default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 29 matches
- 1993
- David Bailey:
Managing complexity in secure networks. NSPW 1993: 2-6 - Dixie B. Baker:
The evolved threat paradigm: look who's wearing the black hats! NSPW 1993: 126-130 - Dorothy E. Denning:
A new paradigm for trusted systems. NSPW 1993: 36-41 - Yvo Desmedt:
Computer security by redefining what a computer is. NSPW 1993: 160-166 - John Dobson:
New security paradigms: what other concepts do we need as well? NSPW 1993: 7-18 - Grace L. Hammonds:
Confidentiality, integrity, assured service: tying security all together. NSPW 1993: 48-52 - Hilary H. Hosmer:
The multipolicy paradigm for trusted systems. NSPW 1993: 19-32 - Hilary H. Hosmer:
Security is fuzzy!: applying the fuzzy logic paradigm to the multipolicy paradigm. NSPW 1993: 175-184 - Donald M. Howe:
Information system security engineering: a spiral approach to revolution. NSPW 1993: 53-56 - Leonard J. LaPadula:
Prospect on security paradigms. NSPW 1993: 62-68 - Leonard J. LaPadula, James G. Williams:
External consistency in a network environment. NSPW 1993: 131-137 - T. Y. Lin:
Bell and LaPadula axioms: a "new" paradigm for an "old" model. NSPW 1993: 82-93 - T. Y. Lin:
Concurrent automata, database computers, and security: a "new" security paradigm for secure parallel processing. NSPW 1993: 94-104 - John McLean:
New paradigms for high assurance software. NSPW 1993: 42-47 - Catherine Meadows:
An outline of a taxonomy of computer security research and development. NSPW 1993: 33-35 - James Bret Michael, Edgar H. Sibley, David C. Littman:
Integration of formal and heuristic reasoning as a basis for testing and debugging computer security policy. NSPW 1993: 69-75 - Terry Rooker:
Application level security using an object-oriented graphical user interface. NSPW 1993: 105-108 - Terry Rooker:
The reference monitor: an idea whose time has come. NSPW 1993: 192-197 - Marvin Schaefer:
We need to think about the foundations of computer security. NSPW 1993: 120-125 - W. R. Shockley:
Identification and authentication when users have multiple accounts. NSPW 1993: 185-191 - James M. Slack:
Security in an object-oriented database. NSPW 1993: 155-159 - Mark Smith:
The no-policy paradigm: towards a policy-free protocol supporting a secure X Window System. NSPW 1993: 109-117 - Ros Strens, John E. Dobson:
How responsibility modelling leads to security requirements. NSPW 1993: 143-149 - Roshan K. Thomas, Ravi S. Sandhu:
Towards a task-based paradigm for flexible and adaptable access control in distributed applications. NSPW 1993: 138-142 - Bhavani Thuraisingham:
Secure computing with the actor paradigm. NSPW 1993: 76-81 - José de J. Vázquez-Gómez:
Modelling multidomain security. NSPW 1993: 167-174 - James G. Williams:
A shift in security modeling paradigms. NSPW 1993: 57-61 - Kioumars Yazdanian, Frédéric Cuppens:
Neighborhood data and database security. NSPW 1993: 150-154 - James Bret Michael, Victoria Ashby, Catherine Meadows:
Proceedings on the 1992-1993 Workshop on New Security Paradigms, Sept. 22-24, 1992; and Aug. 3-5, 1993, Little Compton, RI, USA. ACM 1993, ISBN 0-8186-5430-9 [contents]
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-09-30 01:31 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint