Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Che-Fn Yu |
An authorization plan for commercial service systems. |
ACSAC |
1990 |
DBLP DOI BibTeX RDF |
|
1 | Bhavani Thuraisingham, Ammiel Kamon |
Secure query processing in distributed database management systems-design and performance studies. |
ACSAC |
1990 |
DBLP DOI BibTeX RDF |
|
1 | D. Richard Kuhn, James F. Dray |
Formal specification and verification of control software for cryptographic equipment. |
ACSAC |
1990 |
DBLP DOI BibTeX RDF |
|
1 | Kristina C. Rogers |
Model of access control policy for civil agencies. |
ACSAC |
1990 |
DBLP DOI BibTeX RDF |
|
1 | Christian N. Payne, Judith N. Froscher, John P. McDermott |
On models for a trusted application system. |
ACSAC |
1990 |
DBLP DOI BibTeX RDF |
|
1 | Sammy Migues, Russell Housley |
Designing a trusted client-server distributed network. |
ACSAC |
1989 |
DBLP DOI BibTeX RDF |
|
1 | Russell J. Davis |
Network authentication tokens. |
ACSAC |
1989 |
DBLP DOI BibTeX RDF |
|
1 | Helena B. Winkler-Parenty |
Considerations on TCB subsetting. |
ACSAC |
1989 |
DBLP DOI BibTeX RDF |
|
1 | Thomas H. Hinke |
Secure database design panel. |
ACSAC |
1989 |
DBLP DOI BibTeX RDF |
|
1 | Jody Heaney, Marc Adkins, Gary Dolsen, John Page |
Security model development environment. |
ACSAC |
1989 |
DBLP DOI BibTeX RDF |
|
1 | James O. Bondi, Martha A. Branstad |
Architectural support of fine-grained secure computing. |
ACSAC |
1989 |
DBLP DOI BibTeX RDF |
|
1 | Thomas F. Keefe, Wei-Tek Tsai |
Security model consistency in secure object-oriented systems. |
ACSAC |
1989 |
DBLP DOI BibTeX RDF |
|
1 | Richard J. Feiertag |
Does TCB subsetting enhance trust? |
ACSAC |
1989 |
DBLP DOI BibTeX RDF |
|
1 | Frank L. Mayer, William Curtis Barker, Theresa K. Haley, J. Noelle McAuliffe, Daniel F. Sterne, Lynne S. Vidmar |
Evaluation issues for an integrated 'INFOSEC' product. |
ACSAC |
1989 |
DBLP DOI BibTeX RDF |
|
1 | Bhavani M. Thuraisingham |
Secure query processing in intelligent database management systems. |
ACSAC |
1989 |
DBLP DOI BibTeX RDF |
|
1 | Robert E. Niemeyer |
Applying the TNI to system certification and accreditation. |
ACSAC |
1989 |
DBLP DOI BibTeX RDF |
|
1 | Teresa F. Lunt |
Report from the second RADC database security workshop. |
ACSAC |
1989 |
DBLP DOI BibTeX RDF |
|
1 | Tom Casey, Michael Roe, Bill Tuck, Steve R. Wilbur |
Secure automated document delivery. |
ACSAC |
1989 |
DBLP DOI BibTeX RDF |
|
1 | Ravi S. Sandhu |
A perspective on integrity mechanisms. |
ACSAC |
1989 |
DBLP DOI BibTeX RDF |
|
1 | Tsau Young Lin |
Chinese wall security policy-an aggressive model. |
ACSAC |
1989 |
DBLP DOI BibTeX RDF |
|
1 | Edward D. Sturms |
Secure database design: an implementation using a secure DBMS. |
ACSAC |
1989 |
DBLP DOI BibTeX RDF |
|
1 | Matt Bishop |
A model of security monitoring. |
ACSAC |
1989 |
DBLP DOI BibTeX RDF |
|
1 | Eugen M. Bacic |
Process execution controls as a mechanism to ensure consistency. |
ACSAC |
1989 |
DBLP DOI BibTeX RDF |
|
1 | Lloyd F. Reese |
Challenges faced today by computer security practitioners. |
ACSAC |
1989 |
DBLP DOI BibTeX RDF |
|
1 | William C. Gorham Jr. |
Data protection requirements in computer-aided acquisition and logistic support. |
ACSAC |
1989 |
DBLP DOI BibTeX RDF |
|
1 | Kimberly E. Kirkpatrick |
A security standard for LANs. |
ACSAC |
1989 |
DBLP DOI BibTeX RDF |
|
1 | R. A. Gove, Arthur R. Friedman |
A structured risk analysis approach to resolve the data protection and integrity issues for computer-aided acquisition logistics support (CALS). |
ACSAC |
1989 |
DBLP DOI BibTeX RDF |
|
1 | Russell Housley |
Electronic messaging security: a comparison of three approaches. |
ACSAC |
1989 |
DBLP DOI BibTeX RDF |
|
1 | Howard L. Johnson |
Integrity panel position paper. |
ACSAC |
1989 |
DBLP DOI BibTeX RDF |
|
1 | Terry C. Vickers Benzel |
Developing trusted systems using DOD-STD-2167A. |
ACSAC |
1989 |
DBLP DOI BibTeX RDF |
|
1 | Nancy K. Woodfield |
An approach for evaluating the security of an Air Force type network. |
ACSAC |
1989 |
DBLP DOI BibTeX RDF |
|
1 | E. R. Schallenmüller, Rich P. Cramer, Bruce Aldridge |
Development of a multi level data generation application for GEMSOS. |
ACSAC |
1989 |
DBLP DOI BibTeX RDF |
|
1 | Gary W. Smith |
Multilevel secure database design: a practical application. |
ACSAC |
1989 |
DBLP DOI BibTeX RDF |
|
1 | Doug Paul |
A summary of the Unisys experience with GEMSOS. |
ACSAC |
1989 |
DBLP DOI BibTeX RDF |
|
1 | Bennett C. Karp |
The CALS Data Protection and Integrity Industry Working Group. |
ACSAC |
1989 |
DBLP DOI BibTeX RDF |
|
1 | Norman Proctor, Raymond Wong |
The security policy of the secure distributed operating system prototype. |
ACSAC |
1989 |
DBLP DOI BibTeX RDF |
|
1 | William Green |
ADP security within the Customs Service. |
ACSAC |
1989 |
DBLP DOI BibTeX RDF |
|
1 | Santosh Chokhani |
Protection of call detail records data in federal telecommunications. |
ACSAC |
1989 |
DBLP DOI BibTeX RDF |
|
1 | William Curtis Barker |
Use of privacy-enhanced mail for software distribution. |
ACSAC |
1989 |
DBLP DOI BibTeX RDF |
|
1 | Ann B. Marmor-Squires, John McHugh, Martha A. Branstad, Bonnie P. Danner, Lou Nagy, Pat Rougeau, Daniel F. Sterne |
A risk driven process model for the development of trusted systems. |
ACSAC |
1989 |
DBLP DOI BibTeX RDF |
|
1 | Lein Harn, Yaw-Ruey Chien, Thomas Kiesler |
An extended cryptographic key generation scheme for multilevel data security. |
ACSAC |
1989 |
DBLP DOI BibTeX RDF |
|
1 | Thomas F. Keefe, Dan Thomsen, Wei-Tek Tsai, M. R. Hansch |
Multi-party conflict: the problem and its solutions. |
ACSAC |
1989 |
DBLP DOI BibTeX RDF |
|
1 | Edward Humphreys, Warwick Ford, M. Stirland, Thomas Parker |
Security standards for open systems. |
ACSAC |
1989 |
DBLP DOI BibTeX RDF |
|
1 | Dan Gambel |
Gemini developers: facts, myths, and war stories. |
ACSAC |
1989 |
DBLP DOI BibTeX RDF |
|
1 | Ruth R. Nelson |
End-to-end encryption at the network layer. |
ACSAC |
1989 |
DBLP DOI BibTeX RDF |
|
1 | Stephen D. Crocker, Emilie J. Siarkiewicz |
Software methodology for development of a trusted BMS: identification of critical problems. |
ACSAC |
1989 |
DBLP DOI BibTeX RDF |
|
1 | Rolf Lang |
Implementing sensitive but unclassified security, today-a workshop proposal. |
ACSAC |
1989 |
DBLP DOI BibTeX RDF |
|
1 | Ken Otwell, Bruce Aldridge |
The role of vulnerability in risk management. |
ACSAC |
1989 |
DBLP DOI BibTeX RDF |
|
1 | J. R. Winkler, W. J. Page |
Intrusion and anomaly detection in trusted systems. |
ACSAC |
1989 |
DBLP DOI BibTeX RDF |
|
1 | Linda L. Vetter, Gordon Smith, Teresa F. Lunt |
TCB subsets: the next step. |
ACSAC |
1989 |
DBLP DOI BibTeX RDF |
|
1 | Nander Brown |
Assessment of security requirements for sensitive systems. |
ACSAC |
1989 |
DBLP DOI BibTeX RDF |
|
1 | Bill Maimone |
RADC database security workshop oracle corporation homework problem solution. |
ACSAC |
1989 |
DBLP DOI BibTeX RDF |
|
1 | Linda L. Vetter |
TCB subset architecture. |
ACSAC |
1989 |
DBLP DOI BibTeX RDF |
|
1 | Ruth M. Davis |
Electronic information security in a digital environment. |
ACSAC |
1989 |
DBLP DOI BibTeX RDF |
|
1 | Paul D. Stachour, Dan J. Thomsen |
A summary of the LDV solution to the homework problem. |
ACSAC |
1989 |
DBLP DOI BibTeX RDF |
|
1 | K. N. Rao |
Security audit for embedded avionics systems. |
ACSAC |
1989 |
DBLP DOI BibTeX RDF |
|
1 | Linda J. Harrison |
Security issues and Ada runtime support. |
ACSAC |
1989 |
DBLP DOI BibTeX RDF |
|
1 | Marvin Schaefer, Brian Hubbard, Daniel F. Sterne, Theresa K. Haley, J. Noelle McAuliffe, Dawn Wolcott |
Auditing: a relevant contribution to trusted database management systems. |
ACSAC |
1989 |
DBLP DOI BibTeX RDF |
|
1 | Victoria Ashby, Thomas Gregg, Annabelle Lee |
Security approach for rapid prototyping in multilevel secure systems. |
ACSAC |
1989 |
DBLP DOI BibTeX RDF |
|
1 | Steven D. Smith |
Computer security and air traffic automation. |
ACSAC |
1989 |
DBLP DOI BibTeX RDF |
|
1 | Lein Harn, Thomas Kiesler |
Two new efficient cryptosystems based on Rabin's scheme: alternatives to RSA cryptosystem. |
ACSAC |
1989 |
DBLP DOI BibTeX RDF |
|
1 | Donald V. Miller, Robert W. Baldwin |
Access control by Boolean expression evaluation. |
ACSAC |
1989 |
DBLP DOI BibTeX RDF |
|
1 | Thomas H. Hinke |
The trusted server approach to multilevel security. |
ACSAC |
1989 |
DBLP DOI BibTeX RDF |
|
1 | Alan R. Downing, Ira B. Greenberg, Teresa F. Lunt |
Issues in distributed database security. |
ACSAC |
1989 |
DBLP DOI BibTeX RDF |
|
1 | Greg King |
A survey of commercially available secure LAN products. |
ACSAC |
1989 |
DBLP DOI BibTeX RDF |
|
1 | |
Fifth Annual Computer Security Applications Conference, ACSAC 1989, 4-8 December, 1989, Westward Look Resort, Tucson, Arizona, USA |
ACSAC |
1989 |
DBLP BibTeX RDF |
|
1 | Steven J. Reynolds, T. P. Grove Jr., John N. Parringin |
Human issues. |
ACSAC |
1989 |
DBLP DOI BibTeX RDF |
|