ACSAC A

62 papers

YearTitle / Authors
1989A model of security monitoring.
Matt Bishop
1989A perspective on integrity mechanisms.
Ravi S. Sandhu
1989A risk driven process model for the development of trusted systems.
Ann B. Marmor-Squires, John McHugh, Martha A. Branstad, Bonnie P. Danner, Lou Nagy, Pat Rougeau, Daniel F. Sterne
1989A security standard for LANs.
Kimberly E. Kirkpatrick
1989A structured risk analysis approach to resolve the data protection and integrity issues for computer-aided acquisition logistics support (CALS).
R. A. Gove, Arthur R. Friedman
1989A summary of the LDV solution to the homework problem.
Paul D. Stachour, Dan J. Thomsen
1989A summary of the Unisys experience with GEMSOS.
Doug Paul
1989A survey of commercially available secure LAN products.
Greg King
1989ADP security within the Customs Service.
William Green
1989Access control by Boolean expression evaluation.
Donald V. Miller, Robert W. Baldwin
1989An approach for evaluating the security of an Air Force type network.
Nancy K. Woodfield
1989An extended cryptographic key generation scheme for multilevel data security.
Lein Harn, Yaw-Ruey Chien, Thomas Kiesler
1989Applying the TNI to system certification and accreditation.
Robert E. Niemeyer
1989Architectural support of fine-grained secure computing.
James O. Bondi, Martha A. Branstad
1989Assessment of security requirements for sensitive systems.
Nander Brown
1989Auditing: a relevant contribution to trusted database management systems.
Marvin Schaefer, Brian Hubbard, Daniel F. Sterne, Theresa K. Haley, J. Noelle McAuliffe, Dawn Wolcott
1989Challenges faced today by computer security practitioners.
Lloyd F. Reese
1989Chinese wall security policy-an aggressive model.
Tsau Young Lin
1989Computer security and air traffic automation.
Steven D. Smith
1989Considerations on TCB subsetting.
Helena B. Winkler-Parenty
1989Data protection requirements in computer-aided acquisition and logistic support.
William C. Gorham Jr.
1989Designing a trusted client-server distributed network.
Sammy Migues, Russell Housley
1989Developing trusted systems using DOD-STD-2167A.
Terry C. Vickers Benzel
1989Development of a multi level data generation application for GEMSOS.
E. R. Schallenmüller, Rich P. Cramer, Bruce Aldridge
1989Does TCB subsetting enhance trust?
Richard J. Feiertag
1989Electronic information security in a digital environment.
Ruth M. Davis
1989Electronic messaging security: a comparison of three approaches.
Russell Housley
1989End-to-end encryption at the network layer.
Ruth R. Nelson
1989Evaluation issues for an integrated 'INFOSEC' product.
Frank L. Mayer, William Curtis Barker, Theresa K. Haley, J. Noelle McAuliffe, Daniel F. Sterne, Lynne S. Vidmar
1989Fifth Annual Computer Security Applications Conference, ACSAC 1989, 4-8 December, 1989, Westward Look Resort, Tucson, Arizona, USA
1989Gemini developers: facts, myths, and war stories.
Dan Gambel
1989Human issues.
Steven J. Reynolds, T. P. Grove Jr., John N. Parringin
1989Implementing sensitive but unclassified security, today-a workshop proposal.
Rolf Lang
1989Integrity panel position paper.
Howard L. Johnson
1989Intrusion and anomaly detection in trusted systems.
J. R. Winkler, W. J. Page
1989Issues in distributed database security.
Alan R. Downing, Ira B. Greenberg, Teresa F. Lunt
1989Multi-party conflict: the problem and its solutions.
Thomas F. Keefe, Dan Thomsen, Wei-Tek Tsai, M. R. Hansch
1989Multilevel secure database design: a practical application.
Gary W. Smith
1989Network authentication tokens.
Russell J. Davis
1989Process execution controls as a mechanism to ensure consistency.
Eugen M. Bacic
1989Protection of call detail records data in federal telecommunications.
Santosh Chokhani
1989RADC database security workshop oracle corporation homework problem solution.
Bill Maimone
1989Report from the second RADC database security workshop.
Teresa F. Lunt
1989Secure automated document delivery.
Tom Casey, Michael Roe, Bill Tuck, Steve R. Wilbur
1989Secure database design panel.
Thomas H. Hinke
1989Secure database design: an implementation using a secure DBMS.
Edward D. Sturms
1989Secure query processing in intelligent database management systems.
Bhavani M. Thuraisingham
1989Security approach for rapid prototyping in multilevel secure systems.
Victoria Ashby, Thomas Gregg, Annabelle Lee
1989Security audit for embedded avionics systems.
K. N. Rao
1989Security issues and Ada runtime support.
Linda J. Harrison
1989Security model consistency in secure object-oriented systems.
Thomas F. Keefe, Wei-Tek Tsai
1989Security model development environment.
Jody Heaney, Marc Adkins, Gary Dolsen, John Page
1989Security standards for open systems.
Edward Humphreys, Warwick Ford, M. Stirland, Thomas Parker
1989Software methodology for development of a trusted BMS: identification of critical problems.
Stephen D. Crocker, Emilie J. Siarkiewicz
1989TCB subset architecture.
Linda L. Vetter
1989TCB subsets: the next step.
Linda L. Vetter, Gordon Smith, Teresa F. Lunt
1989The CALS Data Protection and Integrity Industry Working Group.
Bennett C. Karp
1989The role of vulnerability in risk management.
Ken Otwell, Bruce Aldridge
1989The security policy of the secure distributed operating system prototype.
Norman Proctor, Raymond Wong
1989The trusted server approach to multilevel security.
Thomas H. Hinke
1989Two new efficient cryptosystems based on Rabin's scheme: alternatives to RSA cryptosystem.
Lein Harn, Thomas Kiesler
1989Use of privacy-enhanced mail for software distribution.
William Curtis Barker