The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "ACSAC"( http://dblp.L3S.de/Venues/ACSAC )

URL (DBLP): http://dblp.uni-trier.de/db/conf/aPcsac

Publication years (Num. hits)
1989 (62) 1990 (46) 1991 (25) 1992 (25) 1993 (29) 1994 (33) 1996 (29) 1997 (30) 1998 (36) 1999 (44) 2000 (43) 2001 (65) 2002 (42) 2003 (44) 2004 (42) 2005 (61) 2006 (45) 2007 (45) 2008 (99) 2009 (49) 2010 (43) 2011 (43) 2012 (47) 2013 (37) 2014 (49) 2015 (48) 2016 (49) 2017 (49) 2018 (61) 2019 (61) 2020 (71) 2021 (81) 2022 (74) 2023 (60)
Publication types (Num. hits)
inproceedings(1631) proceedings(36)
Venues (Conferences, Journals, ...)
ACSAC(1667)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 738 occurrences of 436 keywords

Results
Found 1667 publication records. Showing 1667 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Che-Fn Yu An authorization plan for commercial service systems. Search on Bibsonomy ACSAC The full citation details ... 1990 DBLP  DOI  BibTeX  RDF
1Bhavani Thuraisingham, Ammiel Kamon Secure query processing in distributed database management systems-design and performance studies. Search on Bibsonomy ACSAC The full citation details ... 1990 DBLP  DOI  BibTeX  RDF
1D. Richard Kuhn, James F. Dray Formal specification and verification of control software for cryptographic equipment. Search on Bibsonomy ACSAC The full citation details ... 1990 DBLP  DOI  BibTeX  RDF
1Kristina C. Rogers Model of access control policy for civil agencies. Search on Bibsonomy ACSAC The full citation details ... 1990 DBLP  DOI  BibTeX  RDF
1Christian N. Payne, Judith N. Froscher, John P. McDermott On models for a trusted application system. Search on Bibsonomy ACSAC The full citation details ... 1990 DBLP  DOI  BibTeX  RDF
1Sammy Migues, Russell Housley Designing a trusted client-server distributed network. Search on Bibsonomy ACSAC The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
1Russell J. Davis Network authentication tokens. Search on Bibsonomy ACSAC The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
1Helena B. Winkler-Parenty Considerations on TCB subsetting. Search on Bibsonomy ACSAC The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
1Thomas H. Hinke Secure database design panel. Search on Bibsonomy ACSAC The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
1Jody Heaney, Marc Adkins, Gary Dolsen, John Page Security model development environment. Search on Bibsonomy ACSAC The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
1James O. Bondi, Martha A. Branstad Architectural support of fine-grained secure computing. Search on Bibsonomy ACSAC The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
1Thomas F. Keefe, Wei-Tek Tsai Security model consistency in secure object-oriented systems. Search on Bibsonomy ACSAC The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
1Richard J. Feiertag Does TCB subsetting enhance trust? Search on Bibsonomy ACSAC The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
1Frank L. Mayer, William Curtis Barker, Theresa K. Haley, J. Noelle McAuliffe, Daniel F. Sterne, Lynne S. Vidmar Evaluation issues for an integrated 'INFOSEC' product. Search on Bibsonomy ACSAC The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
1Bhavani M. Thuraisingham Secure query processing in intelligent database management systems. Search on Bibsonomy ACSAC The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
1Robert E. Niemeyer Applying the TNI to system certification and accreditation. Search on Bibsonomy ACSAC The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
1Teresa F. Lunt Report from the second RADC database security workshop. Search on Bibsonomy ACSAC The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
1Tom Casey, Michael Roe, Bill Tuck, Steve R. Wilbur Secure automated document delivery. Search on Bibsonomy ACSAC The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
1Ravi S. Sandhu A perspective on integrity mechanisms. Search on Bibsonomy ACSAC The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
1Tsau Young Lin Chinese wall security policy-an aggressive model. Search on Bibsonomy ACSAC The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
1Edward D. Sturms Secure database design: an implementation using a secure DBMS. Search on Bibsonomy ACSAC The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
1Matt Bishop A model of security monitoring. Search on Bibsonomy ACSAC The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
1Eugen M. Bacic Process execution controls as a mechanism to ensure consistency. Search on Bibsonomy ACSAC The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
1Lloyd F. Reese Challenges faced today by computer security practitioners. Search on Bibsonomy ACSAC The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
1William C. Gorham Jr. Data protection requirements in computer-aided acquisition and logistic support. Search on Bibsonomy ACSAC The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
1Kimberly E. Kirkpatrick A security standard for LANs. Search on Bibsonomy ACSAC The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
1R. A. Gove, Arthur R. Friedman A structured risk analysis approach to resolve the data protection and integrity issues for computer-aided acquisition logistics support (CALS). Search on Bibsonomy ACSAC The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
1Russell Housley Electronic messaging security: a comparison of three approaches. Search on Bibsonomy ACSAC The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
1Howard L. Johnson Integrity panel position paper. Search on Bibsonomy ACSAC The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
1Terry C. Vickers Benzel Developing trusted systems using DOD-STD-2167A. Search on Bibsonomy ACSAC The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
1Nancy K. Woodfield An approach for evaluating the security of an Air Force type network. Search on Bibsonomy ACSAC The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
1E. R. Schallenmüller, Rich P. Cramer, Bruce Aldridge Development of a multi level data generation application for GEMSOS. Search on Bibsonomy ACSAC The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
1Gary W. Smith Multilevel secure database design: a practical application. Search on Bibsonomy ACSAC The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
1Doug Paul A summary of the Unisys experience with GEMSOS. Search on Bibsonomy ACSAC The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
1Bennett C. Karp The CALS Data Protection and Integrity Industry Working Group. Search on Bibsonomy ACSAC The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
1Norman Proctor, Raymond Wong The security policy of the secure distributed operating system prototype. Search on Bibsonomy ACSAC The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
1William Green ADP security within the Customs Service. Search on Bibsonomy ACSAC The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
1Santosh Chokhani Protection of call detail records data in federal telecommunications. Search on Bibsonomy ACSAC The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
1William Curtis Barker Use of privacy-enhanced mail for software distribution. Search on Bibsonomy ACSAC The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
1Ann B. Marmor-Squires, John McHugh, Martha A. Branstad, Bonnie P. Danner, Lou Nagy, Pat Rougeau, Daniel F. Sterne A risk driven process model for the development of trusted systems. Search on Bibsonomy ACSAC The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
1Lein Harn, Yaw-Ruey Chien, Thomas Kiesler An extended cryptographic key generation scheme for multilevel data security. Search on Bibsonomy ACSAC The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
1Thomas F. Keefe, Dan Thomsen, Wei-Tek Tsai, M. R. Hansch Multi-party conflict: the problem and its solutions. Search on Bibsonomy ACSAC The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
1Edward Humphreys, Warwick Ford, M. Stirland, Thomas Parker Security standards for open systems. Search on Bibsonomy ACSAC The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
1Dan Gambel Gemini developers: facts, myths, and war stories. Search on Bibsonomy ACSAC The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
1Ruth R. Nelson End-to-end encryption at the network layer. Search on Bibsonomy ACSAC The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
1Stephen D. Crocker, Emilie J. Siarkiewicz Software methodology for development of a trusted BMS: identification of critical problems. Search on Bibsonomy ACSAC The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
1Rolf Lang Implementing sensitive but unclassified security, today-a workshop proposal. Search on Bibsonomy ACSAC The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
1Ken Otwell, Bruce Aldridge The role of vulnerability in risk management. Search on Bibsonomy ACSAC The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
1J. R. Winkler, W. J. Page Intrusion and anomaly detection in trusted systems. Search on Bibsonomy ACSAC The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
1Linda L. Vetter, Gordon Smith, Teresa F. Lunt TCB subsets: the next step. Search on Bibsonomy ACSAC The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
1Nander Brown Assessment of security requirements for sensitive systems. Search on Bibsonomy ACSAC The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
1Bill Maimone RADC database security workshop oracle corporation homework problem solution. Search on Bibsonomy ACSAC The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
1Linda L. Vetter TCB subset architecture. Search on Bibsonomy ACSAC The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
1Ruth M. Davis Electronic information security in a digital environment. Search on Bibsonomy ACSAC The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
1Paul D. Stachour, Dan J. Thomsen A summary of the LDV solution to the homework problem. Search on Bibsonomy ACSAC The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
1K. N. Rao Security audit for embedded avionics systems. Search on Bibsonomy ACSAC The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
1Linda J. Harrison Security issues and Ada runtime support. Search on Bibsonomy ACSAC The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
1Marvin Schaefer, Brian Hubbard, Daniel F. Sterne, Theresa K. Haley, J. Noelle McAuliffe, Dawn Wolcott Auditing: a relevant contribution to trusted database management systems. Search on Bibsonomy ACSAC The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
1Victoria Ashby, Thomas Gregg, Annabelle Lee Security approach for rapid prototyping in multilevel secure systems. Search on Bibsonomy ACSAC The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
1Steven D. Smith Computer security and air traffic automation. Search on Bibsonomy ACSAC The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
1Lein Harn, Thomas Kiesler Two new efficient cryptosystems based on Rabin's scheme: alternatives to RSA cryptosystem. Search on Bibsonomy ACSAC The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
1Donald V. Miller, Robert W. Baldwin Access control by Boolean expression evaluation. Search on Bibsonomy ACSAC The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
1Thomas H. Hinke The trusted server approach to multilevel security. Search on Bibsonomy ACSAC The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
1Alan R. Downing, Ira B. Greenberg, Teresa F. Lunt Issues in distributed database security. Search on Bibsonomy ACSAC The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
1Greg King A survey of commercially available secure LAN products. Search on Bibsonomy ACSAC The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
1 Fifth Annual Computer Security Applications Conference, ACSAC 1989, 4-8 December, 1989, Westward Look Resort, Tucson, Arizona, USA Search on Bibsonomy ACSAC The full citation details ... 1989 DBLP  BibTeX  RDF
1Steven J. Reynolds, T. P. Grove Jr., John N. Parringin Human issues. Search on Bibsonomy ACSAC The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
Displaying result #1601 - #1667 of 1667 (100 per page; Change: )
Pages: [<<][7][8][9][10][11][12][13][14][15][16][17]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license