Search dblp for Publications

export results for "toc:db/conf/acsac/acsac1993.bht:"

 download as .bib file

@inproceedings{DBLP:conf/acsac/Aldrich93,
  author       = {M. O. Aldrich},
  title        = {A methodology for the use of single level {RDBMS} software in a multi-level
                  secured system},
  booktitle    = {Ninth Annual Computer Security Applications Conference, {ACSAC} 1993,
                  6-10 Decemver, 1993, Orlando, Florida, {USA}},
  pages        = {11--20},
  publisher    = {{IEEE}},
  year         = {1993},
  url          = {https://doi.org/10.1109/CSAC.1993.315458},
  doi          = {10.1109/CSAC.1993.315458},
  timestamp    = {Wed, 16 Oct 2019 14:14:56 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/Aldrich93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/BacicR93,
  author       = {Eugen M. Bacic and
                  A. Robison},
  title        = {The rationale behind the Canadian criteria},
  booktitle    = {Ninth Annual Computer Security Applications Conference, {ACSAC} 1993,
                  6-10 Decemver, 1993, Orlando, Florida, {USA}},
  pages        = {170--179},
  publisher    = {{IEEE}},
  year         = {1993},
  url          = {https://doi.org/10.1109/CSAC.1993.315441},
  doi          = {10.1109/CSAC.1993.315441},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/BacicR93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/BernsteinB93,
  author       = {Mary M. Bernstein and
                  Terry C. Vickers Benzel},
  title        = {Real-time trust with 'System Build': lessons learned},
  booktitle    = {Ninth Annual Computer Security Applications Conference, {ACSAC} 1993,
                  6-10 Decemver, 1993, Orlando, Florida, {USA}},
  pages        = {130--136},
  publisher    = {{IEEE}},
  year         = {1993},
  url          = {https://doi.org/10.1109/CSAC.1993.315446},
  doi          = {10.1109/CSAC.1993.315446},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/BernsteinB93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/BodeauC93,
  author       = {Deborah J. Bodeau and
                  Frederick N. Chase},
  title        = {Modeling constructs for describing a complex system-of-systems},
  booktitle    = {Ninth Annual Computer Security Applications Conference, {ACSAC} 1993,
                  6-10 Decemver, 1993, Orlando, Florida, {USA}},
  pages        = {140--148},
  publisher    = {{IEEE}},
  year         = {1993},
  url          = {https://doi.org/10.1109/CSAC.1993.315444},
  doi          = {10.1109/CSAC.1993.315444},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/BodeauC93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/BodeauS93,
  author       = {Deborah J. Bodeau and
                  Vipin Swarup},
  title        = {Integration of security services into the {NORAD/USSPACECOM} technical
                  infrastructure: a case study},
  booktitle    = {Ninth Annual Computer Security Applications Conference, {ACSAC} 1993,
                  6-10 Decemver, 1993, Orlando, Florida, {USA}},
  pages        = {2--10},
  publisher    = {{IEEE}},
  year         = {1993},
  url          = {https://doi.org/10.1109/CSAC.1993.315459},
  doi          = {10.1109/CSAC.1993.315459},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/BodeauS93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/Boulahia-Cuppens93,
  author       = {Nora Boulahia{-}Cuppens and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Alban Gabillon and
                  Kioumars Yazdanian},
  title        = {MultiView model for object-oriented database},
  booktitle    = {Ninth Annual Computer Security Applications Conference, {ACSAC} 1993,
                  6-10 Decemver, 1993, Orlando, Florida, {USA}},
  pages        = {222--231},
  publisher    = {{IEEE}},
  year         = {1993},
  url          = {https://doi.org/10.1109/CSAC.1993.315437},
  doi          = {10.1109/CSAC.1993.315437},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/Boulahia-Cuppens93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/CalvelliV93,
  author       = {Claudio Calvelli and
                  Vijay Varadharajan},
  title        = {Representation of mental health application access policy in a monotonic
                  model},
  booktitle    = {Ninth Annual Computer Security Applications Conference, {ACSAC} 1993,
                  6-10 Decemver, 1993, Orlando, Florida, {USA}},
  pages        = {195--209},
  publisher    = {{IEEE}},
  year         = {1993},
  url          = {https://doi.org/10.1109/CSAC.1993.315439},
  doi          = {10.1109/CSAC.1993.315439},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/CalvelliV93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/Carlsen93,
  author       = {Ulf Carlsen},
  title        = {Using logics to detect implementation-dependent flaws [cryptographic
                  protocol design]},
  booktitle    = {Ninth Annual Computer Security Applications Conference, {ACSAC} 1993,
                  6-10 Decemver, 1993, Orlando, Florida, {USA}},
  pages        = {64--73},
  publisher    = {{IEEE}},
  year         = {1993},
  url          = {https://doi.org/10.1109/CSAC.1993.315453},
  doi          = {10.1109/CSAC.1993.315453},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/Carlsen93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/ClarkGBLNWJ93,
  author       = {Raymond K. Clark and
                  Ira B. Greenberg and
                  Peter K. Boucher and
                  Teresa F. Lunt and
                  Peter G. Neumann and
                  Douglas M. Wells and
                  E. Douglas Jensen},
  title        = {Effects of multilevel security on real-time applications},
  booktitle    = {Ninth Annual Computer Security Applications Conference, {ACSAC} 1993,
                  6-10 Decemver, 1993, Orlando, Florida, {USA}},
  pages        = {120--129},
  publisher    = {{IEEE}},
  year         = {1993},
  url          = {https://doi.org/10.1109/CSAC.1993.315447},
  doi          = {10.1109/CSAC.1993.315447},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/ClarkGBLNWJ93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/DeMeester93,
  author       = {J. DeMeester},
  title        = {{C2} auditing in the {X} Display Manager},
  booktitle    = {Ninth Annual Computer Security Applications Conference, {ACSAC} 1993,
                  6-10 Decemver, 1993, Orlando, Florida, {USA}},
  pages        = {265--271},
  publisher    = {{IEEE}},
  year         = {1993},
  url          = {https://doi.org/10.1109/CSAC.1993.315433},
  doi          = {10.1109/CSAC.1993.315433},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/DeMeester93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/EpsteinP93,
  author       = {Jeremy Epstein and
                  Rita Pascale},
  title        = {User interface for a high assurance, windowing system},
  booktitle    = {Ninth Annual Computer Security Applications Conference, {ACSAC} 1993,
                  6-10 Decemver, 1993, Orlando, Florida, {USA}},
  pages        = {256--264},
  publisher    = {{IEEE}},
  year         = {1993},
  url          = {https://doi.org/10.1109/CSAC.1993.315434},
  doi          = {10.1109/CSAC.1993.315434},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/EpsteinP93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/FaiginDJ93,
  author       = {Daniel P. Faigin and
                  Joseph Donndelinger and
                  J. R. Jones},
  title        = {A rigorous approach to determining objects},
  booktitle    = {Ninth Annual Computer Security Applications Conference, {ACSAC} 1993,
                  6-10 Decemver, 1993, Orlando, Florida, {USA}},
  pages        = {159--168},
  publisher    = {{IEEE}},
  year         = {1993},
  url          = {https://doi.org/10.1109/CSAC.1993.315442},
  doi          = {10.1109/CSAC.1993.315442},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/FaiginDJ93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/FitchH93,
  author       = {John A. Fitch III and
                  Lance J. Hoffman},
  title        = {On the shortest path to network security},
  booktitle    = {Ninth Annual Computer Security Applications Conference, {ACSAC} 1993,
                  6-10 Decemver, 1993, Orlando, Florida, {USA}},
  pages        = {149--158},
  publisher    = {{IEEE}},
  year         = {1993},
  url          = {https://doi.org/10.1109/CSAC.1993.315443},
  doi          = {10.1109/CSAC.1993.315443},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/FitchH93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/Jansen93,
  author       = {W. A. Jansen},
  title        = {A second look at the {SDNS} key management protocol},
  booktitle    = {Ninth Annual Computer Security Applications Conference, {ACSAC} 1993,
                  6-10 Decemver, 1993, Orlando, Florida, {USA}},
  pages        = {74--81},
  publisher    = {{IEEE}},
  year         = {1993},
  url          = {https://doi.org/10.1109/CSAC.1993.315452},
  doi          = {10.1109/CSAC.1993.315452},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/Jansen93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/KaydenS93,
  author       = {Eric M. Kayden and
                  L. J. Schaefer},
  title        = {Heterogeneous workstation to {STU-III} prototype},
  booktitle    = {Ninth Annual Computer Security Applications Conference, {ACSAC} 1993,
                  6-10 Decemver, 1993, Orlando, Florida, {USA}},
  pages        = {100--107},
  publisher    = {{IEEE}},
  year         = {1993},
  url          = {https://doi.org/10.1109/CSAC.1993.315449},
  doi          = {10.1109/CSAC.1993.315449},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/KaydenS93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/LewisW93,
  author       = {Sharon R. Lewis and
                  Simon R. Wiseman},
  title        = {Database design and {MLS} DBMSs: an unhappy alliance?},
  booktitle    = {Ninth Annual Computer Security Applications Conference, {ACSAC} 1993,
                  6-10 Decemver, 1993, Orlando, Florida, {USA}},
  pages        = {232--243},
  publisher    = {{IEEE}},
  year         = {1993},
  url          = {https://doi.org/10.1109/CSAC.1993.315436},
  doi          = {10.1109/CSAC.1993.315436},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/LewisW93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/Lubbes93,
  author       = {Herman Otto Lubbes},
  title        = {COMPUSEC, a personal view},
  booktitle    = {Ninth Annual Computer Security Applications Conference, {ACSAC} 1993,
                  6-10 Decemver, 1993, Orlando, Florida, {USA}},
  publisher    = {{IEEE}},
  year         = {1993},
  url          = {https://doi.org/10.1109/CSAC.1993.315460},
  doi          = {10.1109/CSAC.1993.315460},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/Lubbes93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/NashK93,
  author       = {Michael J. Nash and
                  Ronald J. Kennett},
  title        = {Security policy in a complex logistics procurement},
  booktitle    = {Ninth Annual Computer Security Applications Conference, {ACSAC} 1993,
                  6-10 Decemver, 1993, Orlando, Florida, {USA}},
  pages        = {46--53},
  publisher    = {{IEEE}},
  year         = {1993},
  url          = {https://doi.org/10.1109/CSAC.1993.315454},
  doi          = {10.1109/CSAC.1993.315454},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/NashK93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/PernulWT93,
  author       = {G{\"{u}}nther Pernul and
                  Werner Winiwarter and
                  A Min Tjoa},
  title        = {The deductive filter approach to {MLS} database prototyping},
  booktitle    = {Ninth Annual Computer Security Applications Conference, {ACSAC} 1993,
                  6-10 Decemver, 1993, Orlando, Florida, {USA}},
  pages        = {244--253},
  publisher    = {{IEEE}},
  year         = {1993},
  url          = {https://doi.org/10.1109/CSAC.1993.315435},
  doi          = {10.1109/CSAC.1993.315435},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/PernulWT93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/RuE93,
  author       = {Willem G. de Ru and
                  Jan H. P. Eloff},
  title        = {Improved password mechanisms through expert system technology},
  booktitle    = {Ninth Annual Computer Security Applications Conference, {ACSAC} 1993,
                  6-10 Decemver, 1993, Orlando, Florida, {USA}},
  pages        = {272--280},
  publisher    = {{IEEE}},
  year         = {1993},
  url          = {https://doi.org/10.1109/CSAC.1993.315445},
  doi          = {10.1109/CSAC.1993.315445},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/RuE93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/Russell93,
  author       = {Selwyn Russell},
  title        = {Transparent cosignatures for electronic documents},
  booktitle    = {Ninth Annual Computer Security Applications Conference, {ACSAC} 1993,
                  6-10 Decemver, 1993, Orlando, Florida, {USA}},
  pages        = {82--91},
  publisher    = {{IEEE}},
  year         = {1993},
  url          = {https://doi.org/10.1109/CSAC.1993.315451},
  doi          = {10.1109/CSAC.1993.315451},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/Russell93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/SandhuG93,
  author       = {Ravi S. Sandhu and
                  Srinivas Ganta},
  title        = {Expressive power of the single-object typed access matrix model},
  booktitle    = {Ninth Annual Computer Security Applications Conference, {ACSAC} 1993,
                  6-10 Decemver, 1993, Orlando, Florida, {USA}},
  pages        = {184--194},
  publisher    = {{IEEE}},
  year         = {1993},
  url          = {https://doi.org/10.1109/CSAC.1993.315440},
  doi          = {10.1109/CSAC.1993.315440},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/SandhuG93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/SchultzE93,
  author       = {Rick Schultz and
                  Tim Ehrsam},
  title        = {Migrating a commercial-off-the-shelf application to a multilevel secure
                  environment},
  booktitle    = {Ninth Annual Computer Security Applications Conference, {ACSAC} 1993,
                  6-10 Decemver, 1993, Orlando, Florida, {USA}},
  pages        = {21--28},
  publisher    = {{IEEE}},
  year         = {1993},
  url          = {https://doi.org/10.1109/CSAC.1993.315457},
  doi          = {10.1109/CSAC.1993.315457},
  timestamp    = {Wed, 24 Apr 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/SchultzE93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/ShiMM93,
  author       = {Qi Shi and
                  John A. McDermid and
                  Jonathan D. Moffett},
  title        = {Applying noninterference to composition of systems: a more practical
                  approach},
  booktitle    = {Ninth Annual Computer Security Applications Conference, {ACSAC} 1993,
                  6-10 Decemver, 1993, Orlando, Florida, {USA}},
  pages        = {210--220},
  publisher    = {{IEEE}},
  year         = {1993},
  url          = {https://doi.org/10.1109/CSAC.1993.315438},
  doi          = {10.1109/CSAC.1993.315438},
  timestamp    = {Mon, 30 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/ShiMM93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/Smith93,
  author       = {Richard E. Smith},
  title        = {{MLS} file service for network data sharing},
  booktitle    = {Ninth Annual Computer Security Applications Conference, {ACSAC} 1993,
                  6-10 Decemver, 1993, Orlando, Florida, {USA}},
  pages        = {94--99},
  publisher    = {{IEEE}},
  year         = {1993},
  url          = {https://doi.org/10.1109/CSAC.1993.315450},
  doi          = {10.1109/CSAC.1993.315450},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/Smith93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/Sweezey93,
  author       = {Michael R. Sweezey},
  title        = {Specification issues of secure systems},
  booktitle    = {Ninth Annual Computer Security Applications Conference, {ACSAC} 1993,
                  6-10 Decemver, 1993, Orlando, Florida, {USA}},
  pages        = {36--45},
  publisher    = {{IEEE}},
  year         = {1993},
  url          = {https://doi.org/10.1109/CSAC.1993.315455},
  doi          = {10.1109/CSAC.1993.315455},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/Sweezey93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/Tretick93,
  author       = {Brian Tretick},
  title        = {Operational requirements for multilevel security},
  booktitle    = {Ninth Annual Computer Security Applications Conference, {ACSAC} 1993,
                  6-10 Decemver, 1993, Orlando, Florida, {USA}},
  pages        = {30--35},
  publisher    = {{IEEE}},
  year         = {1993},
  url          = {https://doi.org/10.1109/CSAC.1993.315456},
  doi          = {10.1109/CSAC.1993.315456},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/Tretick93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/VenkatramanN93,
  author       = {Balaji R. Venkatraman and
                  Richard E. Newman{-}Wolfe},
  title        = {Transmission schedules to prevent traffic analysis},
  booktitle    = {Ninth Annual Computer Security Applications Conference, {ACSAC} 1993,
                  6-10 Decemver, 1993, Orlando, Florida, {USA}},
  pages        = {108--115},
  publisher    = {{IEEE}},
  year         = {1993},
  url          = {https://doi.org/10.1109/CSAC.1993.315448},
  doi          = {10.1109/CSAC.1993.315448},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/VenkatramanN93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acsac/1993,
  title        = {Ninth Annual Computer Security Applications Conference, {ACSAC} 1993,
                  6-10 Decemver, 1993, Orlando, Florida, {USA}},
  publisher    = {{IEEE}},
  year         = {1993},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/926/proceeding},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/1993.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics