default search action
9. ACSAC 1993: Orlando, FL, USA
- Ninth Annual Computer Security Applications Conference, ACSAC 1993, 6-10 December, 1993, Orlando, Florida, USA. IEEE 1993
- Herman Otto Lubbes:
COMPUSEC, a personal view. - Deborah J. Bodeau, Vipin Swarup:
Integration of security services into the NORAD/USSPACECOM technical infrastructure: a case study. 2-10 - M. O. Aldrich:
A methodology for the use of single level RDBMS software in a multi-level secured system. 11-20 - Rick Schultz, Tim Ehrsam:
Migrating a commercial-off-the-shelf application to a multilevel secure environment. 21-28 - Brian Tretick:
Operational requirements for multilevel security. 30-35 - Michael R. Sweezey:
Specification issues of secure systems. 36-45 - Michael J. Nash, Ronald J. Kennett:
Security policy in a complex logistics procurement. 46-53 - Ulf Carlsen:
Using logics to detect implementation-dependent flaws [cryptographic protocol design]. 64-73 - W. A. Jansen:
A second look at the SDNS key management protocol. 74-81 - Selwyn Russell:
Transparent cosignatures for electronic documents. 82-91 - Richard E. Smith:
MLS file service for network data sharing. 94-99 - Eric M. Kayden, L. J. Schaefer:
Heterogeneous workstation to STU-III prototype. 100-107 - Balaji R. Venkatraman, Richard E. Newman-Wolfe:
Transmission schedules to prevent traffic analysis. 108-115 - Raymond K. Clark, Ira B. Greenberg, Peter K. Boucher, Teresa F. Lunt, Peter G. Neumann, Douglas M. Wells, E. Douglas Jensen:
Effects of multilevel security on real-time applications. 120-129 - Mary M. Bernstein, Terry C. Vickers Benzel:
Real-time trust with 'System Build': lessons learned. 130-136 - Deborah J. Bodeau, Frederick N. Chase:
Modeling constructs for describing a complex system-of-systems. 140-148 - John A. Fitch III, Lance J. Hoffman:
On the shortest path to network security. 149-158 - Daniel P. Faigin, Joseph Donndelinger, J. R. Jones:
A rigorous approach to determining objects. 159-168 - Eugen M. Bacic, A. Robison:
The rationale behind the Canadian criteria. 170-179 - Ravi S. Sandhu, Srinivas Ganta:
Expressive power of the single-object typed access matrix model. 184-194 - Claudio Calvelli, Vijay Varadharajan:
Representation of mental health application access policy in a monotonic model. 195-209 - Qi Shi, John A. McDermid, Jonathan D. Moffett:
Applying noninterference to composition of systems: a more practical approach. 210-220 - Nora Boulahia-Cuppens, Frédéric Cuppens, Alban Gabillon, Kioumars Yazdanian:
MultiView model for object-oriented database. 222-231 - Sharon R. Lewis, Simon R. Wiseman:
Database design and MLS DBMSs: an unhappy alliance? 232-243 - Günther Pernul, Werner Winiwarter, A Min Tjoa:
The deductive filter approach to MLS database prototyping. 244-253 - Jeremy Epstein, Rita Pascale:
User interface for a high assurance, windowing system. 256-264 - J. DeMeester:
C2 auditing in the X Display Manager. 265-271 - Willem G. de Ru, Jan H. P. Eloff:
Improved password mechanisms through expert system technology. 272-280
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.