Benchmarking multilevel secure database systems using the MITRE benchmark (English)
- New search for: Doshi, V.M.
- New search for: Herndon, W.R.
- New search for: Jajodia, S.
- New search for: McCollum, C.D.
- New search for: Doshi, V.M.
- New search for: Herndon, W.R.
- New search for: Jajodia, S.
- New search for: McCollum, C.D.
In:
ACSAC, Annual Computer Security Applications Conference, 10
;
86-95
;
1994
-
ISBN:
- Conference paper / Print
-
Title:Benchmarking multilevel secure database systems using the MITRE benchmark
-
Additional title:Benchmarktest von mehrschichtig sicheren Datenbanksystemen unter Benutzung des MITRE-Benchmark
-
Contributors:Doshi, V.M. ( author ) / Herndon, W.R. ( author ) / Jajodia, S. ( author ) / McCollum, C.D. ( author )
-
Published in:
-
Publisher:
- New search for: IEEE Computer Society Press
-
Place of publication:Los Alamitos, Washington
-
Publication date:1994
-
Size:10 Seiten, 13 Bilder, 4 Tabellen, Quellen
-
ISBN:
-
DOI:
-
Type of media:Conference paper
-
Type of material:Print
-
Language:English
-
Keywords:
-
Source:
Table of contents conference proceedings
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 0_1
-
Tenth Annual Computer Security Applications Conference| 1994
- 2
-
A Practical Approach to High Assurance Multilevel Secure Computing ServiceFroscher, J. / Kang, M. / McDermott, J. / Costich, O. / Aerospace Computer Security Associates / IEEE et al. | 1994
- 12
-
Security Concerns for Distributed SystemsDobry, R. / Schanken, M. / Aerospace Computer Security Associates / IEEE et al. | 1994
- 21
-
Security for the Common Object Request Broker Architecture (CORBA)Chapin, S. / Herndon, W. / Notargiacomo, L. / Katz, M. / Aerospace Computer Security Associates / IEEE et al. | 1994
- 34
-
Composing System Integrity Using I/O AutomataAmoroso, E. / Merritt, M. / Aerospace Computer Security Associates / IEEE et al. | 1994
- 44
-
Applying the Abadi-Lamport Composition Theorem in Real-World Secure System Integration EnvironmentsHemenway, J. / Fellows, J. / Aerospace Computer Security Associates / IEEE et al. | 1994
- 54
-
Role-Based Access Control: A Multi-Dimensional ViewSandhu, R. / Coyne, E. / Feinstein, H. / Youman, C. / Aerospace Computer Security Associates / IEEE et al. | 1994
- 67
-
Secure System Composition: Five Practical InitiativesKing, G. / Aerospace Computer Security Associates / IEEE et al. | 1994
- 76
-
Architectural Impact on Performance of a Multilevel Database SystemKang, M. / Froscher, J. / Mukkamala, R. / Aerospace Computer Security Associates / IEEE et al. | 1994
- 86
-
Benchmarking Multilevel Secure Database Systems Using the MITRE BenchmarkDoshi, V. / Herndon, W. / Jajodia, S. / McCollum, C. / Aerospace Computer Security Associates / IEEE et al. | 1994
- 96
-
Organizing MLS Databases from a Data Modeling Point of ViewPernul, G. / Quirchmayr, G. / Aerospace Computer Security Associates / IEEE et al. | 1994
- 96
-
Organizing MLS databases from a data modelling point of viewPernul, G. / Quirchmayr, G. et al. | 1994
- 108
-
A Practical Approach to User AuthenticationBrown, M. / Rogers, S. / Aerospace Computer Security Associates / IEEE et al. | 1994
- 117
-
Audit Reduction and Misuse Detection in Heterogeneous Environments: Framework and ApplicationProctor, P. / Aerospace Computer Security Associates / IEEE et al. | 1994
- 126
-
The Design of an Audit Trail Analysis ToolFisch, E. / White, G. / Pooch, U. / Aerospace Computer Security Associates / IEEE et al. | 1994
- 134
-
Automated Detection of Vulnerabilities in Privileged Programs by Execution MonitoringKo, C. / Fink, G. / Levitt, K. / Aerospace Computer Security Associates / IEEE et al. | 1994
- 145
-
Networked Information Discovery and Retrieval Tools: Security Capabilities and NeedsSchaefer, L. / McKenney, B. / Aerospace Computer Security Associates / IEEE et al. | 1994
- 154
-
Property-based Testing of Privileged ProgramsFink, G. / Levitt, K. / Aerospace Computer Security Associates / IEEE et al. | 1994
- 170
-
STU-III - Multilevel Secure Computer InterfaceMyers, E. / Aerospace Computer Security Associates / IEEE et al. | 1994
- 180
-
A Prototype Multilevel-Secure DoD DirectoryBoucher, P. / Lunt, T. / Aerospace Computer Security Associates / IEEE et al. | 1994
- 189
-
A validated security policy modelling approachFreeman, J.W. / Neely, R.B. / Heckard, M.A. et al. | 1994
- 189
-
A Validated Security Policy Modeling ApproachFreeman, J. / Neely, R. / Heckard, M. / Aerospace Computer Security Associates / IEEE et al. | 1994
- 202
-
A Secure E-Mail Gateway (Building an RCAS External Interface)Smith, R. / Aerospace Computer Security Associates / IEEE et al. | 1994
- 212
-
The MITRE Security PerimeterGoldberg, D. / Aerospace Computer Security Associates / IEEE et al. | 1994
- 219
-
EINet: A Secure, Open Network for Electronic CommerceRosenthal, D. / Aerospace Computer Security Associates / IEEE et al. | 1994
- 228
-
System-of-Systems Security EngineeringBodeau, D. / Aerospace Computer Security Associates / IEEE et al. | 1994
- 236
-
AOS: An Avionics Operating System for Multi-level Secure Real-Time EnvironmentsBernstein, M. / Kim, C. / Aerospace Computer Security Associates / IEEE et al. | 1994
- 246
-
The Effects of Trusted Technology on Distributed ApplicationsJoyce, M. / Aerospace Computer Security Associates / IEEE et al. | 1994
- 258
-
Availability: theory and fundamentals for practical evaluation and useKeus, K.J. / Ullmann, H. et al. | 1994
- 265
-
A Central and Up-to-Date User Requirement in IT SecurityKeus, K. / Ullmann, M. / Aerospace Computer Security Associates / IEEE et al. | 1994
- 268
-
Ops/Intel Interface Lessons Learned: The Integrator's PerspectiveArndt, K. / Burgoon, M. / Firey, J. / Rodenhausen, K. / Aerospace Computer Security Associates / IEEE et al. | 1994
- 278
-
Using Security Models to Investigate CMW Design and ImplementationRobinson, C. / Wiseman, S. / Aerospace Computer Security Associates / IEEE et al. | 1994
- 288
-
Performance Analysis of a Method for High Level Prevention of Traffic Analysis Using Measurements from a Campus NetworkVenkatraman, B. / Newman-Wolfe, R. / Aerospace Computer Security Associates / IEEE et al. | 1994
- 304
-
Where We Stand in Multilevel Security (MLS): Requirements, Approaches, Issues, and Lessons LearnedNeugent, B. / Aerospace Computer Security Associates / IEEE et al. | 1994
- 306
-
Why Bad Things Happen to Good Systems, and What to Do About ItKahn, J. / Abrams, M. / Aerospace Computer Security Associates / IEEE et al. | 1994
- 308
-
A View of Cryptography in TCSEC ProductsEpstein, J. / Aerospace Computer Security Associates / IEEE et al. | 1994