


default search action
5. ACSAC 1989: Tucson, AZ, USA
- Fifth Annual Computer Security Applications Conference, ACSAC 1989, 4-8 December, 1989, Westward Look Resort, Tucson, Arizona, USA. IEEE 1989
- Bill Maimone:
RADC database security workshop oracle corporation homework problem solution. - Steven D. Smith:
Computer security and air traffic automation. - Ravi S. Sandhu:
A perspective on integrity mechanisms. - Richard J. Feiertag:
Does TCB subsetting enhance trust? - Howard L. Johnson:
Integrity panel position paper. - Doug Paul:
A summary of the Unisys experience with GEMSOS. - Nander Brown:
Assessment of security requirements for sensitive systems. - Russell Housley:
Electronic messaging security: a comparison of three approaches. - Paul D. Stachour, Dan J. Thomsen:
A summary of the LDV solution to the homework problem. - Marvin Schaefer, Brian Hubbard, Daniel F. Sterne, Theresa K. Haley, J. Noelle McAuliffe, Dawn Wolcott:
Auditing: a relevant contribution to trusted database management systems. - Linda L. Vetter:
TCB subset architecture. - Lloyd F. Reese:
Challenges faced today by computer security practitioners. - Edward D. Sturms:
Secure database design: an implementation using a secure DBMS. - Thomas H. Hinke:
Secure database design panel. - Ruth R. Nelson:
End-to-end encryption at the network layer. - Kimberly E. Kirkpatrick:
A security standard for LANs. - R. A. Gove, Arthur R. Friedman:
A structured risk analysis approach to resolve the data protection and integrity issues for computer-aided acquisition logistics support (CALS). 4-5 - Ruth M. Davis:
Electronic information security in a digital environment. 6-9 - Bennett C. Karp:
The CALS Data Protection and Integrity Industry Working Group. 10-11 - William C. Gorham Jr.:
Data protection requirements in computer-aided acquisition and logistic support. 12-13 - Steven J. Reynolds, T. P. Grove Jr., John N. Parringin:
Human issues. 16-17 - Rolf Lang:
Implementing sensitive but unclassified security, today-a workshop proposal. 20-24 - Ken Otwell, Bruce Aldridge:
The role of vulnerability in risk management. 32-38 - J. R. Winkler, W. J. Page:
Intrusion and anomaly detection in trusted systems. 39-45 - Matt Bishop:
A model of security monitoring. 46-52 - Nancy K. Woodfield:
An approach for evaluating the security of an Air Force type network. 53-62 - Edward Humphreys, Warwick Ford, M. Stirland, Thomas Parker:
Security standards for open systems. 64-67 - Santosh Chokhani:
Protection of call detail records data in federal telecommunications. 70-77 - K. N. Rao:
Security audit for embedded avionics systems. 78-84 - E. R. Schallenmüller, Rich P. Cramer, Bruce Aldridge:
Development of a multi level data generation application for GEMSOS. 86-90 - Sammy Migues, Russell Housley:
Designing a trusted client-server distributed network. 91-94 - Norman Proctor, Raymond Wong:
The security policy of the secure distributed operating system prototype. 95-102 - Helena B. Winkler-Parenty:
Considerations on TCB subsetting. 105-106 - Dan Gambel:
Gemini developers: facts, myths, and war stories. 110-111 - Eugen M. Bacic:
Process execution controls as a mechanism to ensure consistency. 114-120 - James O. Bondi, Martha A. Branstad:
Architectural support of fine-grained secure computing. 121-130 - Donald V. Miller, Robert W. Baldwin:
Access control by Boolean expression evaluation. 131-139 - William Green:
ADP security within the Customs Service. 144-145 - Stephen D. Crocker, Emilie J. Siarkiewicz:
Software methodology for development of a trusted BMS: identification of critical problems. 148-165 - Terry C. Vickers Benzel:
Developing trusted systems using DOD-STD-2167A. 166-176 - Linda J. Harrison:
Security issues and Ada runtime support. 177-183 - Ann B. Marmor-Squires, John McHugh, Martha A. Branstad, Bonnie P. Danner, Lou Nagy, Pat Rougeau, Daniel F. Sterne:
A risk driven process model for the development of trusted systems. 184-192 - Alan R. Downing, Ira B. Greenberg, Teresa F. Lunt:
Issues in distributed database security. 196-203 - Bhavani M. Thuraisingham:
Secure query processing in intelligent database management systems. 204-214 - Linda L. Vetter, Gordon Smith, Teresa F. Lunt:
TCB subsets: the next step. 216-221 - Thomas F. Keefe, Dan Thomsen, Wei-Tek Tsai, M. R. Hansch:
Multi-party conflict: the problem and its solutions. 222-231 - Russell J. Davis:
Network authentication tokens. 234-238 - Greg King:
A survey of commercially available secure LAN products. 239-247 - Robert E. Niemeyer:
Applying the TNI to system certification and accreditation. 248-252 - Lein Harn, Yaw-Ruey Chien, Thomas Kiesler:
An extended cryptographic key generation scheme for multilevel data security. 254-262 - Lein Harn, Thomas Kiesler:
Two new efficient cryptosystems based on Rabin's scheme: alternatives to RSA cryptosystem. 263-270 - Frank L. Mayer, William Curtis Barker, Theresa K. Haley, J. Noelle McAuliffe, Daniel F. Sterne, Lynne S. Vidmar:
Evaluation issues for an integrated 'INFOSEC' product. 271-275 - Tsau Young Lin:
Chinese wall security policy-an aggressive model. 282-289 - Thomas F. Keefe, Wei-Tek Tsai:
Security model consistency in secure object-oriented systems. 290-298 - Jody Heaney, Marc Adkins, Gary Dolsen, John Page:
Security model development environment. 299-307 - Teresa F. Lunt:
Report from the second RADC database security workshop. 310-313 - Gary W. Smith:
Multilevel secure database design: a practical application. 314-321 - Victoria Ashby, Thomas Gregg, Annabelle Lee:
Security approach for rapid prototyping in multilevel secure systems. 328-334 - Thomas H. Hinke:
The trusted server approach to multilevel security. 335-341 - William Curtis Barker:
Use of privacy-enhanced mail for software distribution. 344-347 - Tom Casey, Michael Roe, Bill Tuck, Steve R. Wilbur:
Secure automated document delivery. 348-356

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.