1993, Orlando, Florida, USA, pp. 11-20, 1993, IEEE. The full citation details ...](Pics/full.jpeg) |
1993 |
DBLP DOI BibTeX RDF |
|
1 | Michael J. Nash, Ronald J. Kennett |
Security policy in a complex logistics procurement. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Ninth Annual Computer Security Applications Conference, ACSAC 1993, 6-10 Decemver, 1993, Orlando, Florida, USA, pp. 46-53, 1993, IEEE. The full citation details ...](Pics/full.jpeg) |
1993 |
DBLP DOI BibTeX RDF |
|
1 | Herman Otto Lubbes |
COMPUSEC, a personal view. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Ninth Annual Computer Security Applications Conference, ACSAC 1993, 6-10 Decemver, 1993, Orlando, Florida, USA, 1993, IEEE. The full citation details ...](Pics/full.jpeg) |
1993 |
DBLP DOI BibTeX RDF |
|
1 | Rick Schultz, Tim Ehrsam |
Migrating a commercial-off-the-shelf application to a multilevel secure environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Ninth Annual Computer Security Applications Conference, ACSAC 1993, 6-10 Decemver, 1993, Orlando, Florida, USA, pp. 21-28, 1993, IEEE. The full citation details ...](Pics/full.jpeg) |
1993 |
DBLP DOI BibTeX RDF |
|
1 | Willem G. de Ru, Jan H. P. Eloff |
Improved password mechanisms through expert system technology. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Ninth Annual Computer Security Applications Conference, ACSAC 1993, 6-10 Decemver, 1993, Orlando, Florida, USA, pp. 272-280, 1993, IEEE. The full citation details ...](Pics/full.jpeg) |
1993 |
DBLP DOI BibTeX RDF |
|
1 | Ravi S. Sandhu, Srinivas Ganta |
Expressive power of the single-object typed access matrix model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Ninth Annual Computer Security Applications Conference, ACSAC 1993, 6-10 Decemver, 1993, Orlando, Florida, USA, pp. 184-194, 1993, IEEE. The full citation details ...](Pics/full.jpeg) |
1993 |
DBLP DOI BibTeX RDF |
|
1 | Claudio Calvelli, Vijay Varadharajan |
Representation of mental health application access policy in a monotonic model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Ninth Annual Computer Security Applications Conference, ACSAC 1993, 6-10 Decemver, 1993, Orlando, Florida, USA, pp. 195-209, 1993, IEEE. The full citation details ...](Pics/full.jpeg) |
1993 |
DBLP DOI BibTeX RDF |
|
1 | J. DeMeester |
C2 auditing in the X Display Manager. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Ninth Annual Computer Security Applications Conference, ACSAC 1993, 6-10 Decemver, 1993, Orlando, Florida, USA, pp. 265-271, 1993, IEEE. The full citation details ...](Pics/full.jpeg) |
1993 |
DBLP DOI BibTeX RDF |
|
1 | Michael R. Sweezey |
Specification issues of secure systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Ninth Annual Computer Security Applications Conference, ACSAC 1993, 6-10 Decemver, 1993, Orlando, Florida, USA, pp. 36-45, 1993, IEEE. The full citation details ...](Pics/full.jpeg) |
1993 |
DBLP DOI BibTeX RDF |
|
Displaying result #1401 - #1500 of 1667 (100 per page; Change: ) Pages: [ <<][ 5][ 6][ 7][ 8][ 9][ 10][ 11][ 12][ 13][ 14][ 15][ 16][ 17][ >>] |
|