ACSAC A

29 papers

YearTitle / Authors
1993A methodology for the use of single level RDBMS software in a multi-level secured system.
M. O. Aldrich
1993A rigorous approach to determining objects.
Daniel P. Faigin, Joseph Donndelinger, J. R. Jones
1993A second look at the SDNS key management protocol.
W. A. Jansen
1993Applying noninterference to composition of systems: a more practical approach.
Qi Shi, John A. McDermid, Jonathan D. Moffett
1993C2 auditing in the X Display Manager.
J. DeMeester
1993COMPUSEC, a personal view.
Herman Otto Lubbes
1993Database design and MLS DBMSs: an unhappy alliance?
Sharon R. Lewis, Simon R. Wiseman
1993Effects of multilevel security on real-time applications.
Raymond K. Clark, Ira B. Greenberg, Peter K. Boucher, Teresa F. Lunt, Peter G. Neumann, Douglas M. Wells, E. Douglas Jensen
1993Expressive power of the single-object typed access matrix model.
Ravi S. Sandhu, Srinivas Ganta
1993Heterogeneous workstation to STU-III prototype.
Eric M. Kayden, L. J. Schaefer
1993Improved password mechanisms through expert system technology.
Willem G. de Ru, Jan H. P. Eloff
1993Integration of security services into the NORAD/USSPACECOM technical infrastructure: a case study.
Deborah J. Bodeau, Vipin Swarup
1993MLS file service for network data sharing.
Richard E. Smith
1993Migrating a commercial-off-the-shelf application to a multilevel secure environment.
Rick Schultz, Tim Ehrsam
1993Modeling constructs for describing a complex system-of-systems.
Deborah J. Bodeau, Frederick N. Chase
1993MultiView model for object-oriented database.
Nora Boulahia-Cuppens, Frédéric Cuppens, Alban Gabillon, Kioumars Yazdanian
1993Ninth Annual Computer Security Applications Conference, ACSAC 1993, 6-10 December, 1993, Orlando, Florida, USA
1993On the shortest path to network security.
John A. Fitch III, Lance J. Hoffman
1993Operational requirements for multilevel security.
Brian Tretick
1993Real-time trust with 'System Build': lessons learned.
Mary M. Bernstein, Terry C. Vickers Benzel
1993Representation of mental health application access policy in a monotonic model.
Claudio Calvelli, Vijay Varadharajan
1993Security policy in a complex logistics procurement.
Michael J. Nash, Ronald J. Kennett
1993Specification issues of secure systems.
Michael R. Sweezey
1993The deductive filter approach to MLS database prototyping.
Günther Pernul, Werner Winiwarter, A Min Tjoa
1993The rationale behind the Canadian criteria.
Eugen M. Bacic, A. Robison
1993Transmission schedules to prevent traffic analysis.
Balaji R. Venkatraman, Richard E. Newman-Wolfe
1993Transparent cosignatures for electronic documents.
Selwyn Russell
1993User interface for a high assurance, windowing system.
Jeremy Epstein, Rita Pascale
1993Using logics to detect implementation-dependent flaws [cryptographic protocol design].
Ulf Carlsen