default search action
6. ACSAC 1990: Tucson, AZ, USA
- Sixth Annual Computer Security Applications Conference, ACSAC 1990, 3-7 December, 1990, Tucson, Arizona, USA. IEEE 1990
- Lynn McNulty:
Professional certification for computer security professionals. - Hal Tipton:
Professional certification for security practitioners. - Paul Ammann, Ravi S. Sandhu:
Extending the creation operation in the Schematic Protection Model. - Robert T. Vitter:
ICCP Systems Security specialty exam. - Eric S. Maiwald:
A solution to the cascade problem for dynamic network. 2- - Patrick W. Mallett:
An example application of the trusted network interpretation. 9-19 - Matt Bishop:
A security analysis of the NTP protocol version 2. 20-29 - D. Richard Kuhn, James F. Dray:
Formal specification and verification of control software for cryptographic equipment. 32-43 - Hidenori Nakamura, Kazuyuki Takagi, Ken-ichi Okada, Yutaka Matsushita:
Hierarchical group oriented key management method HGK. 44-49 - Michael Roe, Tom Casey:
Integrating cryptography in the trusted computing base. 50-56 - Christian N. Payne, Judith N. Froscher, John P. McDermott:
On models for a trusted application system. 58-67 - Vijay Varadharajan, Stewart Black:
A multilevel security model for a distributed object-oriented system. 68-78 - Elizabeth A. Unger, Lein Harn, Vijay Kumar:
Entropy as a measure of database information. 80-87 - Bhavani Thuraisingham, Ammiel Kamon:
Secure query processing in distributed database management systems-design and performance studies. 88-102 - Sushil Jajodia, Ravi S. Sandhu, Edgar H. Sibley:
Update semantics for multilevel relations. 103-112 - Elizabeth A. Unger, Sallie Keller-McNulty, Paul Connelly:
Natural change in dynamic databases as a deterrent to compromise by trackers. 116-124 - Cynthia E. Irvine, Roger R. Schell, Linda L. Vetter:
Architecture for an embedded secure data base management system. 125-136 - William T. Maimone, Ira B. Greenberg:
Single-level multiversion schedulers for multilevel secure database systems. 137-147 - Thomas D. Garvey, Teresa F. Lunt:
Multilevel security for knowledge based systems. 148-159 - Kevin V. Murphy, Gunnar Soberg:
ODA and POSIX: label liaisons. 162-172 - R. Ward, P. Skeffington:
Network management security. 173-180 - Paul A. Lambert:
The lowdown on lower layer security protocols. 181-187 - Eugen M. Bacic:
The Canadian trusted computer product evaluation criteria. 188-196 - William Wilson, Joel Sachs, David Wichers, Peter K. Boucher:
MLS and trust issues at the user interface in MLS AISs. 204-208 - Bonnie P. Danner, Ann B. Marmor-Squires:
An advanced process model's application to trusted X Window system development. 209-220 - Jeremy Epstein:
A prototype for Trusted X labeling policies. 221-230 - Steve H. Weingart, Steve R. White, William C. Arnold, Glen P. Double:
An evaluation system for the physical security of computing systems. 232-243 - Frank L. Mayer:
A brief comparison of two different environmental guidelines for determining 'levels of trust' [computer security]. 244-250 - William M. Garrabrants, Alfred W. Ellis III, Lance J. Hoffman, Magdi N. Kamel:
CERTS: a comparative evaluation method for risk management methodologies and tools. 251-257 - J. Noelle McAuliffe, Dawn Wolcott, Lorrayne J. Schaefer, Nancy L. Kelem, Brian Hubbard, Theresa K. Haley:
Is your computer being misused? A survey of current intrusion detection system technology. 260-272 - Teresa F. Lunt, Ann Tamaru, Fred Gilham, R. Jagannathan, Peter G. Neumann, Caveh Jalali:
IDES: a progress report [Intrusion-Detection Expert System]. 273-285 - Tsau Young Lin:
Probabilistic measure on aggregations [data security]. 286-294 - Russell J. Davis:
Software checking with the Auditor's Aid. 298-303 - Dan J. Thomsen, J. Thomas Haigh:
A comparison of type enforcement and Unix setuid implementation of well-formed transactions. 304-312 - Archibald McKinlay:
Software safety and security. 313-320 - Raymond M. Wong:
A comparison of secure UNIX operating systems. 322-333 - Eugen M. Bacic:
Process Execution Controls: revisited. 334-339 - Lance J. Hoffman, Russell J. Davis:
Security pipeline interface (SPI). 349-355 - Che-Fn Yu:
An authorization plan for commercial service systems. 376-383 - Wen-Gong Shieh, Bob P. Weems, Krishna M. Kavi:
An n-grid model for group authorization. 384-392 - Kristina C. Rogers:
Model of access control policy for civil agencies. 393-404 - Deborah J. Bodeau, Mary Jo Reece:
A multilevel-mode system for space applications: lessons learned. 406-413 - Judith N. Froscher, John P. McDermott, Christian N. Payne, Herman Otto Lubbes:
Successful acquisition of certifiable application systems (or: How not to shake hands with the tar baby). 414-422 - John P. McDermott, Judith N. Froscher, Christian N. Payne, Herman Otto Lubbes:
Informal top-level specifications for trusted application systems. 423-433 - Samuel Doncaster, Michael Endsley, Greg Factor:
Rehosting existing command and control systems into a multilevel secure environment. 434-445
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.