Access control by Boolean expression evaluation (Englisch)
- Neue Suche nach: Miller, D.V.
- Neue Suche nach: Baldwin, R.W.
- Neue Suche nach: Miller, D.V.
- Neue Suche nach: Baldwin, R.W.
In:
Fifth Annual Computer Security Applications Conference
;
131-139
;
1990
-
ISBN:
- Aufsatz (Konferenz) / Print
-
Titel:Access control by Boolean expression evaluation
-
Weitere Titelangaben:Zugriffskontrolle durch Bewertung boolescher Ausdrücke
-
Beteiligte:Miller, D.V. ( Autor:in ) / Baldwin, R.W. ( Autor:in )
-
Erschienen in:
-
Verlag:
- Neue Suche nach: IEEE Comput. Soc. Press
-
Erscheinungsort:Los Alamitos
-
Erscheinungsdatum:1990
-
Format / Umfang:9 Seiten, 12 Quellen
-
ISBN:
-
DOI:
-
Medientyp:Aufsatz (Konferenz)
-
Format:Print
-
Sprache:Englisch
-
Schlagwörter:
-
Datenquelle:
Inhaltsverzeichnis Konferenzband
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 0_1
-
Fifth Annual Computer Security Applications Conference (Cat. No.89TH0287-3)| 1989
- 4
-
A structured risk analysis approach to resolve the data protection and integrity issues for computer-aided acquisition logistics support (CALS)Gove, R.A. / Friedman, A.R. et al. | 1990
- 6
-
Electronic information security in a digital environmentDavis, R.M. et al. | 1990
- 10
-
The CALS Data Protection and Integrity Industry Working GroupKarp, B.C. et al. | 1990
- 12
-
Data protection requirements in computer-aided acquisition and logistic supportGorham, W.C. jun. et al. | 1990
- 16
-
Human issuesReynolds, S.J. / Grove, T.P. jun. / Parringin, J.N. et al. | 1990
- 20
-
Implementing sensitive but unclassified security, today-a workshop proposalLang, R. et al. | 1990
- 27
-
A security standard for LANsKirkpatrick, M.E. et al. | 1990
- 28
-
End-to-end encryption at the network layerNelson, R. et al. | 1990
- 29
-
Electronic messaging security: a comparison of three approachesHousley, R. et al. | 1990
- 32
-
The role of vulnerability in risk managementOtwell, K. / Aldridge, B. et al. | 1990
- 39
-
Intrusion and anomaly detection in trusted systemsWinkler, J.R. / Page, W.J. et al. | 1990
- 46
-
A model of security monitoringBishop, M. et al. | 1990
- 53
-
An approach for evaluating the security of an Air Force type networkWoodfield, N.K. et al. | 1990
- 64
-
Security standards for open systemsHumphreys, E.J. / Ford, W. / Stirland, M. / Parker, T. et al. | 1990
- 70
-
Protection of call detail records data in federal telecommunicationsChokhani, S. et al. | 1990
- 78
-
Security audit for embedded avionics systemsRao, K.N. et al. | 1990
- 86
-
Development of a multi level data generation application for GEMSOSSchallenmuller, E.R. / Cramer, R.P. / Aldridge, B.T. et al. | 1990
- 91
-
Designing a trusted client-server distributed networkMigues, S. / Housley, R. et al. | 1990
- 95
-
The security policy of the secure distributed operating system prototypeProctor, N. / Wong, R. et al. | 1990
- 104
-
Does TCB subsetting enhance trust?Feiertag, R.J. et al. | 1990
- 105
-
Considerations on TCB subsettingWinkler-Parenty, H.B. et al. | 1990
- 107
-
TCB subset architectureVetter, L.L. et al. | 1990
- 110
-
Gemini developers: facts, myths, and war storiesGambel, D. et al. | 1990
- 114
-
Process execution controls as a mechanism to ensure consistencyBacic, E.M. et al. | 1990
- 121
-
Architectural support of fine-grained secure computingBondi, J.O. / Branstad, M.A. et al. | 1990
- 131
-
Access control by Boolean expression evaluationMiller, D.V. / Baldwin, R.W. et al. | 1990
- 142
-
Assessment of security requirements for sensitive systemsBrown, N. et al. | 1990
- 143
-
Challenges faced today by computer security practitionersReese, L.F. et al. | 1990
- 144
-
ADP security within the Customs ServiceGreen, W. et al. | 1990
- 148
-
Software methodology for development of a trusted BMS: identification of critical problemsCrocker, S.D. / Siarkiewicz, E.J. et al. | 1990
- 166
-
Developing trusted systems using DOD-STD-2167ABenzel, T.C.V. et al. | 1990
- 177
-
Security issues and Ada runtime supportHarrison, L.J. et al. | 1990
- 184
-
A risk driven process model for the development of trusted systemsMarmor-Squires, A. / McHugh, J. / Branstad, M. / Danner, B. / Nagy, L. / Rougeau, P. / Sterne, D. et al. | 1990
- 196
-
Issues in distributed database securityDowning, A.R. / Greenberg, I.B. / Lunt, T.F. et al. | 1990
- 204
-
Secure query processing in intelligent database management systemsThuraisingham, M.B. et al. | 1990
- 216
-
TCB subsets: the next stepVetter, L. / Smith, G. / Lunt, T.F. et al. | 1990
- 222
-
Multi-party conflict: the problem and its solutionsKeefe, T.F. / Thomsen, D.J. / Tsai, W.T. / Hansch, M.R. et al. | 1990
- 234
-
Network authentication tokensDavis, R. et al. | 1990
- 239
-
A survey of commercially available secure LAN productsKing, G. et al. | 1990
- 248
-
Applying the TNI to system certification and accreditationNiemeyer, R.E. et al. | 1990
- 254
-
An extended cryptographic key generation scheme for multilevel data securityLein Harn / Yaw-Ruey Chien / Kiesler, T. et al. | 1990
- 263
-
Two new efficient cryptosystems based on Rabin's scheme: alternatives to RSA cryptosystemHarn, L. / Kiesler, T. et al. | 1990
- 271
-
Evaluation issues for an integrated 'INFOSEC' productMayer, F.L. / Barker, W.C. / Haley, T.K. / McAuliffe, J.N. / Sterne, D.F. / Vidmar, L.S. et al. | 1990
- 279
-
A perspective on integrity mechanismsSandhu, R. et al. | 1990
- 280
-
Integrity panel position paperJohnson, H.L. et al. | 1990
- 282
-
Chinese wall security policy-an aggressive modelLin, T.Y. et al. | 1990
- 290
-
Security model consistency in secure object-oriented systemsKeefe, T.F. / Tsai, W.T. et al. | 1990
- 299
-
Security model development environmentHeaney, J. / Adkins, M. / Dolsen, G. / Page, J. et al. | 1990
- 310
-
Report from the second RADC database security workshopLunt, T.F. et al. | 1990
- 314
-
Multilevel secure database design: a practical applicationSmith, G.W. et al. | 1990
- 322
-
A summary of the LDV solution to the homework problemStachour, P. / Thomsen, D. et al. | 1990
- 323
-
Secure database design panelHinke, T.H. et al. | 1990
- 324
-
RADC database security workshop oracle corporation homework problem solutionMaimone, B. et al. | 1990
- 325
-
Secure database design: an implementation using a secure DBMSSturms, E.D. et al. | 1990
- 328
-
Security approach for rapid prototyping in multilevel secure systemsAshby, V.A. / Gregg, T. / Lee, A. et al. | 1990
- 335
-
The trusted server approach to multilevel securityHinke, T.H. et al. | 1990
- 344
-
Use of privacy-enhanced mail for software distributionBarker, W.C. et al. | 1990
- 348
-
Secure automated document deliveryCasey, T. / Roe, M. / Tuck, B. / Wilbur, S. et al. | 1990