default search action
NSPW 1992-1993: Little Compton, Rhode Island, USA
- James Bret Michael, Victoria Ashby, Catherine Meadows:
Proceedings on the 1992-1993 Workshop on New Security Paradigms, Sept. 22-24, 1992; and Aug. 3-5, 1993, Little Compton, RI, USA. ACM 1993, ISBN 0-8186-5430-9 - David Bailey:
Managing complexity in secure networks. 2-6 - John Dobson:
New security paradigms: what other concepts do we need as well? 7-18 - Hilary H. Hosmer:
The multipolicy paradigm for trusted systems. 19-32 - Catherine Meadows:
An outline of a taxonomy of computer security research and development. 33-35 - Dorothy E. Denning:
A new paradigm for trusted systems. 36-41 - John McLean:
New paradigms for high assurance software. 42-47 - Grace L. Hammonds:
Confidentiality, integrity, assured service: tying security all together. 48-52 - Donald M. Howe:
Information system security engineering: a spiral approach to revolution. 53-56 - James G. Williams:
A shift in security modeling paradigms. 57-61 - Leonard J. LaPadula:
Prospect on security paradigms. 62-68 - James Bret Michael, Edgar H. Sibley, David C. Littman:
Integration of formal and heuristic reasoning as a basis for testing and debugging computer security policy. 69-75 - Bhavani Thuraisingham:
Secure computing with the actor paradigm. 76-81 - T. Y. Lin:
Bell and LaPadula axioms: a "new" paradigm for an "old" model. 82-93 - T. Y. Lin:
Concurrent automata, database computers, and security: a "new" security paradigm for secure parallel processing. 94-104 - Terry Rooker:
Application level security using an object-oriented graphical user interface. 105-108 - Mark Smith:
The no-policy paradigm: towards a policy-free protocol supporting a secure X Window System. 109-117 - Marvin Schaefer:
We need to think about the foundations of computer security. 120-125 - Dixie B. Baker:
The evolved threat paradigm: look who's wearing the black hats! 126-130 - Leonard J. LaPadula, James G. Williams:
External consistency in a network environment. 131-137 - Roshan K. Thomas, Ravi S. Sandhu:
Towards a task-based paradigm for flexible and adaptable access control in distributed applications. 138-142 - Ros Strens, John E. Dobson:
How responsibility modelling leads to security requirements. 143-149 - Kioumars Yazdanian, Frédéric Cuppens:
Neighborhood data and database security. 150-154 - James M. Slack:
Security in an object-oriented database. 155-159 - Yvo Desmedt:
Computer security by redefining what a computer is. 160-166 - José de J. Vázquez-Gómez:
Modelling multidomain security. 167-174 - Hilary H. Hosmer:
Security is fuzzy!: applying the fuzzy logic paradigm to the multipolicy paradigm. 175-184 - W. R. Shockley:
Identification and authentication when users have multiple accounts. 185-191 - Terry Rooker:
The reference monitor: an idea whose time has come. 192-197
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.