default search action
7. ACSAC 1991: San Antonio, Texas, USA
- Seventh Annual Computer Security Applications Conference, ACSAC 1991, 2-6 December, 1991, San Antonio, Texas, USA. IEEE 1991
- John P. McDermott, Sushil Jajodia, Ravi S. Sandhu:
A single-level scheduler for the replicated architecture for multilevel-secure databases. 2-11 - Doug Nelson, Chip Paradise:
Using polyinstantiation to develop an MLS application. 12-22 - Marie Collins, William R. Ford, Bhavani Thuraisingham:
Security constraint processing during the update operation in a multilevel secure database management system. 23-32 - Jeffrey Picciotto:
Towards trusted cut and paste in the X Window System. 34-43 - Jeremy Epstein, John McHugh, Rita Pascale, Hilarie K. Orman, Glenn S. Benson, Charles R. Martin, Ann B. Marmor-Squires, Bonnie P. Danner, Martha A. Branstad:
A prototype B3 trusted X Window System. 44-55 - Dale A. Moir:
An implementation of access control using a salient feature of primes. 56-64 - Samuel I. Schaen, Brian W. McKenney:
Network auditing: issues and recommendations. 66-79 - Linda B. Lankewicz, Mark Benard:
Real-time anomaly detection using a nonparametric pattern recognition approach. 80-89 - Boris Y. Kogan, Sushil Jajodia:
An audit model for object-oriented databases. 90-99 - Richard E. Newman-Wolfe, Balaji R. Venkatraman:
High level prevention of traffic analysis. 102-109 - John P. Nestor:
Security modelling using hierarchical state machines. 110-119 - Joseph C. Chao, Mahalakshmi Komaravolu, Carol Lin, Gavin Yiu:
Modeling internal controls of automated teller machine (ATM) systems: A computerized decision aid for design and evaluation. 120-129 - Edward A. Schneider:
Verification of the security of a secure network component. 132-142 - R. A. Gove, Lisa M. Jaworski, John G. Williams:
To Bell and back: developing a formal security policy model for a C 2 system. 143-151 - Paul Ammann, Ravi S. Sandhu, Gurpreet S. Suri:
A distributed implementation of the extended schematic protection model. 152-164 - Günther Pernul, Gottfried Luef:
A multilevel secure relational data model based on views. 166-177 - S. C. Hansen, Elizabeth A. Unger:
Domain reduction dependencies: A new type of dependency for statistical database security. 178-186 - Bob P. Weems, Wen-Gong Shieh, Muhammad Jaseemuddin:
Complete containment sets and their application to the inference problem. 187-200 - Daniel Galik, Brian Tretick:
Fielding multilevel security into command and control systems. 202-208 - Howard L. Johnson, Chuck Arvin, Earl Jenkinson, Bob Pierce:
Proposed security for critical Air Force missions. 209-217 - Patrick W. Mallet:
Considerations for applying disk encryptors to environments subject to hostile overrun. 218-222 - Charles R. Pierce:
Security considerations in the acquisition of computer systems. 224-229 - Robert E. Niemeyer, V. A. Ashby:
Observations on integrating multilevel secure components into system high distributed systems. 230-238 - Maria M. King:
Rebus passwords. 239-243
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.