Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Che-Fn Yu |
An authorization plan for commercial service systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Sixth Annual Computer Security Applications Conference, ACSAC 1990, 3-7 December, 1990, Tucson, Arizona, USA, pp. 376-383, 1990, IEEE. The full citation details ...](Pics/full.jpeg) |
1990 |
DBLP DOI BibTeX RDF |
|
1 | Bhavani Thuraisingham, Ammiel Kamon |
Secure query processing in distributed database management systems-design and performance studies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Sixth Annual Computer Security Applications Conference, ACSAC 1990, 3-7 December, 1990, Tucson, Arizona, USA, pp. 88-102, 1990, IEEE. The full citation details ...](Pics/full.jpeg) |
1990 |
DBLP DOI BibTeX RDF |
|
1 | D. Richard Kuhn, James F. Dray |
Formal specification and verification of control software for cryptographic equipment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Sixth Annual Computer Security Applications Conference, ACSAC 1990, 3-7 December, 1990, Tucson, Arizona, USA, pp. 32-43, 1990, IEEE. The full citation details ...](Pics/full.jpeg) |
1990 |
DBLP DOI BibTeX RDF |
|
1 | Kristina C. Rogers |
Model of access control policy for civil agencies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Sixth Annual Computer Security Applications Conference, ACSAC 1990, 3-7 December, 1990, Tucson, Arizona, USA, pp. 393-404, 1990, IEEE. The full citation details ...](Pics/full.jpeg) |
1990 |
DBLP DOI BibTeX RDF |
|
1 | Christian N. Payne, Judith N. Froscher, John P. McDermott |
On models for a trusted application system. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Sixth Annual Computer Security Applications Conference, ACSAC 1990, 3-7 December, 1990, Tucson, Arizona, USA, pp. 58-67, 1990, IEEE. The full citation details ...](Pics/full.jpeg) |
1990 |
DBLP DOI BibTeX RDF |
|
1 | Sammy Migues, Russell Housley |
Designing a trusted client-server distributed network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Fifth Annual Computer Security Applications Conference, ACSAC 1989, 4-8 December, 1989, Westward Look Resort, Tucson, Arizona, USA, pp. 91-94, 1989, IEEE. The full citation details ...](Pics/full.jpeg) |
1989 |
DBLP DOI BibTeX RDF |
|
1 | Russell J. Davis |
Network authentication tokens. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Fifth Annual Computer Security Applications Conference, ACSAC 1989, 4-8 December, 1989, Westward Look Resort, Tucson, Arizona, USA, pp. 234-238, 1989, IEEE. The full citation details ...](Pics/full.jpeg) |
1989 |
DBLP DOI BibTeX RDF |
|
1 | Helena B. Winkler-Parenty |
Considerations on TCB subsetting. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Fifth Annual Computer Security Applications Conference, ACSAC 1989, 4-8 December, 1989, Westward Look Resort, Tucson, Arizona, USA, pp. 105-106, 1989, IEEE. The full citation details ...](Pics/full.jpeg) |
1989 |
DBLP DOI BibTeX RDF |
|
1 | Thomas H. Hinke |
Secure database design panel. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Fifth Annual Computer Security Applications Conference, ACSAC 1989, 4-8 December, 1989, Westward Look Resort, Tucson, Arizona, USA, 1989, IEEE. The full citation details ...](Pics/full.jpeg) |
1989 |
DBLP DOI BibTeX RDF |
|
1 | Jody Heaney, Marc Adkins, Gary Dolsen, John Page |
Security model development environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Fifth Annual Computer Security Applications Conference, ACSAC 1989, 4-8 December, 1989, Westward Look Resort, Tucson, Arizona, USA, pp. 299-307, 1989, IEEE. The full citation details ...](Pics/full.jpeg) |
1989 |
DBLP DOI BibTeX RDF |
|
1 | James O. Bondi, Martha A. Branstad |
Architectural support of fine-grained secure computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Fifth Annual Computer Security Applications Conference, ACSAC 1989, 4-8 December, 1989, Westward Look Resort, Tucson, Arizona, USA, pp. 121-130, 1989, IEEE. The full citation details ...](Pics/full.jpeg) |
1989 |
DBLP DOI BibTeX RDF |
|
1 | Thomas F. Keefe, Wei-Tek Tsai |
Security model consistency in secure object-oriented systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Fifth Annual Computer Security Applications Conference, ACSAC 1989, 4-8 December, 1989, Westward Look Resort, Tucson, Arizona, USA, pp. 290-298, 1989, IEEE. The full citation details ...](Pics/full.jpeg) |
1989 |
DBLP DOI BibTeX RDF |
|
1 | Richard J. Feiertag |
Does TCB subsetting enhance trust? ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Fifth Annual Computer Security Applications Conference, ACSAC 1989, 4-8 December, 1989, Westward Look Resort, Tucson, Arizona, USA, 1989, IEEE. The full citation details ...](Pics/full.jpeg) |
1989 |
DBLP DOI BibTeX RDF |
|
1 | Frank L. Mayer, William Curtis Barker, Theresa K. Haley, J. Noelle McAuliffe, Daniel F. Sterne, Lynne S. Vidmar |
Evaluation issues for an integrated 'INFOSEC' product. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Fifth Annual Computer Security Applications Conference, ACSAC 1989, 4-8 December, 1989, Westward Look Resort, Tucson, Arizona, USA, pp. 271-275, 1989, IEEE. The full citation details ...](Pics/full.jpeg) |
1989 |
DBLP DOI BibTeX RDF |
|
1 | Bhavani M. Thuraisingham |
Secure query processing in intelligent database management systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Fifth Annual Computer Security Applications Conference, ACSAC 1989, 4-8 December, 1989, Westward Look Resort, Tucson, Arizona, USA, pp. 204-214, 1989, IEEE. The full citation details ...](Pics/full.jpeg) |
1989 |
DBLP DOI BibTeX RDF |
|
1 | Robert E. Niemeyer |
Applying the TNI to system certification and accreditation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Fifth Annual Computer Security Applications Conference, ACSAC 1989, 4-8 December, 1989, Westward Look Resort, Tucson, Arizona, USA, pp. 248-252, 1989, IEEE. The full citation details ...](Pics/full.jpeg) |
1989 |
DBLP DOI BibTeX RDF |
|
1 | Teresa F. Lunt |
Report from the second RADC database security workshop. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Fifth Annual Computer Security Applications Conference, ACSAC 1989, 4-8 December, 1989, Westward Look Resort, Tucson, Arizona, USA, pp. 310-313, 1989, IEEE. The full citation details ...](Pics/full.jpeg) |
1989 |
DBLP DOI BibTeX RDF |
|
1 | Tom Casey, Michael Roe, Bill Tuck, Steve R. Wilbur |
Secure automated document delivery. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Fifth Annual Computer Security Applications Conference, ACSAC 1989, 4-8 December, 1989, Westward Look Resort, Tucson, Arizona, USA, pp. 348-356, 1989, IEEE. The full citation details ...](Pics/full.jpeg) |
1989 |
DBLP DOI BibTeX RDF |
|
1 | Ravi S. Sandhu |
A perspective on integrity mechanisms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Fifth Annual Computer Security Applications Conference, ACSAC 1989, 4-8 December, 1989, Westward Look Resort, Tucson, Arizona, USA, 1989, IEEE. The full citation details ...](Pics/full.jpeg) |
1989 |
DBLP DOI BibTeX RDF |
|
1 | Tsau Young Lin |
Chinese wall security policy-an aggressive model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Fifth Annual Computer Security Applications Conference, ACSAC 1989, 4-8 December, 1989, Westward Look Resort, Tucson, Arizona, USA, pp. 282-289, 1989, IEEE. The full citation details ...](Pics/full.jpeg) |
1989 |
DBLP DOI BibTeX RDF |
|
1 | Edward D. Sturms |
Secure database design: an implementation using a secure DBMS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Fifth Annual Computer Security Applications Conference, ACSAC 1989, 4-8 December, 1989, Westward Look Resort, Tucson, Arizona, USA, 1989, IEEE. The full citation details ...](Pics/full.jpeg) |
1989 |
DBLP DOI BibTeX RDF |
|
1 | Matt Bishop |
A model of security monitoring. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Fifth Annual Computer Security Applications Conference, ACSAC 1989, 4-8 December, 1989, Westward Look Resort, Tucson, Arizona, USA, pp. 46-52, 1989, IEEE. The full citation details ...](Pics/full.jpeg) |
1989 |
DBLP DOI BibTeX RDF |
|
1 | Eugen M. Bacic |
Process execution controls as a mechanism to ensure consistency. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Fifth Annual Computer Security Applications Conference, ACSAC 1989, 4-8 December, 1989, Westward Look Resort, Tucson, Arizona, USA, pp. 114-120, 1989, IEEE. The full citation details ...](Pics/full.jpeg) |
1989 |
DBLP DOI BibTeX RDF |
|
1 | Lloyd F. Reese |
Challenges faced today by computer security practitioners. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Fifth Annual Computer Security Applications Conference, ACSAC 1989, 4-8 December, 1989, Westward Look Resort, Tucson, Arizona, USA, 1989, IEEE. The full citation details ...](Pics/full.jpeg) |
1989 |
DBLP DOI BibTeX RDF |
|
1 | William C. Gorham Jr. |
Data protection requirements in computer-aided acquisition and logistic support. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Fifth Annual Computer Security Applications Conference, ACSAC 1989, 4-8 December, 1989, Westward Look Resort, Tucson, Arizona, USA, pp. 12-13, 1989, IEEE. The full citation details ...](Pics/full.jpeg) |
1989 |
DBLP DOI BibTeX RDF |
|
1 | Kimberly E. Kirkpatrick |
A security standard for LANs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Fifth Annual Computer Security Applications Conference, ACSAC 1989, 4-8 December, 1989, Westward Look Resort, Tucson, Arizona, USA, 1989, IEEE. The full citation details ...](Pics/full.jpeg) |
1989 |
DBLP DOI BibTeX RDF |
|
1 | R. A. Gove, Arthur R. Friedman |
A structured risk analysis approach to resolve the data protection and integrity issues for computer-aided acquisition logistics support (CALS). ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Fifth Annual Computer Security Applications Conference, ACSAC 1989, 4-8 December, 1989, Westward Look Resort, Tucson, Arizona, USA, pp. 4-5, 1989, IEEE. The full citation details ...](Pics/full.jpeg) |
1989 |
DBLP DOI BibTeX RDF |
|
1 | Russell Housley |
Electronic messaging security: a comparison of three approaches. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Fifth Annual Computer Security Applications Conference, ACSAC 1989, 4-8 December, 1989, Westward Look Resort, Tucson, Arizona, USA, 1989, IEEE. The full citation details ...](Pics/full.jpeg) |
1989 |
DBLP DOI BibTeX RDF |
|
1 | Howard L. Johnson |
Integrity panel position paper. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Fifth Annual Computer Security Applications Conference, ACSAC 1989, 4-8 December, 1989, Westward Look Resort, Tucson, Arizona, USA, 1989, IEEE. The full citation details ...](Pics/full.jpeg) |
1989 |
DBLP DOI BibTeX RDF |
|
1 | Terry C. Vickers Benzel |
Developing trusted systems using DOD-STD-2167A. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Fifth Annual Computer Security Applications Conference, ACSAC 1989, 4-8 December, 1989, Westward Look Resort, Tucson, Arizona, USA, pp. 166-176, 1989, IEEE. The full citation details ...](Pics/full.jpeg) |
1989 |
DBLP DOI BibTeX RDF |
|
1 | Nancy K. Woodfield |
An approach for evaluating the security of an Air Force type network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Fifth Annual Computer Security Applications Conference, ACSAC 1989, 4-8 December, 1989, Westward Look Resort, Tucson, Arizona, USA, pp. 53-62, 1989, IEEE. The full citation details ...](Pics/full.jpeg) |
1989 |
DBLP DOI BibTeX RDF |
|
1 | E. R. Schallenmüller, Rich P. Cramer, Bruce Aldridge |
Development of a multi level data generation application for GEMSOS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Fifth Annual Computer Security Applications Conference, ACSAC 1989, 4-8 December, 1989, Westward Look Resort, Tucson, Arizona, USA, pp. 86-90, 1989, IEEE. The full citation details ...](Pics/full.jpeg) |
1989 |
DBLP DOI BibTeX RDF |
|
1 | Gary W. Smith |
Multilevel secure database design: a practical application. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Fifth Annual Computer Security Applications Conference, ACSAC 1989, 4-8 December, 1989, Westward Look Resort, Tucson, Arizona, USA, pp. 314-321, 1989, IEEE. The full citation details ...](Pics/full.jpeg) |
1989 |
DBLP DOI BibTeX RDF |
|
1 | Doug Paul |
A summary of the Unisys experience with GEMSOS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Fifth Annual Computer Security Applications Conference, ACSAC 1989, 4-8 December, 1989, Westward Look Resort, Tucson, Arizona, USA, 1989, IEEE. The full citation details ...](Pics/full.jpeg) |
1989 |
DBLP DOI BibTeX RDF |
|
1 | Bennett C. Karp |
The CALS Data Protection and Integrity Industry Working Group. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Fifth Annual Computer Security Applications Conference, ACSAC 1989, 4-8 December, 1989, Westward Look Resort, Tucson, Arizona, USA, pp. 10-11, 1989, IEEE. The full citation details ...](Pics/full.jpeg) |
1989 |
DBLP DOI BibTeX RDF |
|
1 | Norman Proctor, Raymond Wong |
The security policy of the secure distributed operating system prototype. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Fifth Annual Computer Security Applications Conference, ACSAC 1989, 4-8 December, 1989, Westward Look Resort, Tucson, Arizona, USA, pp. 95-102, 1989, IEEE. The full citation details ...](Pics/full.jpeg) |
1989 |
DBLP DOI BibTeX RDF |
|
1 | William Green |
ADP security within the Customs Service. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Fifth Annual Computer Security Applications Conference, ACSAC 1989, 4-8 December, 1989, Westward Look Resort, Tucson, Arizona, USA, pp. 144-145, 1989, IEEE. The full citation details ...](Pics/full.jpeg) |
1989 |
DBLP DOI BibTeX RDF |
|
1 | Santosh Chokhani |
Protection of call detail records data in federal telecommunications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Fifth Annual Computer Security Applications Conference, ACSAC 1989, 4-8 December, 1989, Westward Look Resort, Tucson, Arizona, USA, pp. 70-77, 1989, IEEE. The full citation details ...](Pics/full.jpeg) |
1989 |
DBLP DOI BibTeX RDF |
|
1 | William Curtis Barker |
Use of privacy-enhanced mail for software distribution. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Fifth Annual Computer Security Applications Conference, ACSAC 1989, 4-8 December, 1989, Westward Look Resort, Tucson, Arizona, USA, pp. 344-347, 1989, IEEE. The full citation details ...](Pics/full.jpeg) |
1989 |
DBLP DOI BibTeX RDF |
|
1 | Ann B. Marmor-Squires, John McHugh, Martha A. Branstad, Bonnie P. Danner, Lou Nagy, Pat Rougeau, Daniel F. Sterne |
A risk driven process model for the development of trusted systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Fifth Annual Computer Security Applications Conference, ACSAC 1989, 4-8 December, 1989, Westward Look Resort, Tucson, Arizona, USA, pp. 184-192, 1989, IEEE. The full citation details ...](Pics/full.jpeg) |
1989 |
DBLP DOI BibTeX RDF |
|
1 | Lein Harn, Yaw-Ruey Chien, Thomas Kiesler |
An extended cryptographic key generation scheme for multilevel data security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Fifth Annual Computer Security Applications Conference, ACSAC 1989, 4-8 December, 1989, Westward Look Resort, Tucson, Arizona, USA, pp. 254-262, 1989, IEEE. The full citation details ...](Pics/full.jpeg) |
1989 |
DBLP DOI BibTeX RDF |
|
1 | Thomas F. Keefe, Dan Thomsen, Wei-Tek Tsai, M. R. Hansch |
Multi-party conflict: the problem and its solutions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Fifth Annual Computer Security Applications Conference, ACSAC 1989, 4-8 December, 1989, Westward Look Resort, Tucson, Arizona, USA, pp. 222-231, 1989, IEEE. The full citation details ...](Pics/full.jpeg) |
1989 |
DBLP DOI BibTeX RDF |
|
1 | Edward Humphreys, Warwick Ford, M. Stirland, Thomas Parker |
Security standards for open systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Fifth Annual Computer Security Applications Conference, ACSAC 1989, 4-8 December, 1989, Westward Look Resort, Tucson, Arizona, USA, pp. 64-67, 1989, IEEE. The full citation details ...](Pics/full.jpeg) |
1989 |
DBLP DOI BibTeX RDF |
|
1 | Dan Gambel |
Gemini developers: facts, myths, and war stories. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Fifth Annual Computer Security Applications Conference, ACSAC 1989, 4-8 December, 1989, Westward Look Resort, Tucson, Arizona, USA, pp. 110-111, 1989, IEEE. The full citation details ...](Pics/full.jpeg) |
1989 |
DBLP DOI BibTeX RDF |
|
1 | Ruth R. Nelson |
End-to-end encryption at the network layer. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Fifth Annual Computer Security Applications Conference, ACSAC 1989, 4-8 December, 1989, Westward Look Resort, Tucson, Arizona, USA, 1989, IEEE. The full citation details ...](Pics/full.jpeg) |
1989 |
DBLP DOI BibTeX RDF |
|
1 | Stephen D. Crocker, Emilie J. Siarkiewicz |
Software methodology for development of a trusted BMS: identification of critical problems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Fifth Annual Computer Security Applications Conference, ACSAC 1989, 4-8 December, 1989, Westward Look Resort, Tucson, Arizona, USA, pp. 148-165, 1989, IEEE. The full citation details ...](Pics/full.jpeg) |
1989 |
DBLP DOI BibTeX RDF |
|
1 | Rolf Lang |
Implementing sensitive but unclassified security, today-a workshop proposal. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Fifth Annual Computer Security Applications Conference, ACSAC 1989, 4-8 December, 1989, Westward Look Resort, Tucson, Arizona, USA, pp. 20-24, 1989, IEEE. The full citation details ...](Pics/full.jpeg) |
1989 |
DBLP DOI BibTeX RDF |
|
1 | Ken Otwell, Bruce Aldridge |
The role of vulnerability in risk management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Fifth Annual Computer Security Applications Conference, ACSAC 1989, 4-8 December, 1989, Westward Look Resort, Tucson, Arizona, USA, pp. 32-38, 1989, IEEE. The full citation details ...](Pics/full.jpeg) |
1989 |
DBLP DOI BibTeX RDF |
|
1 | J. R. Winkler, W. J. Page |
Intrusion and anomaly detection in trusted systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Fifth Annual Computer Security Applications Conference, ACSAC 1989, 4-8 December, 1989, Westward Look Resort, Tucson, Arizona, USA, pp. 39-45, 1989, IEEE. The full citation details ...](Pics/full.jpeg) |
1989 |
DBLP DOI BibTeX RDF |
|
1 | Linda L. Vetter, Gordon Smith, Teresa F. Lunt |
TCB subsets: the next step. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Fifth Annual Computer Security Applications Conference, ACSAC 1989, 4-8 December, 1989, Westward Look Resort, Tucson, Arizona, USA, pp. 216-221, 1989, IEEE. The full citation details ...](Pics/full.jpeg) |
1989 |
DBLP DOI BibTeX RDF |
|
1 | Nander Brown |
Assessment of security requirements for sensitive systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Fifth Annual Computer Security Applications Conference, ACSAC 1989, 4-8 December, 1989, Westward Look Resort, Tucson, Arizona, USA, 1989, IEEE. The full citation details ...](Pics/full.jpeg) |
1989 |
DBLP DOI BibTeX RDF |
|
1 | Bill Maimone |
RADC database security workshop oracle corporation homework problem solution. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Fifth Annual Computer Security Applications Conference, ACSAC 1989, 4-8 December, 1989, Westward Look Resort, Tucson, Arizona, USA, 1989, IEEE. The full citation details ...](Pics/full.jpeg) |
1989 |
DBLP DOI BibTeX RDF |
|
1 | Linda L. Vetter |
TCB subset architecture. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Fifth Annual Computer Security Applications Conference, ACSAC 1989, 4-8 December, 1989, Westward Look Resort, Tucson, Arizona, USA, 1989, IEEE. The full citation details ...](Pics/full.jpeg) |
1989 |
DBLP DOI BibTeX RDF |
|
1 | Ruth M. Davis |
Electronic information security in a digital environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Fifth Annual Computer Security Applications Conference, ACSAC 1989, 4-8 December, 1989, Westward Look Resort, Tucson, Arizona, USA, pp. 6-9, 1989, IEEE. The full citation details ...](Pics/full.jpeg) |
1989 |
DBLP DOI BibTeX RDF |
|
1 | Paul D. Stachour, Dan J. Thomsen |
A summary of the LDV solution to the homework problem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Fifth Annual Computer Security Applications Conference, ACSAC 1989, 4-8 December, 1989, Westward Look Resort, Tucson, Arizona, USA, 1989, IEEE. The full citation details ...](Pics/full.jpeg) |
1989 |
DBLP DOI BibTeX RDF |
|
1 | K. N. Rao |
Security audit for embedded avionics systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Fifth Annual Computer Security Applications Conference, ACSAC 1989, 4-8 December, 1989, Westward Look Resort, Tucson, Arizona, USA, pp. 78-84, 1989, IEEE. The full citation details ...](Pics/full.jpeg) |
1989 |
DBLP DOI BibTeX RDF |
|
1 | Linda J. Harrison |
Security issues and Ada runtime support. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Fifth Annual Computer Security Applications Conference, ACSAC 1989, 4-8 December, 1989, Westward Look Resort, Tucson, Arizona, USA, pp. 177-183, 1989, IEEE. The full citation details ...](Pics/full.jpeg) |
1989 |
DBLP DOI BibTeX RDF |
|
1 | Marvin Schaefer, Brian Hubbard, Daniel F. Sterne, Theresa K. Haley, J. Noelle McAuliffe, Dawn Wolcott |
Auditing: a relevant contribution to trusted database management systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Fifth Annual Computer Security Applications Conference, ACSAC 1989, 4-8 December, 1989, Westward Look Resort, Tucson, Arizona, USA, 1989, IEEE. The full citation details ...](Pics/full.jpeg) |
1989 |
DBLP DOI BibTeX RDF |
|
1 | Victoria Ashby, Thomas Gregg, Annabelle Lee |
Security approach for rapid prototyping in multilevel secure systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Fifth Annual Computer Security Applications Conference, ACSAC 1989, 4-8 December, 1989, Westward Look Resort, Tucson, Arizona, USA, pp. 328-334, 1989, IEEE. The full citation details ...](Pics/full.jpeg) |
1989 |
DBLP DOI BibTeX RDF |
|
1 | Steven D. Smith |
Computer security and air traffic automation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Fifth Annual Computer Security Applications Conference, ACSAC 1989, 4-8 December, 1989, Westward Look Resort, Tucson, Arizona, USA, 1989, IEEE. The full citation details ...](Pics/full.jpeg) |
1989 |
DBLP DOI BibTeX RDF |
|
1 | Lein Harn, Thomas Kiesler |
Two new efficient cryptosystems based on Rabin's scheme: alternatives to RSA cryptosystem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Fifth Annual Computer Security Applications Conference, ACSAC 1989, 4-8 December, 1989, Westward Look Resort, Tucson, Arizona, USA, pp. 263-270, 1989, IEEE. The full citation details ...](Pics/full.jpeg) |
1989 |
DBLP DOI BibTeX RDF |
|
1 | Donald V. Miller, Robert W. Baldwin |
Access control by Boolean expression evaluation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Fifth Annual Computer Security Applications Conference, ACSAC 1989, 4-8 December, 1989, Westward Look Resort, Tucson, Arizona, USA, pp. 131-139, 1989, IEEE. The full citation details ...](Pics/full.jpeg) |
1989 |
DBLP DOI BibTeX RDF |
|
1 | Thomas H. Hinke |
The trusted server approach to multilevel security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Fifth Annual Computer Security Applications Conference, ACSAC 1989, 4-8 December, 1989, Westward Look Resort, Tucson, Arizona, USA, pp. 335-341, 1989, IEEE. The full citation details ...](Pics/full.jpeg) |
1989 |
DBLP DOI BibTeX RDF |
|
1 | Alan R. Downing, Ira B. Greenberg, Teresa F. Lunt |
Issues in distributed database security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Fifth Annual Computer Security Applications Conference, ACSAC 1989, 4-8 December, 1989, Westward Look Resort, Tucson, Arizona, USA, pp. 196-203, 1989, IEEE. The full citation details ...](Pics/full.jpeg) |
1989 |
DBLP DOI BibTeX RDF |
|
1 | Greg King |
A survey of commercially available secure LAN products. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Fifth Annual Computer Security Applications Conference, ACSAC 1989, 4-8 December, 1989, Westward Look Resort, Tucson, Arizona, USA, pp. 239-247, 1989, IEEE. The full citation details ...](Pics/full.jpeg) |
1989 |
DBLP DOI BibTeX RDF |
|
1 | |
Fifth Annual Computer Security Applications Conference, ACSAC 1989, 4-8 December, 1989, Westward Look Resort, Tucson, Arizona, USA ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![IEEE The full citation details ...](Pics/full.jpeg) |
1989 |
DBLP BibTeX RDF |
|
1 | Steven J. Reynolds, T. P. Grove Jr., John N. Parringin |
Human issues. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Fifth Annual Computer Security Applications Conference, ACSAC 1989, 4-8 December, 1989, Westward Look Resort, Tucson, Arizona, USA, pp. 16-17, 1989, IEEE. The full citation details ...](Pics/full.jpeg) |
1989 |
DBLP DOI BibTeX RDF |
|