|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 738 occurrences of 436 keywords
|
|
|
Results
Found 1667 publication records. Showing 1667 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Simon N. Foley |
Supporting Secure Canonical Upgrade Policies in Multilevel Secure Object Stores. |
ACSAC |
1997 |
DBLP DOI BibTeX RDF |
secure canonical upgrade policies, multilevel secure object stores, multilevel relabel policies, high-level subjects, low-level security labels, message filter model, object-oriented database, security of data |
1 | Sharon R. Lewis, Simon R. Wiseman |
Securing an Object Relational Database. |
ACSAC |
1997 |
DBLP DOI BibTeX RDF |
bject-oriented databases, object relational database security, Trojan Horse software, business constraints, accounting information, risks, COTS, commercial off the shelf, data access, security labelling |
1 | Carl E. Landwehr |
Protecting Unattended Computers Without Software. |
ACSAC |
1997 |
DBLP DOI BibTeX RDF |
unattended computer protection, hardware-based system, unauthorized use, physical access, prototype, workstations, office automation, assurance, office environment |
1 | S. Cheung |
An Efficient Message Authentication Scheme for Link State Routing. |
ACSAC |
1997 |
DBLP DOI BibTeX RDF |
message authentication scheme, routing cost reduction, routing updates, border routers, public-key based schemes, computationally expensive, detection-diagnosis-recovery approach, multiple-valued cost metrics, routing protocols, message authentication, link state routing, large networks |
1 | T. F. Himdi, Ravi S. Sandhu |
Lattice Based Models for Controlled Sharing of Confidential Information in the Saudi Hajj System. |
ACSAC |
1997 |
DBLP DOI BibTeX RDF |
lattice based models, controlled sharing, confidential information, Saudi Hajj system, pilgrimage, annual event, Saudi Arabia, government ministries, trusted environment, Saudi ministries, no obligation access security, Chinese Wall security, information flow policy, interoperability, confidentiality, data sharing, security requirements, security requirement, government data processing, shared data, multi level security |
1 | John P. McDermott, R. Gelinas, S. Ornstein |
Doc, Wyatt, and Virgil: Prototyping Storage Jamming Defenses. |
ACSAC |
1997 |
DBLP DOI BibTeX RDF |
Doc, Wyatt, Virgil, storage jamming defense, storage jamming attack detection, replay defense, attack source determination, attack pattern determination, object-oriented data storage, application-specific techniques, access control, encryption, auditing, software prototyping, checksums, virus detection, prototype tools, logical replication, information warfare |
1 | F. C. Smith |
Ethical Responsibilities and Legal Liabilities of Network Security Professionals. |
ACSAC |
1997 |
DBLP DOI BibTeX RDF |
ethical responsibilities, legal liabilities, network security professionals, tort litigation, unregulated economic environment, public law enforcement, criminal abuses, technical solutions, civil wrongs, individual liberty, group liberty, criminal law, civil law, computer literate lawyers, computer security failures, millennium bug, legal liability, social redress, computer networks, computer networking, morality, network vulnerabilities, Year 2000 problem |
1 | |
13th Annual Computer Security Applications Conference (ACSAC 1997), 8-12 December 1997, San Diego, CA, USA |
ACSAC |
1997 |
DBLP BibTeX RDF |
|
1 | Eberhard von Faber, R. Hammelrath, F.-P. Heider |
The Secure Distribution of Digital Contents. |
ACSAC |
1997 |
DBLP DOI BibTeX RDF |
secure distribution, encrypted digital contents, freely accessible distribution media, key management system, payment authorisation, casual customers, nonregistered users, software setup, contract conclusion, registration processes, content re-selling, business-to-business environment, cryptography, electronic commerce, workflow management, decryption, payment systems |
1 | P. Greve, J. Hoffman, R. E. Smith |
Using Type Enforcement to Assure a Configurable Guard. |
ACSAC |
1997 |
DBLP DOI BibTeX RDF |
type enforcement, configurable guard, guard systems, administrator configurable guard, input channel, connected output channel, assured processes, assurance arguments, operational guards, pipeline, electronic mail, electronic mail, trusted components |
1 | R. E. Niemeyer |
Using Web Technologies in Two MLS Environments: A Security Analysis. |
ACSAC |
1997 |
DBLP DOI BibTeX RDF |
World Wide Web technologies, multi-level secure systems, single-level network environments, Web browser software, security sensitivity level, information transfer, security boundaries, security classification, network client, malicious code insertion, Trojan horse code, primary information flow direction, Internet, HTTP, Web server, security of data, intranet, threats, security vulnerabilities, computer viruses, database server, HyperText Transfer Protocol, denial of service attacks |
1 | Dixie B. Baker, Robert M. Barnhart, T. T. Buss |
PCASSO: Applying and Extending State-of-the-Art Security in the Healthcare Domain. |
ACSAC |
1997 |
DBLP DOI BibTeX RDF |
PCASSO, Patient Centered Access to Secure Systems Online, healthcare domain, patient privacy protection, life-critical information, patient empowerment, safety, security of data, Internet access, security technology, sensitive information |
1 | Christoph L. Schuba, Eugene H. Spafford |
A Reference Model for Firewall Technology. |
ACSAC |
1997 |
DBLP DOI BibTeX RDF |
firewall technology, technological aspect, specialized engineering solution, firewall systems, integrity assurance, centralized security policy, authentication, access control, audit, reference model, computer network management, networking technologies, communications security |
1 | C. Cant, Simon R. Wiseman |
Simple Assured Bastion Hosts. |
ACSAC |
1997 |
DBLP DOI BibTeX RDF |
assured firewalls, compartmented mode workstation, ITSEC E3 assurance, evaluation effort reuse, bastion host architecture, unevaluated proxies, information exporting, trusted path export sanction, evaluated release checker, authorisation |
1 | Chih-Hung Wang, Tzonelih Hwang |
Threshold and Generalized DSS Signatures without a Trusted Party. |
ACSAC |
1997 |
DBLP DOI BibTeX RDF |
(t+1,n) threshold signature scheme, generalized DSS signatures, trusted party, secret key sharing, valid group signature, Digital Signature Standard, signers, conspiracy, signing procedure, cryptography |
1 | J. Hoffman |
Implementing RBAC on a Type Enforced System. |
ACSAC |
1997 |
DBLP DOI BibTeX RDF |
type enforced system, security database implementations, RBAC mechanisms, LOCK6, RBAC features, firewall construction, lower level mechanism, type enforcement, Role Based Access Control, authorisation, application domain, application domains, secure operating system |
1 | Karen A. Oostendorp, Lee Badger, C. D. Vance, W. G. Morrison, Michael J. Petkac, David L. Sherman, Daniel F. Sterne |
Domain and Type Enforcement Firewalls. |
ACSAC |
1997 |
DBLP DOI BibTeX RDF |
type enforcement firewalls, Internet connected organizations, Internet firewall, system penetration, business practices, external entities, Domain and Type Enforcement, DTE firewall, application level proxies, restrictive domains, network based attacks, local resources, role based security policies, DTE security attributes, DTE clients, Internet, access control, security policies, HTTP, servers, network services, security breaches, FTP |
1 | Bob Askwith, Madjid Merabti, Qi Shi 0001, K. Whiteley |
Achieving User Privacy in Mobile Networks. |
ACSAC |
1997 |
DBLP DOI BibTeX RDF |
third generation mobile networks, identification privacy, untrusted party, digital mixes, token based scheme, authorised third parties, billing requirements, coin like tokens, authentication, anonymity, cellular radio, user privacy, privacy requirements |
1 | John A. Davidson |
Asymmetric Isolation. |
ACSAC |
1996 |
DBLP DOI BibTeX RDF |
asymmetric isolation, unidirectional security, risk-free multi-level security, absolute security rule enforcement, security violations, multi-level communication handshaking, multiple single-level nodes, unidirectional links, hardware-enforced security, performance, cost, security of data, legacy systems, mandatory access control, downgrading |
1 | Mark S. Anderson 0001, Christopher James North, John Edmund Griffin, Robert Brunyee Milner, John D. Yesberg, Kenneth Kwok-Hei Yiu |
Starlight: Interactive Link. |
ACSAC |
1996 |
DBLP DOI BibTeX RDF |
Interactive Link, Starlight research program, military-relevant information security capabilities, retrofittable device, commercial off-the-shelf workstations, classified networks, unclassified networks, authorising government agencies, untrusted graphical windowing applications, X Windows applications, Microsoft Windows applications, Internet, interactive systems, personal computers, cost-effectiveness, security levels, interactive access |
1 | Myong H. Kang, Ira S. Moskowitz, Bruce E. Montrose, James J. Parsonese |
A Case Study Of Two Nrl Pump Prototypes. |
ACSAC |
1996 |
DBLP DOI BibTeX RDF |
NRL Pump, data pump, interconnected computer systems, process layer, 4-layer network reference model, DOS-Pump, D-Pump, event-driven Pump, E-Pump, performance, prototypes, congestion control, case study, fairness, open systems, open systems, covert channels, hardware implementation, secure communication, transport layer, reliable communication, threats, denial-of-service attacks |
1 | John Kelsey, Bruce Schneier, Chris Hall |
An Authenticated Camera. |
ACSAC |
1996 |
DBLP DOI BibTeX RDF |
authenticated camera, protocols, cameras, digital image, police, base station |
1 | Teresa F. Lunt, John Kimmins, Bob McKosky |
Security and the National Telecommunications Infrastructure. |
ACSAC |
1996 |
DBLP DOI BibTeX RDF |
|
1 | Brigitte Althen, Gerd Enste, Brigitte Nebelung |
Innovative Secure Payments On The Internet Using The German Electronic Purse. |
ACSAC |
1996 |
DBLP DOI BibTeX RDF |
secure payments, German electronic purse, off-line terminals, merchant's site, Internet, security mechanisms, EFTS |
1 | Andreas Sterbenz |
An Evaluation of the Java Security Model. |
ACSAC |
1996 |
DBLP DOI BibTeX RDF |
Java security model, untrusted programs, secure environment, efficiency, flexibility, security of data |
1 | I-Lung Kao, Randy Chow |
An Extended Capability Architecture To Enforce Dynamic Access Control Policies. |
ACSAC |
1996 |
DBLP DOI BibTeX RDF |
extended capability architecture, dynamic access control policies, user process, object access, access request, centralized access control lists, object protection, capability based systems, static access control policies, access privileges, capability systems, access history, capability management, distributed systems, distributed system, distributed processing, security policies, access rights, object manager, object managers |
1 | Manfred Holzbach |
Security Measures For The Austrian "Paychip" Electronic Purse Application. |
ACSAC |
1996 |
DBLP DOI BibTeX RDF |
PAYCHIP, management-oriented description, Austrian nationwide electronic purse scheme, QUICK scheme, national security policy, security level evaluation, payment security maintenance, chip-card based payment infrastructure, Europay Austria, security of data, design principles, security measures |
1 | Joel E. Sachs |
Major Questions in Applying the SSE-CMM. |
ACSAC |
1996 |
DBLP DOI BibTeX RDF |
|
1 | Julie L. Connolly |
Operation chain link: the deployment of a firewall at Hanscom Air Force Base. |
ACSAC |
1996 |
DBLP DOI BibTeX RDF |
operation chain link, Hanscom Air Force Base, Electronic Systems Center, unclassified network, Internet threats, network security assessments, hacker break-in, firewall development team, firewall deployment, security management, military computing |
1 | Richard E. Smith |
Mandatory Protection for Internet Server Software. |
ACSAC |
1996 |
DBLP DOI BibTeX RDF |
multilevel security applications, Internet server software, server overrun, attack code, server host, mandatory protection mechanisms, commercial systems, Unix chroot isolation, type enforcement, server protection, Internet, MLS, security flaws |
1 | Vijay Varadharajan, Yi Mu 0001 |
On The Design Of Secure Electronic Payment Schemes For Internet. |
ACSAC |
1996 |
DBLP DOI BibTeX RDF |
secure electronic payment schemes, commercial electronic credit card transactions, iKP, STT, SEPP, permission-based payment protocol, PBP protocol, purchase request phase, payment phase, secret private key, Internet, disputes, EFTS |
1 | Jeremy Epstein, Tim Williams |
Using Fortezza For Transparent File Encryption. |
ACSAC |
1996 |
DBLP DOI BibTeX RDF |
Fortezza, transparent file encryption, SISTex, Assure Basic product, security features, DOS/Windows environment, DES based file encryption, Fortezza card, Skipjack algorithm, technical problems, access controls, cryptography, Data Encryption Standard, product development |
1 | E. John Sebes, Terry C. Vickers Benzel |
SIGMA: Security For Distributed Object Interoperability Between Trusted And Untrusted Systems. |
ACSAC |
1996 |
DBLP DOI BibTeX RDF |
SIGMA project, distributed object interoperability, trusted systems, untrusted systems, object oriented services, CORBA based application interoperation, distributed systems, Common Object Request Broker Architecture, security policy, open systems, distributed computing environments, security technologies |
1 | Richard A. Kemmerer, Tad Taylor |
A Modular Covert Channel Analysis Methodology for Trusted DG/UXTM. |
ACSAC |
1996 |
DBLP DOI BibTeX RDF |
modular covert channel analysis methodology, Trusted DG/UX, CCA approach, subsystem architecture, DG/UX kernel, system state, abstract object, Ratings Maintenance Program, RAMP, SRM analysis, exported function, peer subsystems, kernel-wide SRM, commercial strength Unix system, operating system kernels, system calls, modular approach |
1 | Eric M. Kayden |
Using a Proxy X Server to Facilitate COTS Application Integration. |
ACSAC |
1996 |
DBLP DOI BibTeX RDF |
proxy X Window System server, COTS application integration, XPatch, trusted X Window system implementations, portability issues, accreditation issues, multiprogramming |
1 | |
12th Annual Computer Security Applications Conference (ACSAC 1996), 9-13 December 1996, San Diego, CA, USA |
ACSAC |
1996 |
DBLP BibTeX RDF |
|
1 | Pierre Bieber |
Formal Techniques for an ITSEC-E4 Secure Gateway. |
ACSAC |
1996 |
DBLP DOI BibTeX RDF |
ITSEC-E4 secure gateway, interactive theorem prover, Information Technology Security Evaluation Criteria, formal specification, security policy, security architecture, formal technique, functional specifications |
1 | Herve Hosy, Mary Schanken |
Common Criteria Activities and Alternative Assurance. |
ACSAC |
1996 |
DBLP DOI BibTeX RDF |
|
1 | Mary Schanken |
SSE-CMM Pilot Results. |
ACSAC |
1996 |
DBLP DOI BibTeX RDF |
|
1 | Rae K. Burns, Yi-Fang Koh |
A Comparison of Multilevel Structured Query Language (SQL) Implementations. |
ACSAC |
1996 |
DBLP DOI BibTeX RDF |
|
1 | Mansour Esmaili, Bala Balachandran, Reihaneh Safavi-Naini, Josef Pieprzyk |
Case-Based Reasoning for Intrusion Detection. |
ACSAC |
1996 |
DBLP DOI BibTeX RDF |
model based expert systems, case based reasoning approach, artificial intelligence, intrusion detection, authorisation |
1 | Michael Hitchens, Vijay Varadharajan |
esign Choices For Symmetric Key Based Inter-Domain Authentication Protocols In Distributed Systems. |
ACSAC |
1996 |
DBLP DOI BibTeX RDF |
design choices, secure interactions, key establishment protocols, client responsibility, trusted server responsibility, inter-domain protocols, symmetric key systems, OSF Distributed Computing Environment, distributed systems, message authentication, authentication protocols, Kerberos |
1 | Randall W. Lichota, Grace L. Hammonds, Stephen H. Brackin |
Verifying The Correctness Of Cryptographic Protocols Using "Convince". |
ACSAC |
1996 |
DBLP DOI BibTeX RDF |
Convince, theorem proving component, commercial computer aided software engineering tool, StP/OMT, textual notations, Higher Order Logic theorem prover, protocols, cryptographic protocols, authentication protocols, front-end, belief logic, correctness verification, automated support |
1 | M. Nash, R. J. Kennett |
Implementing Security Policy in a Large Defense Procurement. |
ACSAC |
1996 |
DBLP DOI BibTeX RDF |
|
1 | Luigi Giuri, Pietro Iglio |
A Role-Based Secure Database Design Tool. |
ACSAC |
1996 |
DBLP DOI BibTeX RDF |
role based secure database design tool, database design methodologies, secure database design methodology, entity relationship conceptual data model, role based security model, analysis algorithm, potential security design mistakes, translation procedure, SQL specification, conceptual model, entity-relationship modelling |
1 | Michael G. Reed, Paul F. Syverson, David M. Goldschlag |
Proxies For Anonymous Routing. |
ACSAC |
1996 |
DBLP DOI BibTeX RDF |
anonymous routing, network traffic analysis-resistant method, flexible communications infrastructure, unmodified Internet services, Sun Solaris 2.4, World Wide Web browsing, remote logins, application-independent real-time bi-directional anonymous connections, anonymous connections, identifying information, packet-switched public network, HTTP, proxies, telecommunication network routing, electronic mail, file transfers, eavesdropping, FTP, onion routing, SMTP, public network, user anonymity |
1 | Ning Zhang, Qi Shi 0001 |
Security Issues in an EDI Environment. |
ACSAC |
1996 |
DBLP DOI BibTeX RDF |
EDI environment, electronic transmission, trade related documents, EDI system, EDI specific security requirement, non repudiation of receipt, heterogeneous system platform, protocol, electronic data interchange, Electronic Data Interchange, security threats, security issues |
1 | Susan L. Chapin, William R. Herndon, LouAnna Notargiacomo, Melonyi L. Katz, Thomas J. Mowbray |
Security for the Common Object Request Broker Architecture (CORBA). |
ACSAC |
1994 |
DBLP DOI BibTeX RDF |
|
1 | Edward Amoroso, Michael Merritt |
Composing system integrity using I/O automata. |
ACSAC |
1994 |
DBLP DOI BibTeX RDF |
|
1 | Lorrayne J. Schaefer, Brian W. McKenney |
Networked information discovery and retrieval tools: security capabilities and needs. |
ACSAC |
1994 |
DBLP DOI BibTeX RDF |
|
1 | Deborah J. Bodeau |
System-of-systems security engineering. |
ACSAC |
1994 |
DBLP DOI BibTeX RDF |
|
1 | Marcus Brown 0001, Samuel Joe Rogers |
A practical approach to user authentication. |
ACSAC |
1994 |
DBLP DOI BibTeX RDF |
|
1 | Eric A. Fisch, Gregory B. White, Udo W. Pooch |
The design of an audit trail analysis tool. |
ACSAC |
1994 |
DBLP DOI BibTeX RDF |
|
1 | George Fink, Karl N. Levitt |
Property-based testing of privileged programs. |
ACSAC |
1994 |
DBLP DOI BibTeX RDF |
|
1 | Calvin Ko, George Fink, Karl N. Levitt |
Automated detection of vulnerabilities in privileged programs by execution monitoring. |
ACSAC |
1994 |
DBLP DOI BibTeX RDF |
|
1 | Greg King |
Secure system composition: five practical initiatives. |
ACSAC |
1994 |
DBLP DOI BibTeX RDF |
|
1 | Rob Dobry, Mary Schanken |
Security concerns for distributed systems. |
ACSAC |
1994 |
DBLP DOI BibTeX RDF |
|
1 | James W. Freeman, Richard B. Neely, M. A. Heckard |
A validated security policy modeling approach. |
ACSAC |
1994 |
DBLP DOI BibTeX RDF |
|
1 | Balaji R. Venkatraman, Richard E. Newman-Wolfe |
Performance analysis of a method for high level prevention of traffic analysis using measurements from a campus network. |
ACSAC |
1994 |
DBLP DOI BibTeX RDF |
|
1 | Judith A. Hemenway, Jonathan Fellows |
Applying the Abadi-Lamport composition theorem in real-world secure system integration environments. |
ACSAC |
1994 |
DBLP DOI BibTeX RDF |
|
1 | Ravi S. Sandhu, Edward J. Coyne, Hal L. Feinstein, Charles E. Youman |
Role-based access control: a multi-dimensional view. |
ACSAC |
1994 |
DBLP DOI BibTeX RDF |
|
1 | Jeremy Epstein |
Editorial: a view of cryptography in TCSEC products. |
ACSAC |
1994 |
DBLP DOI BibTeX RDF |
|
1 | Judith N. Froscher, Myong H. Kang, John P. McDermott, Oliver Costich, Carl E. Landwehr |
A practical approach to high assurance multilevel secure computing service. |
ACSAC |
1994 |
DBLP DOI BibTeX RDF |
|
1 | Randall E. Smith |
A secure Email gateway (building an RCAS external interface). |
ACSAC |
1994 |
DBLP DOI BibTeX RDF |
|
1 | Peter K. Boucher, Teresa F. Lunt |
A prototype multilevel-secure DoD directory. |
ACSAC |
1994 |
DBLP DOI BibTeX RDF |
|
1 | C. L. Robinson, Simon R. Wiseman |
Using security models to investigate CMW design and implementation. |
ACSAC |
1994 |
DBLP DOI BibTeX RDF |
|
1 | Vinti Doshi, William R. Herndon, Sushil Jajodia, Catherine D. McCollum |
Benchmarking multilevel secure database systems using the MITRE benchmark. |
ACSAC |
1994 |
DBLP DOI BibTeX RDF |
|
1 | Bill Neugent |
Where we stand in multilevel security (MLS): requirements, approaches, issues, and lessons learned. |
ACSAC |
1994 |
DBLP DOI BibTeX RDF |
|
1 | Klaus J. Keus, Markus Ullmann |
Availability: theory and fundamentals for practical evaluation and use. |
ACSAC |
1994 |
DBLP DOI BibTeX RDF |
|
1 | Eugene D. Myers |
STU-III-multilevel secure computer interface. |
ACSAC |
1994 |
DBLP DOI BibTeX RDF |
|
1 | Myong H. Kang, Judith N. Froscher, Ravi Mukkamala |
Architectural impact on performance of a multilevel database system. |
ACSAC |
1994 |
DBLP DOI BibTeX RDF |
|
1 | Mary M. Bernstein, Chulsoo Kim |
AOS: an avionics operating system for multi-level secure real-time environments. |
ACSAC |
1994 |
DBLP DOI BibTeX RDF |
|
1 | Paul Proctor |
Audit reduction and misuse detection in heterogeneous environments: framework and application. |
ACSAC |
1994 |
DBLP DOI BibTeX RDF |
|
1 | Kate Arndt, Michael Burgoon, Jeanne Firey, Keith Rodenhausen |
Ops/Intel interface lessons learned: the integrator's perspective. |
ACSAC |
1994 |
DBLP DOI BibTeX RDF |
|
1 | Jay J. Kahn, Marshall D. Abrams |
Editorial: why bad things happen to good systems, and what to do about it. |
ACSAC |
1994 |
DBLP DOI BibTeX RDF |
|
1 | Michael V. Joyce |
The effects of trusted technology on distributed applications. |
ACSAC |
1994 |
DBLP DOI BibTeX RDF |
|
1 | Günther Pernul, Gerald Quirchmayr |
Organizing MLS databases from a data modelling point of view. |
ACSAC |
1994 |
DBLP DOI BibTeX RDF |
|
1 | |
10th Annual Computer Security Applications Conference, ACSAC 1994, 5-9 December, 1994 Orlando, FL, USA |
ACSAC |
1994 |
DBLP BibTeX RDF |
|
1 | Doug Rosenthal |
EINet: a secure, open network for electronic commerce. |
ACSAC |
1994 |
DBLP DOI BibTeX RDF |
|
1 | David S. Goldberg |
The MITRE security perimeter. |
ACSAC |
1994 |
DBLP DOI BibTeX RDF |
|
1 | Mary M. Bernstein, Terry C. Vickers Benzel |
Real-time trust with 'System Build': lessons learned. |
ACSAC |
1993 |
DBLP DOI BibTeX RDF |
|
1 | Daniel P. Faigin, Joseph Donndelinger, J. R. Jones |
A rigorous approach to determining objects. |
ACSAC |
1993 |
DBLP DOI BibTeX RDF |
|
1 | Eric M. Kayden, L. J. Schaefer |
Heterogeneous workstation to STU-III prototype. |
ACSAC |
1993 |
DBLP DOI BibTeX RDF |
|
1 | Deborah J. Bodeau, Vipin Swarup |
Integration of security services into the NORAD/USSPACECOM technical infrastructure: a case study. |
ACSAC |
1993 |
DBLP DOI BibTeX RDF |
|
1 | Selwyn Russell |
Transparent cosignatures for electronic documents. |
ACSAC |
1993 |
DBLP DOI BibTeX RDF |
|
1 | Jeremy Epstein, Rita Pascale |
User interface for a high assurance, windowing system. |
ACSAC |
1993 |
DBLP DOI BibTeX RDF |
|
1 | Raymond K. Clark, Ira B. Greenberg, Peter K. Boucher, Teresa F. Lunt, Peter G. Neumann, Douglas M. Wells, E. Douglas Jensen |
Effects of multilevel security on real-time applications. |
ACSAC |
1993 |
DBLP DOI BibTeX RDF |
|
1 | Ulf Carlsen |
Using logics to detect implementation-dependent flaws [cryptographic protocol design]. |
ACSAC |
1993 |
DBLP DOI BibTeX RDF |
|
1 | Sharon R. Lewis, Simon R. Wiseman |
Database design and MLS DBMSs: an unhappy alliance? |
ACSAC |
1993 |
DBLP DOI BibTeX RDF |
|
1 | |
Ninth Annual Computer Security Applications Conference, ACSAC 1993, 6-10 Decemver, 1993, Orlando, Florida, USA |
ACSAC |
1993 |
DBLP BibTeX RDF |
|
1 | John A. Fitch III, Lance J. Hoffman |
On the shortest path to network security. |
ACSAC |
1993 |
DBLP DOI BibTeX RDF |
|
1 | M. O. Aldrich |
A methodology for the use of single level RDBMS software in a multi-level secured system. |
ACSAC |
1993 |
DBLP DOI BibTeX RDF |
|
1 | Michael J. Nash, Ronald J. Kennett |
Security policy in a complex logistics procurement. |
ACSAC |
1993 |
DBLP DOI BibTeX RDF |
|
1 | Herman Otto Lubbes |
COMPUSEC, a personal view. |
ACSAC |
1993 |
DBLP DOI BibTeX RDF |
|
1 | Rick Schultz, Tim Ehrsam |
Migrating a commercial-off-the-shelf application to a multilevel secure environment. |
ACSAC |
1993 |
DBLP DOI BibTeX RDF |
|
1 | Willem G. de Ru, Jan H. P. Eloff |
Improved password mechanisms through expert system technology. |
ACSAC |
1993 |
DBLP DOI BibTeX RDF |
|
1 | Ravi S. Sandhu, Srinivas Ganta |
Expressive power of the single-object typed access matrix model. |
ACSAC |
1993 |
DBLP DOI BibTeX RDF |
|
1 | Claudio Calvelli, Vijay Varadharajan |
Representation of mental health application access policy in a monotonic model. |
ACSAC |
1993 |
DBLP DOI BibTeX RDF |
|
1 | J. DeMeester |
C2 auditing in the X Display Manager. |
ACSAC |
1993 |
DBLP DOI BibTeX RDF |
|
1 | Michael R. Sweezey |
Specification issues of secure systems. |
ACSAC |
1993 |
DBLP DOI BibTeX RDF |
|
Displaying result #1401 - #1500 of 1667 (100 per page; Change: ) Pages: [ <<][ 5][ 6][ 7][ 8][ 9][ 10][ 11][ 12][ 13][ 14][ 15][ 16][ 17][ >>] |
|