![](https://dblp.uni-trier.de./img/logo.320x120.png)
![search dblp search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
default search action
10. ACSAC 1994: Orlando, FL, USA
- 10th Annual Computer Security Applications Conference, ACSAC 1994, 5-9 December, 1994 Orlando, FL, USA. IEEE 1994
- Judith N. Froscher, Myong H. Kang, John P. McDermott, Oliver Costich, Carl E. Landwehr:
A practical approach to high assurance multilevel secure computing service. 2-11 - Rob Dobry, Mary Schanken:
Security concerns for distributed systems. 12-20 - Susan L. Chapin, William R. Herndon, LouAnna Notargiacomo, Melonyi L. Katz, Thomas J. Mowbray:
Security for the Common Object Request Broker Architecture (CORBA). 21-30 - Edward Amoroso, Michael Merritt:
Composing system integrity using I/O automata. 34-43 - Judith A. Hemenway, Jonathan Fellows:
Applying the Abadi-Lamport composition theorem in real-world secure system integration environments. 44-53 - Ravi S. Sandhu, Edward J. Coyne, Hal L. Feinstein, Charles E. Youman:
Role-based access control: a multi-dimensional view. 54-62 - Greg King:
Secure system composition: five practical initiatives. 67-73 - Myong H. Kang, Judith N. Froscher, Ravi Mukkamala:
Architectural impact on performance of a multilevel database system. 76-85 - Vinti Doshi, William R. Herndon, Sushil Jajodia, Catherine D. McCollum:
Benchmarking multilevel secure database systems using the MITRE benchmark. 86-95 - Günther Pernul, Gerald Quirchmayr:
Organizing MLS databases from a data modelling point of view. 96-105 - Marcus Brown, Samuel Joe Rogers:
A practical approach to user authentication. 108-116 - Paul Proctor:
Audit reduction and misuse detection in heterogeneous environments: framework and application. 117-125 - Eric A. Fisch, Gregory B. White, Udo W. Pooch:
The design of an audit trail analysis tool. 126-132 - Calvin Ko, George Fink, Karl N. Levitt:
Automated detection of vulnerabilities in privileged programs by execution monitoring. 134-144 - Lorrayne J. Schaefer, Brian W. McKenney:
Networked information discovery and retrieval tools: security capabilities and needs. 145-153 - George Fink, Karl N. Levitt:
Property-based testing of privileged programs. 154-163 - Eugene D. Myers:
STU-III-multilevel secure computer interface. 170-179 - Peter K. Boucher, Teresa F. Lunt:
A prototype multilevel-secure DoD directory. 180-188 - James W. Freeman, Richard B. Neely, M. A. Heckard:
A validated security policy modeling approach. 189-200 - Randall E. Smith:
A secure Email gateway (building an RCAS external interface). 202-211 - David S. Goldberg:
The MITRE security perimeter. 212-218 - Doug Rosenthal:
EINet: a secure, open network for electronic commerce. 219-226 - Deborah J. Bodeau:
System-of-systems security engineering. 228-235 - Mary M. Bernstein, Chulsoo Kim:
AOS: an avionics operating system for multi-level secure real-time environments. 236-245 - Michael V. Joyce:
The effects of trusted technology on distributed applications. 246-255 - Klaus J. Keus, Markus Ullmann:
Availability: theory and fundamentals for practical evaluation and use. 258-264 - Kate Arndt, Michael Burgoon, Jeanne Firey, Keith Rodenhausen:
Ops/Intel interface lessons learned: the integrator's perspective. 268-277 - C. L. Robinson, Simon R. Wiseman:
Using security models to investigate CMW design and implementation. 278-287 - Balaji R. Venkatraman, Richard E. Newman-Wolfe:
Performance analysis of a method for high level prevention of traffic analysis using measurements from a campus network. 288-297 - Bill Neugent:
Where we stand in multilevel security (MLS): requirements, approaches, issues, and lessons learned. 304-305 - Jay J. Kahn, Marshall D. Abrams:
Editorial: why bad things happen to good systems, and what to do about it. 306-307 - Jeremy Epstein:
Editorial: a view of cryptography in TCSEC products. 308-309
![](https://dblp.uni-trier.de./img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.