![](https://dblp1.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp1.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp1.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
Service temporarily not available.
Please try again later.
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 33 matches
- 1994
- Edward Amoroso, Michael Merritt:
Composing system integrity using I/O automata. ACSAC 1994: 34-43 - Kate Arndt, Michael Burgoon, Jeanne Firey, Keith Rodenhausen:
Ops/Intel interface lessons learned: the integrator's perspective. ACSAC 1994: 268-277 - Mary M. Bernstein, Chulsoo Kim:
AOS: an avionics operating system for multi-level secure real-time environments. ACSAC 1994: 236-245 - Deborah J. Bodeau:
System-of-systems security engineering. ACSAC 1994: 228-235 - Peter K. Boucher, Teresa F. Lunt:
A prototype multilevel-secure DoD directory. ACSAC 1994: 180-188 - Marcus Brown, Samuel Joe Rogers:
A practical approach to user authentication. ACSAC 1994: 108-116 - Susan L. Chapin, William R. Herndon, LouAnna Notargiacomo, Melonyi L. Katz, Thomas J. Mowbray:
Security for the Common Object Request Broker Architecture (CORBA). ACSAC 1994: 21-30 - Rob Dobry, Mary Schanken:
Security concerns for distributed systems. ACSAC 1994: 12-20 - Vinti Doshi, William R. Herndon, Sushil Jajodia, Catherine D. McCollum:
Benchmarking multilevel secure database systems using the MITRE benchmark. ACSAC 1994: 86-95 - Jeremy Epstein:
Editorial: a view of cryptography in TCSEC products. ACSAC 1994: 308-309 - George Fink, Karl N. Levitt:
Property-based testing of privileged programs. ACSAC 1994: 154-163 - Eric A. Fisch, Gregory B. White, Udo W. Pooch:
The design of an audit trail analysis tool. ACSAC 1994: 126-132 - James W. Freeman, Richard B. Neely, M. A. Heckard:
A validated security policy modeling approach. ACSAC 1994: 189-200 - Judith N. Froscher, Myong H. Kang, John P. McDermott, Oliver Costich, Carl E. Landwehr:
A practical approach to high assurance multilevel secure computing service. ACSAC 1994: 2-11 - David S. Goldberg:
The MITRE security perimeter. ACSAC 1994: 212-218 - Judith A. Hemenway, Jonathan Fellows:
Applying the Abadi-Lamport composition theorem in real-world secure system integration environments. ACSAC 1994: 44-53 - Michael V. Joyce:
The effects of trusted technology on distributed applications. ACSAC 1994: 246-255 - Jay J. Kahn, Marshall D. Abrams:
Editorial: why bad things happen to good systems, and what to do about it. ACSAC 1994: 306-307 - Myong H. Kang, Judith N. Froscher, Ravi Mukkamala:
Architectural impact on performance of a multilevel database system. ACSAC 1994: 76-85 - Klaus J. Keus, Markus Ullmann:
Availability: theory and fundamentals for practical evaluation and use. ACSAC 1994: 258-264 - Greg King:
Secure system composition: five practical initiatives. ACSAC 1994: 67-73 - Calvin Ko, George Fink, Karl N. Levitt:
Automated detection of vulnerabilities in privileged programs by execution monitoring. ACSAC 1994: 134-144 - Eugene D. Myers:
STU-III-multilevel secure computer interface. ACSAC 1994: 170-179 - Bill Neugent:
Where we stand in multilevel security (MLS): requirements, approaches, issues, and lessons learned. ACSAC 1994: 304-305 - Günther Pernul, Gerald Quirchmayr:
Organizing MLS databases from a data modelling point of view. ACSAC 1994: 96-105 - Paul Proctor:
Audit reduction and misuse detection in heterogeneous environments: framework and application. ACSAC 1994: 117-125 - C. L. Robinson, Simon R. Wiseman:
Using security models to investigate CMW design and implementation. ACSAC 1994: 278-287 - Doug Rosenthal:
EINet: a secure, open network for electronic commerce. ACSAC 1994: 219-226 - Ravi S. Sandhu, Edward J. Coyne, Hal L. Feinstein, Charles E. Youman:
Role-based access control: a multi-dimensional view. ACSAC 1994: 54-62 - Lorrayne J. Schaefer, Brian W. McKenney:
Networked information discovery and retrieval tools: security capabilities and needs. ACSAC 1994: 145-153
skipping 3 more matches
loading more results
failed to load more results, please try again later
![](https://dblp1.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-06-29 01:34 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint