Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/acsac/acsac1993.bht:"
@inproceedings{DBLP:conf/acsac/Aldrich93, author = {M. O. Aldrich}, title = {A methodology for the use of single level {RDBMS} software in a multi-level secured system}, booktitle = {Ninth Annual Computer Security Applications Conference, {ACSAC} 1993, 6-10 Decemver, 1993, Orlando, Florida, {USA}}, pages = {11--20}, publisher = {{IEEE}}, year = {1993}, url = {https://doi.org/10.1109/CSAC.1993.315458}, doi = {10.1109/CSAC.1993.315458}, timestamp = {Wed, 16 Oct 2019 14:14:56 +0200}, biburl = {https://dblp.org/rec/conf/acsac/Aldrich93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/BacicR93, author = {Eugen M. Bacic and A. Robison}, title = {The rationale behind the Canadian criteria}, booktitle = {Ninth Annual Computer Security Applications Conference, {ACSAC} 1993, 6-10 Decemver, 1993, Orlando, Florida, {USA}}, pages = {170--179}, publisher = {{IEEE}}, year = {1993}, url = {https://doi.org/10.1109/CSAC.1993.315441}, doi = {10.1109/CSAC.1993.315441}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/BacicR93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/BernsteinB93, author = {Mary M. Bernstein and Terry C. Vickers Benzel}, title = {Real-time trust with 'System Build': lessons learned}, booktitle = {Ninth Annual Computer Security Applications Conference, {ACSAC} 1993, 6-10 Decemver, 1993, Orlando, Florida, {USA}}, pages = {130--136}, publisher = {{IEEE}}, year = {1993}, url = {https://doi.org/10.1109/CSAC.1993.315446}, doi = {10.1109/CSAC.1993.315446}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/BernsteinB93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/BodeauC93, author = {Deborah J. Bodeau and Frederick N. Chase}, title = {Modeling constructs for describing a complex system-of-systems}, booktitle = {Ninth Annual Computer Security Applications Conference, {ACSAC} 1993, 6-10 Decemver, 1993, Orlando, Florida, {USA}}, pages = {140--148}, publisher = {{IEEE}}, year = {1993}, url = {https://doi.org/10.1109/CSAC.1993.315444}, doi = {10.1109/CSAC.1993.315444}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/BodeauC93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/BodeauS93, author = {Deborah J. Bodeau and Vipin Swarup}, title = {Integration of security services into the {NORAD/USSPACECOM} technical infrastructure: a case study}, booktitle = {Ninth Annual Computer Security Applications Conference, {ACSAC} 1993, 6-10 Decemver, 1993, Orlando, Florida, {USA}}, pages = {2--10}, publisher = {{IEEE}}, year = {1993}, url = {https://doi.org/10.1109/CSAC.1993.315459}, doi = {10.1109/CSAC.1993.315459}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/BodeauS93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/Boulahia-Cuppens93, author = {Nora Boulahia{-}Cuppens and Fr{\'{e}}d{\'{e}}ric Cuppens and Alban Gabillon and Kioumars Yazdanian}, title = {MultiView model for object-oriented database}, booktitle = {Ninth Annual Computer Security Applications Conference, {ACSAC} 1993, 6-10 Decemver, 1993, Orlando, Florida, {USA}}, pages = {222--231}, publisher = {{IEEE}}, year = {1993}, url = {https://doi.org/10.1109/CSAC.1993.315437}, doi = {10.1109/CSAC.1993.315437}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/Boulahia-Cuppens93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/CalvelliV93, author = {Claudio Calvelli and Vijay Varadharajan}, title = {Representation of mental health application access policy in a monotonic model}, booktitle = {Ninth Annual Computer Security Applications Conference, {ACSAC} 1993, 6-10 Decemver, 1993, Orlando, Florida, {USA}}, pages = {195--209}, publisher = {{IEEE}}, year = {1993}, url = {https://doi.org/10.1109/CSAC.1993.315439}, doi = {10.1109/CSAC.1993.315439}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/CalvelliV93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/Carlsen93, author = {Ulf Carlsen}, title = {Using logics to detect implementation-dependent flaws [cryptographic protocol design]}, booktitle = {Ninth Annual Computer Security Applications Conference, {ACSAC} 1993, 6-10 Decemver, 1993, Orlando, Florida, {USA}}, pages = {64--73}, publisher = {{IEEE}}, year = {1993}, url = {https://doi.org/10.1109/CSAC.1993.315453}, doi = {10.1109/CSAC.1993.315453}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/Carlsen93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/ClarkGBLNWJ93, author = {Raymond K. Clark and Ira B. Greenberg and Peter K. Boucher and Teresa F. Lunt and Peter G. Neumann and Douglas M. Wells and E. Douglas Jensen}, title = {Effects of multilevel security on real-time applications}, booktitle = {Ninth Annual Computer Security Applications Conference, {ACSAC} 1993, 6-10 Decemver, 1993, Orlando, Florida, {USA}}, pages = {120--129}, publisher = {{IEEE}}, year = {1993}, url = {https://doi.org/10.1109/CSAC.1993.315447}, doi = {10.1109/CSAC.1993.315447}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/ClarkGBLNWJ93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/DeMeester93, author = {J. DeMeester}, title = {{C2} auditing in the {X} Display Manager}, booktitle = {Ninth Annual Computer Security Applications Conference, {ACSAC} 1993, 6-10 Decemver, 1993, Orlando, Florida, {USA}}, pages = {265--271}, publisher = {{IEEE}}, year = {1993}, url = {https://doi.org/10.1109/CSAC.1993.315433}, doi = {10.1109/CSAC.1993.315433}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/DeMeester93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/EpsteinP93, author = {Jeremy Epstein and Rita Pascale}, title = {User interface for a high assurance, windowing system}, booktitle = {Ninth Annual Computer Security Applications Conference, {ACSAC} 1993, 6-10 Decemver, 1993, Orlando, Florida, {USA}}, pages = {256--264}, publisher = {{IEEE}}, year = {1993}, url = {https://doi.org/10.1109/CSAC.1993.315434}, doi = {10.1109/CSAC.1993.315434}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/EpsteinP93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/FaiginDJ93, author = {Daniel P. Faigin and Joseph Donndelinger and J. R. Jones}, title = {A rigorous approach to determining objects}, booktitle = {Ninth Annual Computer Security Applications Conference, {ACSAC} 1993, 6-10 Decemver, 1993, Orlando, Florida, {USA}}, pages = {159--168}, publisher = {{IEEE}}, year = {1993}, url = {https://doi.org/10.1109/CSAC.1993.315442}, doi = {10.1109/CSAC.1993.315442}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/FaiginDJ93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/FitchH93, author = {John A. Fitch III and Lance J. Hoffman}, title = {On the shortest path to network security}, booktitle = {Ninth Annual Computer Security Applications Conference, {ACSAC} 1993, 6-10 Decemver, 1993, Orlando, Florida, {USA}}, pages = {149--158}, publisher = {{IEEE}}, year = {1993}, url = {https://doi.org/10.1109/CSAC.1993.315443}, doi = {10.1109/CSAC.1993.315443}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/FitchH93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/Jansen93, author = {W. A. Jansen}, title = {A second look at the {SDNS} key management protocol}, booktitle = {Ninth Annual Computer Security Applications Conference, {ACSAC} 1993, 6-10 Decemver, 1993, Orlando, Florida, {USA}}, pages = {74--81}, publisher = {{IEEE}}, year = {1993}, url = {https://doi.org/10.1109/CSAC.1993.315452}, doi = {10.1109/CSAC.1993.315452}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/Jansen93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/KaydenS93, author = {Eric M. Kayden and L. J. Schaefer}, title = {Heterogeneous workstation to {STU-III} prototype}, booktitle = {Ninth Annual Computer Security Applications Conference, {ACSAC} 1993, 6-10 Decemver, 1993, Orlando, Florida, {USA}}, pages = {100--107}, publisher = {{IEEE}}, year = {1993}, url = {https://doi.org/10.1109/CSAC.1993.315449}, doi = {10.1109/CSAC.1993.315449}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/KaydenS93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/LewisW93, author = {Sharon R. Lewis and Simon R. Wiseman}, title = {Database design and {MLS} DBMSs: an unhappy alliance?}, booktitle = {Ninth Annual Computer Security Applications Conference, {ACSAC} 1993, 6-10 Decemver, 1993, Orlando, Florida, {USA}}, pages = {232--243}, publisher = {{IEEE}}, year = {1993}, url = {https://doi.org/10.1109/CSAC.1993.315436}, doi = {10.1109/CSAC.1993.315436}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/LewisW93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/Lubbes93, author = {Herman Otto Lubbes}, title = {COMPUSEC, a personal view}, booktitle = {Ninth Annual Computer Security Applications Conference, {ACSAC} 1993, 6-10 Decemver, 1993, Orlando, Florida, {USA}}, publisher = {{IEEE}}, year = {1993}, url = {https://doi.org/10.1109/CSAC.1993.315460}, doi = {10.1109/CSAC.1993.315460}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/Lubbes93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/NashK93, author = {Michael J. Nash and Ronald J. Kennett}, title = {Security policy in a complex logistics procurement}, booktitle = {Ninth Annual Computer Security Applications Conference, {ACSAC} 1993, 6-10 Decemver, 1993, Orlando, Florida, {USA}}, pages = {46--53}, publisher = {{IEEE}}, year = {1993}, url = {https://doi.org/10.1109/CSAC.1993.315454}, doi = {10.1109/CSAC.1993.315454}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/NashK93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/PernulWT93, author = {G{\"{u}}nther Pernul and Werner Winiwarter and A Min Tjoa}, title = {The deductive filter approach to {MLS} database prototyping}, booktitle = {Ninth Annual Computer Security Applications Conference, {ACSAC} 1993, 6-10 Decemver, 1993, Orlando, Florida, {USA}}, pages = {244--253}, publisher = {{IEEE}}, year = {1993}, url = {https://doi.org/10.1109/CSAC.1993.315435}, doi = {10.1109/CSAC.1993.315435}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/PernulWT93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/RuE93, author = {Willem G. de Ru and Jan H. P. Eloff}, title = {Improved password mechanisms through expert system technology}, booktitle = {Ninth Annual Computer Security Applications Conference, {ACSAC} 1993, 6-10 Decemver, 1993, Orlando, Florida, {USA}}, pages = {272--280}, publisher = {{IEEE}}, year = {1993}, url = {https://doi.org/10.1109/CSAC.1993.315445}, doi = {10.1109/CSAC.1993.315445}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/RuE93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/Russell93, author = {Selwyn Russell}, title = {Transparent cosignatures for electronic documents}, booktitle = {Ninth Annual Computer Security Applications Conference, {ACSAC} 1993, 6-10 Decemver, 1993, Orlando, Florida, {USA}}, pages = {82--91}, publisher = {{IEEE}}, year = {1993}, url = {https://doi.org/10.1109/CSAC.1993.315451}, doi = {10.1109/CSAC.1993.315451}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/Russell93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/SandhuG93, author = {Ravi S. Sandhu and Srinivas Ganta}, title = {Expressive power of the single-object typed access matrix model}, booktitle = {Ninth Annual Computer Security Applications Conference, {ACSAC} 1993, 6-10 Decemver, 1993, Orlando, Florida, {USA}}, pages = {184--194}, publisher = {{IEEE}}, year = {1993}, url = {https://doi.org/10.1109/CSAC.1993.315440}, doi = {10.1109/CSAC.1993.315440}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/SandhuG93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/SchultzE93, author = {Rick Schultz and Tim Ehrsam}, title = {Migrating a commercial-off-the-shelf application to a multilevel secure environment}, booktitle = {Ninth Annual Computer Security Applications Conference, {ACSAC} 1993, 6-10 Decemver, 1993, Orlando, Florida, {USA}}, pages = {21--28}, publisher = {{IEEE}}, year = {1993}, url = {https://doi.org/10.1109/CSAC.1993.315457}, doi = {10.1109/CSAC.1993.315457}, timestamp = {Wed, 24 Apr 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/SchultzE93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/ShiMM93, author = {Qi Shi and John A. McDermid and Jonathan D. Moffett}, title = {Applying noninterference to composition of systems: a more practical approach}, booktitle = {Ninth Annual Computer Security Applications Conference, {ACSAC} 1993, 6-10 Decemver, 1993, Orlando, Florida, {USA}}, pages = {210--220}, publisher = {{IEEE}}, year = {1993}, url = {https://doi.org/10.1109/CSAC.1993.315438}, doi = {10.1109/CSAC.1993.315438}, timestamp = {Mon, 30 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/ShiMM93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/Smith93, author = {Richard E. Smith}, title = {{MLS} file service for network data sharing}, booktitle = {Ninth Annual Computer Security Applications Conference, {ACSAC} 1993, 6-10 Decemver, 1993, Orlando, Florida, {USA}}, pages = {94--99}, publisher = {{IEEE}}, year = {1993}, url = {https://doi.org/10.1109/CSAC.1993.315450}, doi = {10.1109/CSAC.1993.315450}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/Smith93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/Sweezey93, author = {Michael R. Sweezey}, title = {Specification issues of secure systems}, booktitle = {Ninth Annual Computer Security Applications Conference, {ACSAC} 1993, 6-10 Decemver, 1993, Orlando, Florida, {USA}}, pages = {36--45}, publisher = {{IEEE}}, year = {1993}, url = {https://doi.org/10.1109/CSAC.1993.315455}, doi = {10.1109/CSAC.1993.315455}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/Sweezey93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/Tretick93, author = {Brian Tretick}, title = {Operational requirements for multilevel security}, booktitle = {Ninth Annual Computer Security Applications Conference, {ACSAC} 1993, 6-10 Decemver, 1993, Orlando, Florida, {USA}}, pages = {30--35}, publisher = {{IEEE}}, year = {1993}, url = {https://doi.org/10.1109/CSAC.1993.315456}, doi = {10.1109/CSAC.1993.315456}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/Tretick93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/VenkatramanN93, author = {Balaji R. Venkatraman and Richard E. Newman{-}Wolfe}, title = {Transmission schedules to prevent traffic analysis}, booktitle = {Ninth Annual Computer Security Applications Conference, {ACSAC} 1993, 6-10 Decemver, 1993, Orlando, Florida, {USA}}, pages = {108--115}, publisher = {{IEEE}}, year = {1993}, url = {https://doi.org/10.1109/CSAC.1993.315448}, doi = {10.1109/CSAC.1993.315448}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/VenkatramanN93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/acsac/1993, title = {Ninth Annual Computer Security Applications Conference, {ACSAC} 1993, 6-10 Decemver, 1993, Orlando, Florida, {USA}}, publisher = {{IEEE}}, year = {1993}, url = {https://ieeexplore.ieee.org/xpl/conhome/926/proceeding}, timestamp = {Wed, 16 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/1993.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.