ACSAC A

25 papers

YearTitle / Authors
1991A distributed implementation of the extended schematic protection model.
Paul Ammann, Ravi S. Sandhu, Gurpreet S. Suri
1991A multilevel secure relational data model based on views.
Günther Pernul, Gottfried Luef
1991A prototype B3 trusted X Window System.
Jeremy Epstein, John McHugh, Rita Pascale, Hilarie K. Orman, Glenn S. Benson, Charles R. Martin, Ann B. Marmor-Squires, Bonnie P. Danner, Martha A. Branstad
1991A single-level scheduler for the replicated architecture for multilevel-secure databases.
John P. McDermott, Sushil Jajodia, Ravi S. Sandhu
1991An audit model for object-oriented databases.
Boris Y. Kogan, Sushil Jajodia
1991An implementation of access control using a salient feature of primes.
Dale A. Moir
1991Complete containment sets and their application to the inference problem.
Bob P. Weems, Wen-Gong Shieh, Muhammad Jaseemuddin
1991Considerations for applying disk encryptors to environments subject to hostile overrun.
Patrick W. Mallet
1991Domain reduction dependencies: A new type of dependency for statistical database security.
S. C. Hansen, Elizabeth A. Unger
1991Fielding multilevel security into command and control systems.
Daniel Galik, Brian Tretick
1991High level prevention of traffic analysis.
Richard E. Newman-Wolfe, Balaji R. Venkatraman
1991Modeling internal controls of automated teller machine (ATM) systems: A computerized decision aid for design and evaluation.
Joseph C. Chao, Mahalakshmi Komaravolu, Carol Lin, Gavin Yiu
1991Network auditing: issues and recommendations.
Samuel I. Schaen, Brian W. McKenney
1991Observations on integrating multilevel secure components into system high distributed systems.
Robert E. Niemeyer, V. A. Ashby
1991Proposed security for critical Air Force missions.
Howard L. Johnson, Chuck Arvin, Earl Jenkinson, Bob Pierce
1991Real-time anomaly detection using a nonparametric pattern recognition approach.
Linda B. Lankewicz, Mark Benard
1991Rebus passwords.
Maria M. King
1991Security considerations in the acquisition of computer systems.
Charles R. Pierce
1991Security constraint processing during the update operation in a multilevel secure database management system.
Marie Collins, William R. Ford, Bhavani Thuraisingham
1991Security modelling using hierarchical state machines.
John P. Nestor
1991Seventh Annual Computer Security Applications Conference, ACSAC 1991, 2-6 December, 1991, San Antonio, Texas, USA
1991To Bell and back: developing a formal security policy model for a C
R. A. Gove, Lisa M. Jaworski, John G. Williams
1991Towards trusted cut and paste in the X Window System.
Jeffrey Picciotto
1991Using polyinstantiation to develop an MLS application.
Doug Nelson, Chip Paradise
1991Verification of the security of a secure network component.
Edward A. Schneider