


default search action
7. ACSAC 1991: San Antonio, Texas, USA
- Seventh Annual Computer Security Applications Conference, ACSAC 1991, 2-6 December, 1991, San Antonio, Texas, USA. IEEE 1991

- John P. McDermott, Sushil Jajodia, Ravi S. Sandhu:

A single-level scheduler for the replicated architecture for multilevel-secure databases. 2-11 - Doug Nelson, Chip Paradise:

Using polyinstantiation to develop an MLS application. 12-22 - Marie Collins, William R. Ford, Bhavani Thuraisingham:

Security constraint processing during the update operation in a multilevel secure database management system. 23-32 - Jeffrey Picciotto:

Towards trusted cut and paste in the X Window System. 34-43 - Jeremy Epstein, John McHugh, Rita Pascale, Hilarie K. Orman, Glenn S. Benson, Charles R. Martin, Ann B. Marmor-Squires, Bonnie P. Danner, Martha A. Branstad:

A prototype B3 trusted X Window System. 44-55 - Dale A. Moir:

An implementation of access control using a salient feature of primes. 56-64 - Samuel I. Schaen, Brian W. McKenney:

Network auditing: issues and recommendations. 66-79 - Linda B. Lankewicz, Mark Benard:

Real-time anomaly detection using a nonparametric pattern recognition approach. 80-89 - Boris Y. Kogan, Sushil Jajodia:

An audit model for object-oriented databases. 90-99 - Richard E. Newman-Wolfe, Balaji R. Venkatraman:

High level prevention of traffic analysis. 102-109 - John P. Nestor:

Security modelling using hierarchical state machines. 110-119 - Joseph C. Chao, Mahalakshmi Komaravolu, Carol Lin, Gavin Yiu:

Modeling internal controls of automated teller machine (ATM) systems: A computerized decision aid for design and evaluation. 120-129 - Edward A. Schneider:

Verification of the security of a secure network component. 132-142 - R. A. Gove, Lisa M. Jaworski, John G. Williams:

To Bell and back: developing a formal security policy model for a C 2 system. 143-151 - Paul Ammann, Ravi S. Sandhu, Gurpreet S. Suri:

A distributed implementation of the extended schematic protection model. 152-164 - Günther Pernul, Gottfried Luef:

A multilevel secure relational data model based on views. 166-177 - S. C. Hansen, Elizabeth A. Unger:

Domain reduction dependencies: A new type of dependency for statistical database security. 178-186 - Bob P. Weems, Wen-Gong Shieh, Muhammad Jaseemuddin:

Complete containment sets and their application to the inference problem. 187-200 - Daniel Galik, Brian Tretick:

Fielding multilevel security into command and control systems. 202-208 - Howard L. Johnson, Chuck Arvin, Earl Jenkinson, Bob Pierce:

Proposed security for critical Air Force missions. 209-217 - Patrick W. Mallet:

Considerations for applying disk encryptors to environments subject to hostile overrun. 218-222 - Charles R. Pierce:

Security considerations in the acquisition of computer systems. 224-229 - Robert E. Niemeyer, V. A. Ashby:

Observations on integrating multilevel secure components into system high distributed systems. 230-238 - Maria M. King:

Rebus passwords. 239-243

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














