


default search action
6. ACSAC 1990: Tucson, AZ, USA
- Sixth Annual Computer Security Applications Conference, ACSAC 1990, 3-7 December, 1990, Tucson, Arizona, USA. IEEE 1990

- Lynn McNulty:

Professional certification for computer security professionals. - Hal Tipton:

Professional certification for security practitioners. - Paul Ammann, Ravi S. Sandhu:

Extending the creation operation in the Schematic Protection Model. - Robert T. Vitter:

ICCP Systems Security specialty exam. - Eric S. Maiwald:

A solution to the cascade problem for dynamic network. 2- - Patrick W. Mallett:

An example application of the trusted network interpretation. 9-19 - Matt Bishop

:
A security analysis of the NTP protocol version 2. 20-29 - D. Richard Kuhn, James F. Dray:

Formal specification and verification of control software for cryptographic equipment. 32-43 - Hidenori Nakamura, Kazuyuki Takagi, Ken-ichi Okada, Yutaka Matsushita:

Hierarchical group oriented key management method HGK. 44-49 - Michael Roe, Tom Casey:

Integrating cryptography in the trusted computing base. 50-56 - Christian N. Payne, Judith N. Froscher, John P. McDermott:

On models for a trusted application system. 58-67 - Vijay Varadharajan, Stewart Black:

A multilevel security model for a distributed object-oriented system. 68-78 - Elizabeth A. Unger, Lein Harn, Vijay Kumar:

Entropy as a measure of database information. 80-87 - Bhavani Thuraisingham, Ammiel Kamon:

Secure query processing in distributed database management systems-design and performance studies. 88-102 - Sushil Jajodia, Ravi S. Sandhu, Edgar H. Sibley:

Update semantics for multilevel relations. 103-112 - Elizabeth A. Unger, Sallie Keller-McNulty, Paul Connelly:

Natural change in dynamic databases as a deterrent to compromise by trackers. 116-124 - Cynthia E. Irvine, Roger R. Schell, Linda L. Vetter:

Architecture for an embedded secure data base management system. 125-136 - William T. Maimone, Ira B. Greenberg:

Single-level multiversion schedulers for multilevel secure database systems. 137-147 - Thomas D. Garvey, Teresa F. Lunt:

Multilevel security for knowledge based systems. 148-159 - Kevin V. Murphy, Gunnar Soberg:

ODA and POSIX: label liaisons. 162-172 - R. Ward, P. Skeffington:

Network management security. 173-180 - Paul A. Lambert:

The lowdown on lower layer security protocols. 181-187 - Eugen M. Bacic:

The Canadian trusted computer product evaluation criteria. 188-196 - William Wilson, Joel Sachs, David Wichers, Peter K. Boucher:

MLS and trust issues at the user interface in MLS AISs. 204-208 - Bonnie P. Danner, Ann B. Marmor-Squires:

An advanced process model's application to trusted X Window system development. 209-220 - Jeremy Epstein:

A prototype for Trusted X labeling policies. 221-230 - Steve H. Weingart, Steve R. White, William C. Arnold, Glen P. Double:

An evaluation system for the physical security of computing systems. 232-243 - Frank L. Mayer:

A brief comparison of two different environmental guidelines for determining 'levels of trust' [computer security]. 244-250 - William M. Garrabrants, Alfred W. Ellis III, Lance J. Hoffman, Magdi N. Kamel:

CERTS: a comparative evaluation method for risk management methodologies and tools. 251-257 - J. Noelle McAuliffe, Dawn Wolcott, Lorrayne J. Schaefer, Nancy L. Kelem, Brian Hubbard, Theresa K. Haley:

Is your computer being misused? A survey of current intrusion detection system technology. 260-272 - Teresa F. Lunt, Ann Tamaru, Fred Gilham, R. Jagannathan, Peter G. Neumann, Caveh Jalali:

IDES: a progress report [Intrusion-Detection Expert System]. 273-285 - Tsau Young Lin:

Probabilistic measure on aggregations [data security]. 286-294 - Russell J. Davis:

Software checking with the Auditor's Aid. 298-303 - Dan J. Thomsen, J. Thomas Haigh:

A comparison of type enforcement and Unix setuid implementation of well-formed transactions. 304-312 - Archibald McKinlay:

Software safety and security. 313-320 - Raymond M. Wong:

A comparison of secure UNIX operating systems. 322-333 - Eugen M. Bacic:

Process Execution Controls: revisited. 334-339 - Lance J. Hoffman, Russell J. Davis:

Security pipeline interface (SPI). 349-355 - Che-Fn Yu:

An authorization plan for commercial service systems. 376-383 - Wen-Gong Shieh, Bob P. Weems, Krishna M. Kavi:

An n-grid model for group authorization. 384-392 - Kristina C. Rogers:

Model of access control policy for civil agencies. 393-404 - Deborah J. Bodeau, Mary Jo Reece:

A multilevel-mode system for space applications: lessons learned. 406-413 - Judith N. Froscher, John P. McDermott, Christian N. Payne, Herman Otto Lubbes:

Successful acquisition of certifiable application systems (or: How not to shake hands with the tar baby). 414-422 - John P. McDermott, Judith N. Froscher, Christian N. Payne, Herman Otto Lubbes:

Informal top-level specifications for trusted application systems. 423-433 - Samuel Doncaster, Michael Endsley, Greg Factor:

Rehosting existing command and control systems into a multilevel secure environment. 434-445

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














