default search action
8. ACSAC 1992: San Antonio, Texas, USA
- Eighth Annual Computer Security Applications Conference, ACSAC 1992, November 30 - December 4, 1992, San Antonio, Texas, USA. IEEE 1992
- James P. Anderson:
Computer security myths mythtakes or 'The real security problem is...'. - Amy Wu, Eric R. Anderson, Cristi Garvey:
Secure system architectures and integration. 2-9 - James O. Bondi:
Trustable computing in next-generation avionic architectures. 10-19 - Christine Arangio, Tom Chen, Steve Neidhardt:
Security Products (Security Pro) Transition Analysis Facility (STAF): Pragmatic concepts for MLS technology transition. 20-27 - William Brierley:
Integrating cryptography into trusted systems: A criteria approach. 30-36 - Deborah J. Bodeau, Nancy R. Brusil, Irene N. Chang, Mary Jo Reece:
Security test and evaluation for multilevel-mode accreditation: Lessons learned. 37-45 - Ricki Andrew Vick:
An overview of the AMC WWMCCS CAT Guard. 46-54 - Deborah J. Bodeau:
A conceptual model for computer security risk analysis. 56-63 - S. P. Bennett, Muninder P. Kailay:
An application of qualitative risk analysis to computer security for the commercial sector. 64-73 - Günther Pernul:
Security constraint processing during multilevel secure database design. 75-84 - Sharon R. Lewis, Simon R. Wiseman, Neil D. Poulter:
Providing security in a phone book database using triggers. 85-96 - C. J. Testa, B. D. Wilner, Virgil D. Gligor:
Trusted RUBIX architecture and policy model interpretation. 97-110 - John A. McDermid, Qi Shi:
Secure composition of systems. 112-122 - Richard E. Newman-Wolfe, Balaji R. Venkatraman:
Performance analysis of a method for high level prevention of traffic analysis. 123-130 - Paul Ammann, Ravi S. Sandhu:
Implementing transaction control expressions by checking for absence of access rights. 131-140 - Jeffrey Picciotto, Jeremy Epstein:
A comparison of trusted X security policies, architectures, and interoperability. 142-152 - Charles W. Kurak Jr., John McHugh:
A cautionary note on image downgrading. 153-159 - Michael V. Joyce:
Access control and applications on trusted systems. 160-167 - Semyon Dukach:
SNPP: A simple network payment protocol. 173-179 - Peter A. Loscocco, William R. Kutz, Dale M. Johnson, Ronald J. Watro:
Dealing with the dynamics of security: Flexibility with utility in an MLS LAN. 180-192 - W. Douglas Maughan:
Standards for computer systems security: An interoperability analysis of SDNS SP3 and ISO NLSP. 193-201 - Selwyn Russell:
Paradigms for verification of authorization at source of electronic documents in an integrated environment. 203-209 - Sandeep Kumar, Eugene H. Spafford:
A generic virus scanner for C++. 210-219 - Phillip A. Porras, Richard A. Kemmerer:
Penetration state transition analysis: A rule-based intrusion detection approach. 220-229
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.