NSPW C

29 papers

YearTitle / Authors
1993A new paradigm for trusted systems.
Dorothy E. Denning
1993A shift in security modeling paradigms.
James G. Williams
1993An outline of a taxonomy of computer security research and development.
Catherine Meadows
1993Application level security using an object-oriented graphical user interface.
Terry Rooker
1993Bell and LaPadula axioms: a "new" paradigm for an "old" model.
T. Y. Lin
1993Computer security by redefining what a computer is.
Yvo Desmedt
1993Concurrent automata, database computers, and security: a "new" security paradigm for secure parallel processing.
T. Y. Lin
1993Confidentiality, integrity, assured service: tying security all together.
Grace L. Hammonds
1993External consistency in a network environment.
Leonard J. LaPadula, James G. Williams
1993How responsibility modelling leads to security requirements.
Ros Strens, John E. Dobson
1993Identification and authentication when users have multiple accounts.
W. R. Shockley
1993Information system security engineering: a spiral approach to revolution.
Donald M. Howe
1993Integration of formal and heuristic reasoning as a basis for testing and debugging computer security policy.
James Bret Michael, Edgar H. Sibley, David C. Littman
1993Managing complexity in secure networks.
David Bailey
1993Modelling multidomain security.
José de J. Vázquez-Gómez
1993Neighborhood data and database security.
Kioumars Yazdanian, Frédéric Cuppens
1993New paradigms for high assurance software.
John McLean
1993New security paradigms: what other concepts do we need as well?
John Dobson
1993Proceedings on the 1992-1993 Workshop on New Security Paradigms, Sept. 22-24, 1992; and Aug. 3-5, 1993, Little Compton, RI, USA
James Bret Michael, Victoria Ashby, Catherine Meadows
1993Prospect on security paradigms.
Leonard J. LaPadula
1993Secure computing with the actor paradigm.
Bhavani Thuraisingham
1993Security in an object-oriented database.
James M. Slack
1993Security is fuzzy!: applying the fuzzy logic paradigm to the multipolicy paradigm.
Hilary H. Hosmer
1993The evolved threat paradigm: look who's wearing the black hats!
Dixie B. Baker
1993The multipolicy paradigm for trusted systems.
Hilary H. Hosmer
1993The no-policy paradigm: towards a policy-free protocol supporting a secure X Window System.
Mark Smith
1993The reference monitor: an idea whose time has come.
Terry Rooker
1993Towards a task-based paradigm for flexible and adaptable access control in distributed applications.
Roshan K. Thomas, Ravi S. Sandhu
1993We need to think about the foundations of computer security.
Marvin Schaefer