ACSAC A

46 papers

YearTitle / Authors
1990A brief comparison of two different environmental guidelines for determining 'levels of trust' [computer security].
Frank L. Mayer
1990A comparison of secure UNIX operating systems.
Raymond M. Wong
1990A comparison of type enforcement and Unix setuid implementation of well-formed transactions.
Dan J. Thomsen, J. Thomas Haigh
1990A multilevel security model for a distributed object-oriented system.
Vijay Varadharajan, Stewart Black
1990A multilevel-mode system for space applications: lessons learned.
Deborah J. Bodeau, Mary Jo Reece
1990A prototype for Trusted X labeling policies.
Jeremy Epstein
1990A security analysis of the NTP protocol version 2.
Matt Bishop
1990A solution to the cascade problem for dynamic network.
Eric S. Maiwald
1990An advanced process model's application to trusted X Window system development.
Bonnie P. Danner, Ann B. Marmor-Squires
1990An authorization plan for commercial service systems.
Che-Fn Yu
1990An evaluation system for the physical security of computing systems.
Steve H. Weingart, Steve R. White, William C. Arnold, Glen P. Double
1990An example application of the trusted network interpretation.
Patrick W. Mallett
1990An n-grid model for group authorization.
Wen-Gong Shieh, Bob P. Weems, Krishna M. Kavi
1990Architecture for an embedded secure data base management system.
Cynthia E. Irvine, Roger R. Schell, Linda L. Vetter
1990CERTS: a comparative evaluation method for risk management methodologies and tools.
William M. Garrabrants, Alfred W. Ellis III, Lance J. Hoffman, Magdi N. Kamel
1990Entropy as a measure of database information.
Elizabeth A. Unger, Lein Harn, Vijay Kumar
1990Extending the creation operation in the Schematic Protection Model.
Paul Ammann, Ravi S. Sandhu
1990Formal specification and verification of control software for cryptographic equipment.
D. Richard Kuhn, James F. Dray
1990Hierarchical group oriented key management method HGK.
Hidenori Nakamura, Kazuyuki Takagi, Ken-ichi Okada, Yutaka Matsushita
1990ICCP Systems Security specialty exam.
Robert T. Vitter
1990IDES: a progress report [Intrusion-Detection Expert System].
Teresa F. Lunt, Ann Tamaru, Fred Gilham, R. Jagannathan, Peter G. Neumann, Caveh Jalali
1990Informal top-level specifications for trusted application systems.
John P. McDermott, Judith N. Froscher, Christian N. Payne, Herman Otto Lubbes
1990Integrating cryptography in the trusted computing base.
Michael Roe, Tom Casey
1990Is your computer being misused? A survey of current intrusion detection system technology.
J. Noelle McAuliffe, Dawn Wolcott, Lorrayne J. Schaefer, Nancy L. Kelem, Brian Hubbard, Theresa K. Haley
1990MLS and trust issues at the user interface in MLS AISs.
William Wilson, Joel Sachs, David Wichers, Peter K. Boucher
1990Model of access control policy for civil agencies.
Kristina C. Rogers
1990Multilevel security for knowledge based systems.
Thomas D. Garvey, Teresa F. Lunt
1990Natural change in dynamic databases as a deterrent to compromise by trackers.
Elizabeth A. Unger, Sallie Keller-McNulty, Paul Connelly
1990Network management security.
R. Ward, P. Skeffington
1990ODA and POSIX: label liaisons.
Kevin V. Murphy, Gunnar Soberg
1990On models for a trusted application system.
Christian N. Payne, Judith N. Froscher, John P. McDermott
1990Probabilistic measure on aggregations [data security].
Tsau Young Lin
1990Process Execution Controls: revisited.
Eugen M. Bacic
1990Professional certification for computer security professionals.
Lynn McNulty
1990Professional certification for security practitioners.
Hal Tipton
1990Rehosting existing command and control systems into a multilevel secure environment.
Samuel Doncaster, Michael Endsley, Greg Factor
1990Secure query processing in distributed database management systems-design and performance studies.
Bhavani Thuraisingham, Ammiel Kamon
1990Security pipeline interface (SPI).
Lance J. Hoffman, Russell J. Davis
1990Single-level multiversion schedulers for multilevel secure database systems.
William T. Maimone, Ira B. Greenberg
1990Sixth Annual Computer Security Applications Conference, ACSAC 1990, 3-7 December, 1990, Tucson, Arizona, USA
1990Software checking with the Auditor's Aid.
Russell J. Davis
1990Software safety and security.
Archibald McKinlay
1990Successful acquisition of certifiable application systems (or: How not to shake hands with the tar baby).
Judith N. Froscher, John P. McDermott, Christian N. Payne, Herman Otto Lubbes
1990The Canadian trusted computer product evaluation criteria.
Eugen M. Bacic
1990The lowdown on lower layer security protocols.
Paul A. Lambert
1990Update semantics for multilevel relations.
Sushil Jajodia, Ravi S. Sandhu, Edgar H. Sibley