ACSAC A

25 papers

YearTitle / Authors
1992A cautionary note on image downgrading.
Charles W. Kurak Jr., John McHugh
1992A comparison of trusted X security policies, architectures, and interoperability.
Jeffrey Picciotto, Jeremy Epstein
1992A conceptual model for computer security risk analysis.
Deborah J. Bodeau
1992A generic virus scanner for C++.
Sandeep Kumar, Eugene H. Spafford
1992Access control and applications on trusted systems.
Michael V. Joyce
1992An application of qualitative risk analysis to computer security for the commercial sector.
S. P. Bennett, Muninder P. Kailay
1992An overview of the AMC WWMCCS CAT Guard.
Ricki Andrew Vick
1992Computer security myths mythtakes or 'The real security problem is...'.
James P. Anderson
1992Dealing with the dynamics of security: Flexibility with utility in an MLS LAN.
Peter A. Loscocco, William R. Kutz, Dale M. Johnson, Ronald J. Watro
1992Eighth Annual Computer Security Applications Conference, ACSAC 1992, November 30 - December 4, 1992, San Antonio, Texas, USA
1992Implementing transaction control expressions by checking for absence of access rights.
Paul Ammann, Ravi S. Sandhu
1992Integrating cryptography into trusted systems: A criteria approach.
William Brierley
1992Paradigms for verification of authorization at source of electronic documents in an integrated environment.
Selwyn Russell
1992Penetration state transition analysis: A rule-based intrusion detection approach.
Phillip A. Porras, Richard A. Kemmerer
1992Performance analysis of a method for high level prevention of traffic analysis.
Richard E. Newman-Wolfe, Balaji R. Venkatraman
1992Providing security in a phone book database using triggers.
Sharon R. Lewis, Simon R. Wiseman, Neil D. Poulter
1992SNPP: A simple network payment protocol.
Semyon Dukach
1992Secure composition of systems.
John A. McDermid, Qi Shi
1992Secure system architectures and integration.
Amy Wu, Eric R. Anderson, Cristi Garvey
1992Security Products (Security Pro) Transition Analysis Facility (STAF): Pragmatic concepts for MLS technology transition.
Christine Arangio, Tom Chen, Steve Neidhardt
1992Security constraint processing during multilevel secure database design.
Günther Pernul
1992Security test and evaluation for multilevel-mode accreditation: Lessons learned.
Deborah J. Bodeau, Nancy R. Brusil, Irene N. Chang, Mary Jo Reece
1992Standards for computer systems security: An interoperability analysis of SDNS SP3 and ISO NLSP.
W. Douglas Maughan
1992Trustable computing in next-generation avionic architectures.
James O. Bondi
1992Trusted RUBIX architecture and policy model interpretation.
C. J. Testa, B. D. Wilner, Virgil D. Gligor