


default search action
NSPW 1992-1993: Little Compton, Rhode Island, USA
- James Bret Michael, Victoria Ashby, Catherine Meadows:

Proceedings on the 1992-1993 Workshop on New Security Paradigms, Sept. 22-24, 1992; and Aug. 3-5, 1993, Little Compton, RI, USA. ACM 1993, ISBN 0-8186-5430-9 - David Bailey:

Managing complexity in secure networks. 2-6 - John Dobson:

New security paradigms: what other concepts do we need as well? 7-18 - Hilary H. Hosmer:

The multipolicy paradigm for trusted systems. 19-32 - Catherine Meadows:

An outline of a taxonomy of computer security research and development. 33-35 - Dorothy E. Denning:

A new paradigm for trusted systems. 36-41 - John McLean:

New paradigms for high assurance software. 42-47 - Grace L. Hammonds:

Confidentiality, integrity, assured service: tying security all together. 48-52 - Donald M. Howe:

Information system security engineering: a spiral approach to revolution. 53-56 - James G. Williams:

A shift in security modeling paradigms. 57-61 - Leonard J. LaPadula:

Prospect on security paradigms. 62-68 - James Bret Michael, Edgar H. Sibley, David C. Littman:

Integration of formal and heuristic reasoning as a basis for testing and debugging computer security policy. 69-75 - Bhavani Thuraisingham:

Secure computing with the actor paradigm. 76-81 - T. Y. Lin:

Bell and LaPadula axioms: a "new" paradigm for an "old" model. 82-93 - T. Y. Lin:

Concurrent automata, database computers, and security: a "new" security paradigm for secure parallel processing. 94-104 - Terry Rooker:

Application level security using an object-oriented graphical user interface. 105-108 - Mark Smith:

The no-policy paradigm: towards a policy-free protocol supporting a secure X Window System. 109-117 - Marvin Schaefer:

We need to think about the foundations of computer security. 120-125 - Dixie B. Baker:

The evolved threat paradigm: look who's wearing the black hats! 126-130 - Leonard J. LaPadula, James G. Williams:

External consistency in a network environment. 131-137 - Roshan K. Thomas, Ravi S. Sandhu:

Towards a task-based paradigm for flexible and adaptable access control in distributed applications. 138-142 - Ros Strens, John E. Dobson:

How responsibility modelling leads to security requirements. 143-149 - Kioumars Yazdanian, Frédéric Cuppens:

Neighborhood data and database security. 150-154 - James M. Slack:

Security in an object-oriented database. 155-159 - Yvo Desmedt:

Computer security by redefining what a computer is. 160-166 - José de J. Vázquez-Gómez:

Modelling multidomain security. 167-174 - Hilary H. Hosmer:

Security is fuzzy!: applying the fuzzy logic paradigm to the multipolicy paradigm. 175-184 - W. R. Shockley:

Identification and authentication when users have multiple accounts. 185-191 - Terry Rooker:

The reference monitor: an idea whose time has come. 192-197

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














