


default search action
9. ACSAC 1993: Orlando, FL, USA
- Ninth Annual Computer Security Applications Conference, ACSAC 1993, 6-10 December, 1993, Orlando, Florida, USA. IEEE 1993

- Herman Otto Lubbes:

COMPUSEC, a personal view. - Deborah J. Bodeau, Vipin Swarup:

Integration of security services into the NORAD/USSPACECOM technical infrastructure: a case study. 2-10 - M. O. Aldrich:

A methodology for the use of single level RDBMS software in a multi-level secured system. 11-20 - Rick Schultz, Tim Ehrsam:

Migrating a commercial-off-the-shelf application to a multilevel secure environment. 21-28 - Brian Tretick:

Operational requirements for multilevel security. 30-35 - Michael R. Sweezey:

Specification issues of secure systems. 36-45 - Michael J. Nash, Ronald J. Kennett:

Security policy in a complex logistics procurement. 46-53 - Ulf Carlsen:

Using logics to detect implementation-dependent flaws [cryptographic protocol design]. 64-73 - W. A. Jansen:

A second look at the SDNS key management protocol. 74-81 - Selwyn Russell:

Transparent cosignatures for electronic documents. 82-91 - Richard E. Smith:

MLS file service for network data sharing. 94-99 - Eric M. Kayden, L. J. Schaefer:

Heterogeneous workstation to STU-III prototype. 100-107 - Balaji R. Venkatraman, Richard E. Newman-Wolfe:

Transmission schedules to prevent traffic analysis. 108-115 - Raymond K. Clark, Ira B. Greenberg, Peter K. Boucher, Teresa F. Lunt, Peter G. Neumann, Douglas M. Wells, E. Douglas Jensen:

Effects of multilevel security on real-time applications. 120-129 - Mary M. Bernstein, Terry C. Vickers Benzel:

Real-time trust with 'System Build': lessons learned. 130-136 - Deborah J. Bodeau, Frederick N. Chase:

Modeling constructs for describing a complex system-of-systems. 140-148 - John A. Fitch III, Lance J. Hoffman:

On the shortest path to network security. 149-158 - Daniel P. Faigin, Joseph Donndelinger, J. R. Jones:

A rigorous approach to determining objects. 159-168 - Eugen M. Bacic, A. Robison:

The rationale behind the Canadian criteria. 170-179 - Ravi S. Sandhu, Srinivas Ganta:

Expressive power of the single-object typed access matrix model. 184-194 - Claudio Calvelli, Vijay Varadharajan:

Representation of mental health application access policy in a monotonic model. 195-209 - Qi Shi

, John A. McDermid, Jonathan D. Moffett:
Applying noninterference to composition of systems: a more practical approach. 210-220 - Nora Boulahia-Cuppens, Frédéric Cuppens, Alban Gabillon, Kioumars Yazdanian:

MultiView model for object-oriented database. 222-231 - Sharon R. Lewis, Simon R. Wiseman:

Database design and MLS DBMSs: an unhappy alliance? 232-243 - Günther Pernul, Werner Winiwarter, A Min Tjoa

:
The deductive filter approach to MLS database prototyping. 244-253 - Jeremy Epstein, Rita Pascale:

User interface for a high assurance, windowing system. 256-264 - J. DeMeester:

C2 auditing in the X Display Manager. 265-271 - Willem G. de Ru, Jan H. P. Eloff:

Improved password mechanisms through expert system technology. 272-280

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














