The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "ACSAC"( http://dblp.L3S.de/Venues/ACSAC )

URL (DBLP): http://dblp.uni-trier.de/db/conf/aPcsac

Publication years (Num. hits)
1989 (62) 1990 (46) 1991 (25) 1992 (25) 1993 (29) 1994 (33) 1996 (29) 1997 (30) 1998 (36) 1999 (44) 2000 (43) 2001 (65) 2002 (42) 2003 (44) 2004 (42) 2005 (61) 2006 (45) 2007 (45) 2008 (99) 2009 (49) 2010 (43) 2011 (43) 2012 (47) 2013 (37) 2014 (49) 2015 (48) 2016 (49) 2017 (49) 2018 (61) 2019 (61) 2020 (71) 2021 (81) 2022 (74) 2023 (60)
Publication types (Num. hits)
inproceedings(1631) proceedings(36)
Venues (Conferences, Journals, ...)
ACSAC(1667)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 738 occurrences of 436 keywords

Results
Found 1667 publication records. Showing 1667 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Simon N. Foley Supporting Secure Canonical Upgrade Policies in Multilevel Secure Object Stores. Search on Bibsonomy ACSAC The full citation details ... 1997 DBLP  DOI  BibTeX  RDF secure canonical upgrade policies, multilevel secure object stores, multilevel relabel policies, high-level subjects, low-level security labels, message filter model, object-oriented database, security of data
1Sharon R. Lewis, Simon R. Wiseman Securing an Object Relational Database. Search on Bibsonomy ACSAC The full citation details ... 1997 DBLP  DOI  BibTeX  RDF bject-oriented databases, object relational database security, Trojan Horse software, business constraints, accounting information, risks, COTS, commercial off the shelf, data access, security labelling
1Carl E. Landwehr Protecting Unattended Computers Without Software. Search on Bibsonomy ACSAC The full citation details ... 1997 DBLP  DOI  BibTeX  RDF unattended computer protection, hardware-based system, unauthorized use, physical access, prototype, workstations, office automation, assurance, office environment
1S. Cheung An Efficient Message Authentication Scheme for Link State Routing. Search on Bibsonomy ACSAC The full citation details ... 1997 DBLP  DOI  BibTeX  RDF message authentication scheme, routing cost reduction, routing updates, border routers, public-key based schemes, computationally expensive, detection-diagnosis-recovery approach, multiple-valued cost metrics, routing protocols, message authentication, link state routing, large networks
1T. F. Himdi, Ravi S. Sandhu Lattice Based Models for Controlled Sharing of Confidential Information in the Saudi Hajj System. Search on Bibsonomy ACSAC The full citation details ... 1997 DBLP  DOI  BibTeX  RDF lattice based models, controlled sharing, confidential information, Saudi Hajj system, pilgrimage, annual event, Saudi Arabia, government ministries, trusted environment, Saudi ministries, no obligation access security, Chinese Wall security, information flow policy, interoperability, confidentiality, data sharing, security requirements, security requirement, government data processing, shared data, multi level security
1John P. McDermott, R. Gelinas, S. Ornstein Doc, Wyatt, and Virgil: Prototyping Storage Jamming Defenses. Search on Bibsonomy ACSAC The full citation details ... 1997 DBLP  DOI  BibTeX  RDF Doc, Wyatt, Virgil, storage jamming defense, storage jamming attack detection, replay defense, attack source determination, attack pattern determination, object-oriented data storage, application-specific techniques, access control, encryption, auditing, software prototyping, checksums, virus detection, prototype tools, logical replication, information warfare
1F. C. Smith Ethical Responsibilities and Legal Liabilities of Network Security Professionals. Search on Bibsonomy ACSAC The full citation details ... 1997 DBLP  DOI  BibTeX  RDF ethical responsibilities, legal liabilities, network security professionals, tort litigation, unregulated economic environment, public law enforcement, criminal abuses, technical solutions, civil wrongs, individual liberty, group liberty, criminal law, civil law, computer literate lawyers, computer security failures, millennium bug, legal liability, social redress, computer networks, computer networking, morality, network vulnerabilities, Year 2000 problem
1 13th Annual Computer Security Applications Conference (ACSAC 1997), 8-12 December 1997, San Diego, CA, USA Search on Bibsonomy ACSAC The full citation details ... 1997 DBLP  BibTeX  RDF
1Eberhard von Faber, R. Hammelrath, F.-P. Heider The Secure Distribution of Digital Contents. Search on Bibsonomy ACSAC The full citation details ... 1997 DBLP  DOI  BibTeX  RDF secure distribution, encrypted digital contents, freely accessible distribution media, key management system, payment authorisation, casual customers, nonregistered users, software setup, contract conclusion, registration processes, content re-selling, business-to-business environment, cryptography, electronic commerce, workflow management, decryption, payment systems
1P. Greve, J. Hoffman, R. E. Smith Using Type Enforcement to Assure a Configurable Guard. Search on Bibsonomy ACSAC The full citation details ... 1997 DBLP  DOI  BibTeX  RDF type enforcement, configurable guard, guard systems, administrator configurable guard, input channel, connected output channel, assured processes, assurance arguments, operational guards, pipeline, electronic mail, electronic mail, trusted components
1R. E. Niemeyer Using Web Technologies in Two MLS Environments: A Security Analysis. Search on Bibsonomy ACSAC The full citation details ... 1997 DBLP  DOI  BibTeX  RDF World Wide Web technologies, multi-level secure systems, single-level network environments, Web browser software, security sensitivity level, information transfer, security boundaries, security classification, network client, malicious code insertion, Trojan horse code, primary information flow direction, Internet, HTTP, Web server, security of data, intranet, threats, security vulnerabilities, computer viruses, database server, HyperText Transfer Protocol, denial of service attacks
1Dixie B. Baker, Robert M. Barnhart, T. T. Buss PCASSO: Applying and Extending State-of-the-Art Security in the Healthcare Domain. Search on Bibsonomy ACSAC The full citation details ... 1997 DBLP  DOI  BibTeX  RDF PCASSO, Patient Centered Access to Secure Systems Online, healthcare domain, patient privacy protection, life-critical information, patient empowerment, safety, security of data, Internet access, security technology, sensitive information
1Christoph L. Schuba, Eugene H. Spafford A Reference Model for Firewall Technology. Search on Bibsonomy ACSAC The full citation details ... 1997 DBLP  DOI  BibTeX  RDF firewall technology, technological aspect, specialized engineering solution, firewall systems, integrity assurance, centralized security policy, authentication, access control, audit, reference model, computer network management, networking technologies, communications security
1C. Cant, Simon R. Wiseman Simple Assured Bastion Hosts. Search on Bibsonomy ACSAC The full citation details ... 1997 DBLP  DOI  BibTeX  RDF assured firewalls, compartmented mode workstation, ITSEC E3 assurance, evaluation effort reuse, bastion host architecture, unevaluated proxies, information exporting, trusted path export sanction, evaluated release checker, authorisation
1Chih-Hung Wang, Tzonelih Hwang Threshold and Generalized DSS Signatures without a Trusted Party. Search on Bibsonomy ACSAC The full citation details ... 1997 DBLP  DOI  BibTeX  RDF (t+1,n) threshold signature scheme, generalized DSS signatures, trusted party, secret key sharing, valid group signature, Digital Signature Standard, signers, conspiracy, signing procedure, cryptography
1J. Hoffman Implementing RBAC on a Type Enforced System. Search on Bibsonomy ACSAC The full citation details ... 1997 DBLP  DOI  BibTeX  RDF type enforced system, security database implementations, RBAC mechanisms, LOCK6, RBAC features, firewall construction, lower level mechanism, type enforcement, Role Based Access Control, authorisation, application domain, application domains, secure operating system
1Karen A. Oostendorp, Lee Badger, C. D. Vance, W. G. Morrison, Michael J. Petkac, David L. Sherman, Daniel F. Sterne Domain and Type Enforcement Firewalls. Search on Bibsonomy ACSAC The full citation details ... 1997 DBLP  DOI  BibTeX  RDF type enforcement firewalls, Internet connected organizations, Internet firewall, system penetration, business practices, external entities, Domain and Type Enforcement, DTE firewall, application level proxies, restrictive domains, network based attacks, local resources, role based security policies, DTE security attributes, DTE clients, Internet, access control, security policies, HTTP, servers, network services, security breaches, FTP
1Bob Askwith, Madjid Merabti, Qi Shi 0001, K. Whiteley Achieving User Privacy in Mobile Networks. Search on Bibsonomy ACSAC The full citation details ... 1997 DBLP  DOI  BibTeX  RDF third generation mobile networks, identification privacy, untrusted party, digital mixes, token based scheme, authorised third parties, billing requirements, coin like tokens, authentication, anonymity, cellular radio, user privacy, privacy requirements
1John A. Davidson Asymmetric Isolation. Search on Bibsonomy ACSAC The full citation details ... 1996 DBLP  DOI  BibTeX  RDF asymmetric isolation, unidirectional security, risk-free multi-level security, absolute security rule enforcement, security violations, multi-level communication handshaking, multiple single-level nodes, unidirectional links, hardware-enforced security, performance, cost, security of data, legacy systems, mandatory access control, downgrading
1Mark S. Anderson 0001, Christopher James North, John Edmund Griffin, Robert Brunyee Milner, John D. Yesberg, Kenneth Kwok-Hei Yiu Starlight: Interactive Link. Search on Bibsonomy ACSAC The full citation details ... 1996 DBLP  DOI  BibTeX  RDF Interactive Link, Starlight research program, military-relevant information security capabilities, retrofittable device, commercial off-the-shelf workstations, classified networks, unclassified networks, authorising government agencies, untrusted graphical windowing applications, X Windows applications, Microsoft Windows applications, Internet, interactive systems, personal computers, cost-effectiveness, security levels, interactive access
1Myong H. Kang, Ira S. Moskowitz, Bruce E. Montrose, James J. Parsonese A Case Study Of Two Nrl Pump Prototypes. Search on Bibsonomy ACSAC The full citation details ... 1996 DBLP  DOI  BibTeX  RDF NRL Pump, data pump, interconnected computer systems, process layer, 4-layer network reference model, DOS-Pump, D-Pump, event-driven Pump, E-Pump, performance, prototypes, congestion control, case study, fairness, open systems, open systems, covert channels, hardware implementation, secure communication, transport layer, reliable communication, threats, denial-of-service attacks
1John Kelsey, Bruce Schneier, Chris Hall An Authenticated Camera. Search on Bibsonomy ACSAC The full citation details ... 1996 DBLP  DOI  BibTeX  RDF authenticated camera, protocols, cameras, digital image, police, base station
1Teresa F. Lunt, John Kimmins, Bob McKosky Security and the National Telecommunications Infrastructure. Search on Bibsonomy ACSAC The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
1Brigitte Althen, Gerd Enste, Brigitte Nebelung Innovative Secure Payments On The Internet Using The German Electronic Purse. Search on Bibsonomy ACSAC The full citation details ... 1996 DBLP  DOI  BibTeX  RDF secure payments, German electronic purse, off-line terminals, merchant's site, Internet, security mechanisms, EFTS
1Andreas Sterbenz An Evaluation of the Java Security Model. Search on Bibsonomy ACSAC The full citation details ... 1996 DBLP  DOI  BibTeX  RDF Java security model, untrusted programs, secure environment, efficiency, flexibility, security of data
1I-Lung Kao, Randy Chow An Extended Capability Architecture To Enforce Dynamic Access Control Policies. Search on Bibsonomy ACSAC The full citation details ... 1996 DBLP  DOI  BibTeX  RDF extended capability architecture, dynamic access control policies, user process, object access, access request, centralized access control lists, object protection, capability based systems, static access control policies, access privileges, capability systems, access history, capability management, distributed systems, distributed system, distributed processing, security policies, access rights, object manager, object managers
1Manfred Holzbach Security Measures For The Austrian "Paychip" Electronic Purse Application. Search on Bibsonomy ACSAC The full citation details ... 1996 DBLP  DOI  BibTeX  RDF PAYCHIP, management-oriented description, Austrian nationwide electronic purse scheme, QUICK scheme, national security policy, security level evaluation, payment security maintenance, chip-card based payment infrastructure, Europay Austria, security of data, design principles, security measures
1Joel E. Sachs Major Questions in Applying the SSE-CMM. Search on Bibsonomy ACSAC The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
1Julie L. Connolly Operation chain link: the deployment of a firewall at Hanscom Air Force Base. Search on Bibsonomy ACSAC The full citation details ... 1996 DBLP  DOI  BibTeX  RDF operation chain link, Hanscom Air Force Base, Electronic Systems Center, unclassified network, Internet threats, network security assessments, hacker break-in, firewall development team, firewall deployment, security management, military computing
1Richard E. Smith Mandatory Protection for Internet Server Software. Search on Bibsonomy ACSAC The full citation details ... 1996 DBLP  DOI  BibTeX  RDF multilevel security applications, Internet server software, server overrun, attack code, server host, mandatory protection mechanisms, commercial systems, Unix chroot isolation, type enforcement, server protection, Internet, MLS, security flaws
1Vijay Varadharajan, Yi Mu 0001 On The Design Of Secure Electronic Payment Schemes For Internet. Search on Bibsonomy ACSAC The full citation details ... 1996 DBLP  DOI  BibTeX  RDF secure electronic payment schemes, commercial electronic credit card transactions, iKP, STT, SEPP, permission-based payment protocol, PBP protocol, purchase request phase, payment phase, secret private key, Internet, disputes, EFTS
1Jeremy Epstein, Tim Williams Using Fortezza For Transparent File Encryption. Search on Bibsonomy ACSAC The full citation details ... 1996 DBLP  DOI  BibTeX  RDF Fortezza, transparent file encryption, SISTex, Assure Basic product, security features, DOS/Windows environment, DES based file encryption, Fortezza card, Skipjack algorithm, technical problems, access controls, cryptography, Data Encryption Standard, product development
1E. John Sebes, Terry C. Vickers Benzel SIGMA: Security For Distributed Object Interoperability Between Trusted And Untrusted Systems. Search on Bibsonomy ACSAC The full citation details ... 1996 DBLP  DOI  BibTeX  RDF SIGMA project, distributed object interoperability, trusted systems, untrusted systems, object oriented services, CORBA based application interoperation, distributed systems, Common Object Request Broker Architecture, security policy, open systems, distributed computing environments, security technologies
1Richard A. Kemmerer, Tad Taylor A Modular Covert Channel Analysis Methodology for Trusted DG/UXTM. Search on Bibsonomy ACSAC The full citation details ... 1996 DBLP  DOI  BibTeX  RDF modular covert channel analysis methodology, Trusted DG/UX, CCA approach, subsystem architecture, DG/UX kernel, system state, abstract object, Ratings Maintenance Program, RAMP, SRM analysis, exported function, peer subsystems, kernel-wide SRM, commercial strength Unix system, operating system kernels, system calls, modular approach
1Eric M. Kayden Using a Proxy X Server to Facilitate COTS Application Integration. Search on Bibsonomy ACSAC The full citation details ... 1996 DBLP  DOI  BibTeX  RDF proxy X Window System server, COTS application integration, XPatch, trusted X Window system implementations, portability issues, accreditation issues, multiprogramming
1 12th Annual Computer Security Applications Conference (ACSAC 1996), 9-13 December 1996, San Diego, CA, USA Search on Bibsonomy ACSAC The full citation details ... 1996 DBLP  BibTeX  RDF
1Pierre Bieber Formal Techniques for an ITSEC-E4 Secure Gateway. Search on Bibsonomy ACSAC The full citation details ... 1996 DBLP  DOI  BibTeX  RDF ITSEC-E4 secure gateway, interactive theorem prover, Information Technology Security Evaluation Criteria, formal specification, security policy, security architecture, formal technique, functional specifications
1Herve Hosy, Mary Schanken Common Criteria Activities and Alternative Assurance. Search on Bibsonomy ACSAC The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
1Mary Schanken SSE-CMM Pilot Results. Search on Bibsonomy ACSAC The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
1Rae K. Burns, Yi-Fang Koh A Comparison of Multilevel Structured Query Language (SQL) Implementations. Search on Bibsonomy ACSAC The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
1Mansour Esmaili, Bala Balachandran, Reihaneh Safavi-Naini, Josef Pieprzyk Case-Based Reasoning for Intrusion Detection. Search on Bibsonomy ACSAC The full citation details ... 1996 DBLP  DOI  BibTeX  RDF model based expert systems, case based reasoning approach, artificial intelligence, intrusion detection, authorisation
1Michael Hitchens, Vijay Varadharajan esign Choices For Symmetric Key Based Inter-Domain Authentication Protocols In Distributed Systems. Search on Bibsonomy ACSAC The full citation details ... 1996 DBLP  DOI  BibTeX  RDF design choices, secure interactions, key establishment protocols, client responsibility, trusted server responsibility, inter-domain protocols, symmetric key systems, OSF Distributed Computing Environment, distributed systems, message authentication, authentication protocols, Kerberos
1Randall W. Lichota, Grace L. Hammonds, Stephen H. Brackin Verifying The Correctness Of Cryptographic Protocols Using "Convince". Search on Bibsonomy ACSAC The full citation details ... 1996 DBLP  DOI  BibTeX  RDF Convince, theorem proving component, commercial computer aided software engineering tool, StP/OMT, textual notations, Higher Order Logic theorem prover, protocols, cryptographic protocols, authentication protocols, front-end, belief logic, correctness verification, automated support
1M. Nash, R. J. Kennett Implementing Security Policy in a Large Defense Procurement. Search on Bibsonomy ACSAC The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
1Luigi Giuri, Pietro Iglio A Role-Based Secure Database Design Tool. Search on Bibsonomy ACSAC The full citation details ... 1996 DBLP  DOI  BibTeX  RDF role based secure database design tool, database design methodologies, secure database design methodology, entity relationship conceptual data model, role based security model, analysis algorithm, potential security design mistakes, translation procedure, SQL specification, conceptual model, entity-relationship modelling
1Michael G. Reed, Paul F. Syverson, David M. Goldschlag Proxies For Anonymous Routing. Search on Bibsonomy ACSAC The full citation details ... 1996 DBLP  DOI  BibTeX  RDF anonymous routing, network traffic analysis-resistant method, flexible communications infrastructure, unmodified Internet services, Sun Solaris 2.4, World Wide Web browsing, remote logins, application-independent real-time bi-directional anonymous connections, anonymous connections, identifying information, packet-switched public network, HTTP, proxies, telecommunication network routing, electronic mail, file transfers, eavesdropping, FTP, onion routing, SMTP, public network, user anonymity
1Ning Zhang, Qi Shi 0001 Security Issues in an EDI Environment. Search on Bibsonomy ACSAC The full citation details ... 1996 DBLP  DOI  BibTeX  RDF EDI environment, electronic transmission, trade related documents, EDI system, EDI specific security requirement, non repudiation of receipt, heterogeneous system platform, protocol, electronic data interchange, Electronic Data Interchange, security threats, security issues
1Susan L. Chapin, William R. Herndon, LouAnna Notargiacomo, Melonyi L. Katz, Thomas J. Mowbray Security for the Common Object Request Broker Architecture (CORBA). Search on Bibsonomy ACSAC The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
1Edward Amoroso, Michael Merritt Composing system integrity using I/O automata. Search on Bibsonomy ACSAC The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
1Lorrayne J. Schaefer, Brian W. McKenney Networked information discovery and retrieval tools: security capabilities and needs. Search on Bibsonomy ACSAC The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
1Deborah J. Bodeau System-of-systems security engineering. Search on Bibsonomy ACSAC The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
1Marcus Brown 0001, Samuel Joe Rogers A practical approach to user authentication. Search on Bibsonomy ACSAC The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
1Eric A. Fisch, Gregory B. White, Udo W. Pooch The design of an audit trail analysis tool. Search on Bibsonomy ACSAC The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
1George Fink, Karl N. Levitt Property-based testing of privileged programs. Search on Bibsonomy ACSAC The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
1Calvin Ko, George Fink, Karl N. Levitt Automated detection of vulnerabilities in privileged programs by execution monitoring. Search on Bibsonomy ACSAC The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
1Greg King Secure system composition: five practical initiatives. Search on Bibsonomy ACSAC The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
1Rob Dobry, Mary Schanken Security concerns for distributed systems. Search on Bibsonomy ACSAC The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
1James W. Freeman, Richard B. Neely, M. A. Heckard A validated security policy modeling approach. Search on Bibsonomy ACSAC The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
1Balaji R. Venkatraman, Richard E. Newman-Wolfe Performance analysis of a method for high level prevention of traffic analysis using measurements from a campus network. Search on Bibsonomy ACSAC The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
1Judith A. Hemenway, Jonathan Fellows Applying the Abadi-Lamport composition theorem in real-world secure system integration environments. Search on Bibsonomy ACSAC The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
1Ravi S. Sandhu, Edward J. Coyne, Hal L. Feinstein, Charles E. Youman Role-based access control: a multi-dimensional view. Search on Bibsonomy ACSAC The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
1Jeremy Epstein Editorial: a view of cryptography in TCSEC products. Search on Bibsonomy ACSAC The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
1Judith N. Froscher, Myong H. Kang, John P. McDermott, Oliver Costich, Carl E. Landwehr A practical approach to high assurance multilevel secure computing service. Search on Bibsonomy ACSAC The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
1Randall E. Smith A secure Email gateway (building an RCAS external interface). Search on Bibsonomy ACSAC The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
1Peter K. Boucher, Teresa F. Lunt A prototype multilevel-secure DoD directory. Search on Bibsonomy ACSAC The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
1C. L. Robinson, Simon R. Wiseman Using security models to investigate CMW design and implementation. Search on Bibsonomy ACSAC The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
1Vinti Doshi, William R. Herndon, Sushil Jajodia, Catherine D. McCollum Benchmarking multilevel secure database systems using the MITRE benchmark. Search on Bibsonomy ACSAC The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
1Bill Neugent Where we stand in multilevel security (MLS): requirements, approaches, issues, and lessons learned. Search on Bibsonomy ACSAC The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
1Klaus J. Keus, Markus Ullmann Availability: theory and fundamentals for practical evaluation and use. Search on Bibsonomy ACSAC The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
1Eugene D. Myers STU-III-multilevel secure computer interface. Search on Bibsonomy ACSAC The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
1Myong H. Kang, Judith N. Froscher, Ravi Mukkamala Architectural impact on performance of a multilevel database system. Search on Bibsonomy ACSAC The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
1Mary M. Bernstein, Chulsoo Kim AOS: an avionics operating system for multi-level secure real-time environments. Search on Bibsonomy ACSAC The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
1Paul Proctor Audit reduction and misuse detection in heterogeneous environments: framework and application. Search on Bibsonomy ACSAC The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
1Kate Arndt, Michael Burgoon, Jeanne Firey, Keith Rodenhausen Ops/Intel interface lessons learned: the integrator's perspective. Search on Bibsonomy ACSAC The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
1Jay J. Kahn, Marshall D. Abrams Editorial: why bad things happen to good systems, and what to do about it. Search on Bibsonomy ACSAC The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
1Michael V. Joyce The effects of trusted technology on distributed applications. Search on Bibsonomy ACSAC The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
1Günther Pernul, Gerald Quirchmayr Organizing MLS databases from a data modelling point of view. Search on Bibsonomy ACSAC The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
1 10th Annual Computer Security Applications Conference, ACSAC 1994, 5-9 December, 1994 Orlando, FL, USA Search on Bibsonomy ACSAC The full citation details ... 1994 DBLP  BibTeX  RDF
1Doug Rosenthal EINet: a secure, open network for electronic commerce. Search on Bibsonomy ACSAC The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
1David S. Goldberg The MITRE security perimeter. Search on Bibsonomy ACSAC The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
1Mary M. Bernstein, Terry C. Vickers Benzel Real-time trust with 'System Build': lessons learned. Search on Bibsonomy ACSAC The full citation details ... 1993 DBLP  DOI  BibTeX  RDF
1Daniel P. Faigin, Joseph Donndelinger, J. R. Jones A rigorous approach to determining objects. Search on Bibsonomy ACSAC The full citation details ... 1993 DBLP  DOI  BibTeX  RDF
1Eric M. Kayden, L. J. Schaefer Heterogeneous workstation to STU-III prototype. Search on Bibsonomy ACSAC The full citation details ... 1993 DBLP  DOI  BibTeX  RDF
1Deborah J. Bodeau, Vipin Swarup Integration of security services into the NORAD/USSPACECOM technical infrastructure: a case study. Search on Bibsonomy ACSAC The full citation details ... 1993 DBLP  DOI  BibTeX  RDF
1Selwyn Russell Transparent cosignatures for electronic documents. Search on Bibsonomy ACSAC The full citation details ... 1993 DBLP  DOI  BibTeX  RDF
1Jeremy Epstein, Rita Pascale User interface for a high assurance, windowing system. Search on Bibsonomy ACSAC The full citation details ... 1993 DBLP  DOI  BibTeX  RDF
1Raymond K. Clark, Ira B. Greenberg, Peter K. Boucher, Teresa F. Lunt, Peter G. Neumann, Douglas M. Wells, E. Douglas Jensen Effects of multilevel security on real-time applications. Search on Bibsonomy ACSAC The full citation details ... 1993 DBLP  DOI  BibTeX  RDF
1Ulf Carlsen Using logics to detect implementation-dependent flaws [cryptographic protocol design]. Search on Bibsonomy ACSAC The full citation details ... 1993 DBLP  DOI  BibTeX  RDF
1Sharon R. Lewis, Simon R. Wiseman Database design and MLS DBMSs: an unhappy alliance? Search on Bibsonomy ACSAC The full citation details ... 1993 DBLP  DOI  BibTeX  RDF
1 Ninth Annual Computer Security Applications Conference, ACSAC 1993, 6-10 Decemver, 1993, Orlando, Florida, USA Search on Bibsonomy ACSAC The full citation details ... 1993 DBLP  BibTeX  RDF
1John A. Fitch III, Lance J. Hoffman On the shortest path to network security. Search on Bibsonomy ACSAC The full citation details ... 1993 DBLP  DOI  BibTeX  RDF
1M. O. Aldrich A methodology for the use of single level RDBMS software in a multi-level secured system. Search on Bibsonomy ACSAC The full citation details ... 1993 DBLP  DOI  BibTeX  RDF
1Michael J. Nash, Ronald J. Kennett Security policy in a complex logistics procurement. Search on Bibsonomy ACSAC The full citation details ... 1993 DBLP  DOI  BibTeX  RDF
1Herman Otto Lubbes COMPUSEC, a personal view. Search on Bibsonomy ACSAC The full citation details ... 1993 DBLP  DOI  BibTeX  RDF
1Rick Schultz, Tim Ehrsam Migrating a commercial-off-the-shelf application to a multilevel secure environment. Search on Bibsonomy ACSAC The full citation details ... 1993 DBLP  DOI  BibTeX  RDF
1Willem G. de Ru, Jan H. P. Eloff Improved password mechanisms through expert system technology. Search on Bibsonomy ACSAC The full citation details ... 1993 DBLP  DOI  BibTeX  RDF
1Ravi S. Sandhu, Srinivas Ganta Expressive power of the single-object typed access matrix model. Search on Bibsonomy ACSAC The full citation details ... 1993 DBLP  DOI  BibTeX  RDF
1Claudio Calvelli, Vijay Varadharajan Representation of mental health application access policy in a monotonic model. Search on Bibsonomy ACSAC The full citation details ... 1993 DBLP  DOI  BibTeX  RDF
1J. DeMeester C2 auditing in the X Display Manager. Search on Bibsonomy ACSAC The full citation details ... 1993 DBLP  DOI  BibTeX  RDF
1Michael R. Sweezey Specification issues of secure systems. Search on Bibsonomy ACSAC The full citation details ... 1993 DBLP  DOI  BibTeX  RDF
Displaying result #1401 - #1500 of 1667 (100 per page; Change: )
Pages: [<<][5][6][7][8][9][10][11][12][13][14][15][16][17][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license