ACSAC A

33 papers

YearTitle / Authors
199410th Annual Computer Security Applications Conference, ACSAC 1994, 5-9 December, 1994 Orlando, FL, USA
1994A practical approach to high assurance multilevel secure computing service.
Judith N. Froscher, Myong H. Kang, John P. McDermott, Oliver Costich, Carl E. Landwehr
1994A practical approach to user authentication.
Marcus Brown, Samuel Joe Rogers
1994A prototype multilevel-secure DoD directory.
Peter K. Boucher, Teresa F. Lunt
1994A secure Email gateway (building an RCAS external interface).
Randall E. Smith
1994A validated security policy modeling approach.
James W. Freeman, Richard B. Neely, M. A. Heckard
1994AOS: an avionics operating system for multi-level secure real-time environments.
Mary M. Bernstein, Chulsoo Kim
1994Applying the Abadi-Lamport composition theorem in real-world secure system integration environments.
Judith A. Hemenway, Jonathan Fellows
1994Architectural impact on performance of a multilevel database system.
Myong H. Kang, Judith N. Froscher, Ravi Mukkamala
1994Audit reduction and misuse detection in heterogeneous environments: framework and application.
Paul Proctor
1994Automated detection of vulnerabilities in privileged programs by execution monitoring.
Calvin Ko, George Fink, Karl N. Levitt
1994Availability: theory and fundamentals for practical evaluation and use.
Klaus J. Keus, Markus Ullmann
1994Benchmarking multilevel secure database systems using the MITRE benchmark.
Vinti Doshi, William R. Herndon, Sushil Jajodia, Catherine D. McCollum
1994Composing system integrity using I/O automata.
Edward Amoroso, Michael Merritt
1994EINet: a secure, open network for electronic commerce.
Doug Rosenthal
1994Editorial: a view of cryptography in TCSEC products.
Jeremy Epstein
1994Editorial: why bad things happen to good systems, and what to do about it.
Jay J. Kahn, Marshall D. Abrams
1994Networked information discovery and retrieval tools: security capabilities and needs.
Lorrayne J. Schaefer, Brian W. McKenney
1994Ops/Intel interface lessons learned: the integrator's perspective.
Kate Arndt, Michael Burgoon, Jeanne Firey, Keith Rodenhausen
1994Organizing MLS databases from a data modelling point of view.
Günther Pernul, Gerald Quirchmayr
1994Performance analysis of a method for high level prevention of traffic analysis using measurements from a campus network.
Balaji R. Venkatraman, Richard E. Newman-Wolfe
1994Property-based testing of privileged programs.
George Fink, Karl N. Levitt
1994Role-based access control: a multi-dimensional view.
Ravi S. Sandhu, Edward J. Coyne, Hal L. Feinstein, Charles E. Youman
1994STU-III-multilevel secure computer interface.
Eugene D. Myers
1994Secure system composition: five practical initiatives.
Greg King
1994Security concerns for distributed systems.
Rob Dobry, Mary Schanken
1994Security for the Common Object Request Broker Architecture (CORBA).
Susan L. Chapin, William R. Herndon, LouAnna Notargiacomo, Melonyi L. Katz, Thomas J. Mowbray
1994System-of-systems security engineering.
Deborah J. Bodeau
1994The MITRE security perimeter.
David S. Goldberg
1994The design of an audit trail analysis tool.
Eric A. Fisch, Gregory B. White, Udo W. Pooch
1994The effects of trusted technology on distributed applications.
Michael V. Joyce
1994Using security models to investigate CMW design and implementation.
C. L. Robinson, Simon R. Wiseman
1994Where we stand in multilevel security (MLS): requirements, approaches, issues, and lessons learned.
Bill Neugent