


default search action
5. ACSAC 1989: Tucson, AZ, USA
- Fifth Annual Computer Security Applications Conference, ACSAC 1989, 4-8 December, 1989, Westward Look Resort, Tucson, Arizona, USA. IEEE 1989

- Bill Maimone:

RADC database security workshop oracle corporation homework problem solution. - Steven D. Smith:

Computer security and air traffic automation. - Ravi S. Sandhu:

A perspective on integrity mechanisms. - Richard J. Feiertag:

Does TCB subsetting enhance trust? - Howard L. Johnson:

Integrity panel position paper. - Doug Paul:

A summary of the Unisys experience with GEMSOS. - Nander Brown:

Assessment of security requirements for sensitive systems. - Russell Housley:

Electronic messaging security: a comparison of three approaches. - Paul D. Stachour, Dan J. Thomsen:

A summary of the LDV solution to the homework problem. - Marvin Schaefer, Brian Hubbard, Daniel F. Sterne, Theresa K. Haley, J. Noelle McAuliffe, Dawn Wolcott:

Auditing: a relevant contribution to trusted database management systems. - Linda L. Vetter:

TCB subset architecture. - Lloyd F. Reese:

Challenges faced today by computer security practitioners. - Edward D. Sturms:

Secure database design: an implementation using a secure DBMS. - Thomas H. Hinke:

Secure database design panel. - Ruth R. Nelson:

End-to-end encryption at the network layer. - Kimberly E. Kirkpatrick:

A security standard for LANs. - R. A. Gove, Arthur R. Friedman:

A structured risk analysis approach to resolve the data protection and integrity issues for computer-aided acquisition logistics support (CALS). 4-5 - Ruth M. Davis:

Electronic information security in a digital environment. 6-9 - Bennett C. Karp:

The CALS Data Protection and Integrity Industry Working Group. 10-11 - William C. Gorham Jr.:

Data protection requirements in computer-aided acquisition and logistic support. 12-13 - Steven J. Reynolds, T. P. Grove Jr., John N. Parringin:

Human issues. 16-17 - Rolf Lang:

Implementing sensitive but unclassified security, today-a workshop proposal. 20-24 - Ken Otwell, Bruce Aldridge:

The role of vulnerability in risk management. 32-38 - J. R. Winkler, W. J. Page:

Intrusion and anomaly detection in trusted systems. 39-45 - Matt Bishop:

A model of security monitoring. 46-52 - Nancy K. Woodfield:

An approach for evaluating the security of an Air Force type network. 53-62 - Edward Humphreys, Warwick Ford, M. Stirland, Thomas Parker:

Security standards for open systems. 64-67 - Santosh Chokhani:

Protection of call detail records data in federal telecommunications. 70-77 - K. N. Rao:

Security audit for embedded avionics systems. 78-84 - E. R. Schallenmüller, Rich P. Cramer, Bruce Aldridge:

Development of a multi level data generation application for GEMSOS. 86-90 - Sammy Migues, Russell Housley:

Designing a trusted client-server distributed network. 91-94 - Norman Proctor, Raymond Wong:

The security policy of the secure distributed operating system prototype. 95-102 - Helena B. Winkler-Parenty:

Considerations on TCB subsetting. 105-106 - Dan Gambel:

Gemini developers: facts, myths, and war stories. 110-111 - Eugen M. Bacic:

Process execution controls as a mechanism to ensure consistency. 114-120 - James O. Bondi, Martha A. Branstad:

Architectural support of fine-grained secure computing. 121-130 - Donald V. Miller, Robert W. Baldwin:

Access control by Boolean expression evaluation. 131-139 - William Green:

ADP security within the Customs Service. 144-145 - Stephen D. Crocker, Emilie J. Siarkiewicz:

Software methodology for development of a trusted BMS: identification of critical problems. 148-165 - Terry C. Vickers Benzel:

Developing trusted systems using DOD-STD-2167A. 166-176 - Linda J. Harrison:

Security issues and Ada runtime support. 177-183 - Ann B. Marmor-Squires, John McHugh, Martha A. Branstad, Bonnie P. Danner, Lou Nagy, Pat Rougeau, Daniel F. Sterne:

A risk driven process model for the development of trusted systems. 184-192 - Alan R. Downing, Ira B. Greenberg, Teresa F. Lunt:

Issues in distributed database security. 196-203 - Bhavani M. Thuraisingham:

Secure query processing in intelligent database management systems. 204-214 - Linda L. Vetter, Gordon Smith, Teresa F. Lunt:

TCB subsets: the next step. 216-221 - Thomas F. Keefe, Dan Thomsen, Wei-Tek Tsai, M. R. Hansch:

Multi-party conflict: the problem and its solutions. 222-231 - Russell J. Davis:

Network authentication tokens. 234-238 - Greg King:

A survey of commercially available secure LAN products. 239-247 - Robert E. Niemeyer:

Applying the TNI to system certification and accreditation. 248-252 - Lein Harn, Yaw-Ruey Chien, Thomas Kiesler:

An extended cryptographic key generation scheme for multilevel data security. 254-262 - Lein Harn, Thomas Kiesler:

Two new efficient cryptosystems based on Rabin's scheme: alternatives to RSA cryptosystem. 263-270 - Frank L. Mayer, William Curtis Barker, Theresa K. Haley, J. Noelle McAuliffe, Daniel F. Sterne, Lynne S. Vidmar:

Evaluation issues for an integrated 'INFOSEC' product. 271-275 - Tsau Young Lin:

Chinese wall security policy-an aggressive model. 282-289 - Thomas F. Keefe, Wei-Tek Tsai:

Security model consistency in secure object-oriented systems. 290-298 - Jody Heaney, Marc Adkins, Gary Dolsen, John Page:

Security model development environment. 299-307 - Teresa F. Lunt:

Report from the second RADC database security workshop. 310-313 - Gary W. Smith:

Multilevel secure database design: a practical application. 314-321 - Victoria Ashby, Thomas Gregg, Annabelle Lee:

Security approach for rapid prototyping in multilevel secure systems. 328-334 - Thomas H. Hinke:

The trusted server approach to multilevel security. 335-341 - William Curtis Barker:

Use of privacy-enhanced mail for software distribution. 344-347 - Tom Casey, Michael Roe, Bill Tuck, Steve R. Wilbur:

Secure automated document delivery. 348-356

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














