A Central and Up-to-Date User Requirement in IT Security (Englisch)
- Neue Suche nach: Keus, K.
- Neue Suche nach: Ullmann, M.
- Neue Suche nach: Aerospace Computer Security Associates
- Neue Suche nach: IEEE
- Neue Suche nach: Keus, K.
- Neue Suche nach: Ullmann, M.
- Neue Suche nach: Aerospace Computer Security Associates
- Neue Suche nach: IEEE
In:
Computer security applications
;
265-267
;
1994
-
ISBN:
-
ISSN:
- Aufsatz (Konferenz) / Print
-
Titel:A Central and Up-to-Date User Requirement in IT Security
-
Beteiligte:
-
Kongress:10th Annual conference, Computer security applications ; 1994 ; Orlando; FL
-
Erschienen in:Computer security applications ; 265-267
-
Verlag:
- Neue Suche nach: IEEE Computer Society Press
-
Erscheinungsdatum:01.01.1994
-
Format / Umfang:3 pages
-
Anmerkungen:Also known as ACSAC'94. IEEE Cat no 94TH8032
-
ISBN:
-
ISSN:
-
Medientyp:Aufsatz (Konferenz)
-
Format:Print
-
Sprache:Englisch
-
Schlagwörter:
-
Datenquelle:
© Metadata Copyright the British Library Board and other contributors. All rights reserved.
Inhaltsverzeichnis Konferenzband
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 0_1
-
Tenth Annual Computer Security Applications Conference| 1994
- 2
-
A Practical Approach to High Assurance Multilevel Secure Computing ServiceFroscher, J. / Kang, M. / McDermott, J. / Costich, O. / Aerospace Computer Security Associates / IEEE et al. | 1994
- 12
-
Security Concerns for Distributed SystemsDobry, R. / Schanken, M. / Aerospace Computer Security Associates / IEEE et al. | 1994
- 21
-
Security for the Common Object Request Broker Architecture (CORBA)Chapin, S. / Herndon, W. / Notargiacomo, L. / Katz, M. / Aerospace Computer Security Associates / IEEE et al. | 1994
- 34
-
Composing System Integrity Using I/O AutomataAmoroso, E. / Merritt, M. / Aerospace Computer Security Associates / IEEE et al. | 1994
- 44
-
Applying the Abadi-Lamport Composition Theorem in Real-World Secure System Integration EnvironmentsHemenway, J. / Fellows, J. / Aerospace Computer Security Associates / IEEE et al. | 1994
- 54
-
Role-Based Access Control: A Multi-Dimensional ViewSandhu, R. / Coyne, E. / Feinstein, H. / Youman, C. / Aerospace Computer Security Associates / IEEE et al. | 1994
- 67
-
Secure System Composition: Five Practical InitiativesKing, G. / Aerospace Computer Security Associates / IEEE et al. | 1994
- 76
-
Architectural Impact on Performance of a Multilevel Database SystemKang, M. / Froscher, J. / Mukkamala, R. / Aerospace Computer Security Associates / IEEE et al. | 1994
- 86
-
Benchmarking Multilevel Secure Database Systems Using the MITRE BenchmarkDoshi, V. / Herndon, W. / Jajodia, S. / McCollum, C. / Aerospace Computer Security Associates / IEEE et al. | 1994
- 96
-
Organizing MLS Databases from a Data Modeling Point of ViewPernul, G. / Quirchmayr, G. / Aerospace Computer Security Associates / IEEE et al. | 1994
- 96
-
Organizing MLS databases from a data modelling point of viewPernul, G. / Quirchmayr, G. et al. | 1994
- 108
-
A Practical Approach to User AuthenticationBrown, M. / Rogers, S. / Aerospace Computer Security Associates / IEEE et al. | 1994
- 117
-
Audit Reduction and Misuse Detection in Heterogeneous Environments: Framework and ApplicationProctor, P. / Aerospace Computer Security Associates / IEEE et al. | 1994
- 126
-
The Design of an Audit Trail Analysis ToolFisch, E. / White, G. / Pooch, U. / Aerospace Computer Security Associates / IEEE et al. | 1994
- 134
-
Automated Detection of Vulnerabilities in Privileged Programs by Execution MonitoringKo, C. / Fink, G. / Levitt, K. / Aerospace Computer Security Associates / IEEE et al. | 1994
- 145
-
Networked Information Discovery and Retrieval Tools: Security Capabilities and NeedsSchaefer, L. / McKenney, B. / Aerospace Computer Security Associates / IEEE et al. | 1994
- 154
-
Property-based Testing of Privileged ProgramsFink, G. / Levitt, K. / Aerospace Computer Security Associates / IEEE et al. | 1994
- 170
-
STU-III - Multilevel Secure Computer InterfaceMyers, E. / Aerospace Computer Security Associates / IEEE et al. | 1994
- 180
-
A Prototype Multilevel-Secure DoD DirectoryBoucher, P. / Lunt, T. / Aerospace Computer Security Associates / IEEE et al. | 1994
- 189
-
A validated security policy modelling approachFreeman, J.W. / Neely, R.B. / Heckard, M.A. et al. | 1994
- 189
-
A Validated Security Policy Modeling ApproachFreeman, J. / Neely, R. / Heckard, M. / Aerospace Computer Security Associates / IEEE et al. | 1994
- 202
-
A Secure E-Mail Gateway (Building an RCAS External Interface)Smith, R. / Aerospace Computer Security Associates / IEEE et al. | 1994
- 212
-
The MITRE Security PerimeterGoldberg, D. / Aerospace Computer Security Associates / IEEE et al. | 1994
- 219
-
EINet: A Secure, Open Network for Electronic CommerceRosenthal, D. / Aerospace Computer Security Associates / IEEE et al. | 1994
- 228
-
System-of-Systems Security EngineeringBodeau, D. / Aerospace Computer Security Associates / IEEE et al. | 1994
- 236
-
AOS: An Avionics Operating System for Multi-level Secure Real-Time EnvironmentsBernstein, M. / Kim, C. / Aerospace Computer Security Associates / IEEE et al. | 1994
- 246
-
The Effects of Trusted Technology on Distributed ApplicationsJoyce, M. / Aerospace Computer Security Associates / IEEE et al. | 1994
- 258
-
Availability: theory and fundamentals for practical evaluation and useKeus, K.J. / Ullmann, H. et al. | 1994
- 265
-
A Central and Up-to-Date User Requirement in IT SecurityKeus, K. / Ullmann, M. / Aerospace Computer Security Associates / IEEE et al. | 1994
- 268
-
Ops/Intel Interface Lessons Learned: The Integrator's PerspectiveArndt, K. / Burgoon, M. / Firey, J. / Rodenhausen, K. / Aerospace Computer Security Associates / IEEE et al. | 1994
- 278
-
Using Security Models to Investigate CMW Design and ImplementationRobinson, C. / Wiseman, S. / Aerospace Computer Security Associates / IEEE et al. | 1994
- 288
-
Performance Analysis of a Method for High Level Prevention of Traffic Analysis Using Measurements from a Campus NetworkVenkatraman, B. / Newman-Wolfe, R. / Aerospace Computer Security Associates / IEEE et al. | 1994
- 304
-
Where We Stand in Multilevel Security (MLS): Requirements, Approaches, Issues, and Lessons LearnedNeugent, B. / Aerospace Computer Security Associates / IEEE et al. | 1994
- 306
-
Why Bad Things Happen to Good Systems, and What to Do About ItKahn, J. / Abrams, M. / Aerospace Computer Security Associates / IEEE et al. | 1994
- 308
-
A View of Cryptography in TCSEC ProductsEpstein, J. / Aerospace Computer Security Associates / IEEE et al. | 1994