Access control by Boolean expression evaluation (English)
- New search for: Miller, D.V.
- New search for: Baldwin, R.W.
- New search for: Miller, D.V.
- New search for: Baldwin, R.W.
In:
Fifth Annual Computer Security Applications Conference
;
131-139
;
1990
-
ISBN:
- Conference paper / Print
-
Title:Access control by Boolean expression evaluation
-
Additional title:Zugriffskontrolle durch Bewertung boolescher Ausdrücke
-
Contributors:Miller, D.V. ( author ) / Baldwin, R.W. ( author )
-
Published in:
-
Publisher:
- New search for: IEEE Comput. Soc. Press
-
Place of publication:Los Alamitos
-
Publication date:1990
-
Size:9 Seiten, 12 Quellen
-
ISBN:
-
DOI:
-
Type of media:Conference paper
-
Type of material:Print
-
Language:English
-
Keywords:
-
Source:
Table of contents conference proceedings
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 0_1
-
Fifth Annual Computer Security Applications Conference (Cat. No.89TH0287-3)| 1989
- 4
-
A structured risk analysis approach to resolve the data protection and integrity issues for computer-aided acquisition logistics support (CALS)Gove, R.A. / Friedman, A.R. et al. | 1990
- 6
-
Electronic information security in a digital environmentDavis, R.M. et al. | 1990
- 10
-
The CALS Data Protection and Integrity Industry Working GroupKarp, B.C. et al. | 1990
- 12
-
Data protection requirements in computer-aided acquisition and logistic supportGorham, W.C. jun. et al. | 1990
- 16
-
Human issuesReynolds, S.J. / Grove, T.P. jun. / Parringin, J.N. et al. | 1990
- 20
-
Implementing sensitive but unclassified security, today-a workshop proposalLang, R. et al. | 1990
- 27
-
A security standard for LANsKirkpatrick, M.E. et al. | 1990
- 28
-
End-to-end encryption at the network layerNelson, R. et al. | 1990
- 29
-
Electronic messaging security: a comparison of three approachesHousley, R. et al. | 1990
- 32
-
The role of vulnerability in risk managementOtwell, K. / Aldridge, B. et al. | 1990
- 39
-
Intrusion and anomaly detection in trusted systemsWinkler, J.R. / Page, W.J. et al. | 1990
- 46
-
A model of security monitoringBishop, M. et al. | 1990
- 53
-
An approach for evaluating the security of an Air Force type networkWoodfield, N.K. et al. | 1990
- 64
-
Security standards for open systemsHumphreys, E.J. / Ford, W. / Stirland, M. / Parker, T. et al. | 1990
- 70
-
Protection of call detail records data in federal telecommunicationsChokhani, S. et al. | 1990
- 78
-
Security audit for embedded avionics systemsRao, K.N. et al. | 1990
- 86
-
Development of a multi level data generation application for GEMSOSSchallenmuller, E.R. / Cramer, R.P. / Aldridge, B.T. et al. | 1990
- 91
-
Designing a trusted client-server distributed networkMigues, S. / Housley, R. et al. | 1990
- 95
-
The security policy of the secure distributed operating system prototypeProctor, N. / Wong, R. et al. | 1990
- 104
-
Does TCB subsetting enhance trust?Feiertag, R.J. et al. | 1990
- 105
-
Considerations on TCB subsettingWinkler-Parenty, H.B. et al. | 1990
- 107
-
TCB subset architectureVetter, L.L. et al. | 1990
- 110
-
Gemini developers: facts, myths, and war storiesGambel, D. et al. | 1990
- 114
-
Process execution controls as a mechanism to ensure consistencyBacic, E.M. et al. | 1990
- 121
-
Architectural support of fine-grained secure computingBondi, J.O. / Branstad, M.A. et al. | 1990
- 131
-
Access control by Boolean expression evaluationMiller, D.V. / Baldwin, R.W. et al. | 1990
- 142
-
Assessment of security requirements for sensitive systemsBrown, N. et al. | 1990
- 143
-
Challenges faced today by computer security practitionersReese, L.F. et al. | 1990
- 144
-
ADP security within the Customs ServiceGreen, W. et al. | 1990
- 148
-
Software methodology for development of a trusted BMS: identification of critical problemsCrocker, S.D. / Siarkiewicz, E.J. et al. | 1990
- 166
-
Developing trusted systems using DOD-STD-2167ABenzel, T.C.V. et al. | 1990
- 177
-
Security issues and Ada runtime supportHarrison, L.J. et al. | 1990
- 184
-
A risk driven process model for the development of trusted systemsMarmor-Squires, A. / McHugh, J. / Branstad, M. / Danner, B. / Nagy, L. / Rougeau, P. / Sterne, D. et al. | 1990
- 196
-
Issues in distributed database securityDowning, A.R. / Greenberg, I.B. / Lunt, T.F. et al. | 1990
- 204
-
Secure query processing in intelligent database management systemsThuraisingham, M.B. et al. | 1990
- 216
-
TCB subsets: the next stepVetter, L. / Smith, G. / Lunt, T.F. et al. | 1990
- 222
-
Multi-party conflict: the problem and its solutionsKeefe, T.F. / Thomsen, D.J. / Tsai, W.T. / Hansch, M.R. et al. | 1990
- 234
-
Network authentication tokensDavis, R. et al. | 1990
- 239
-
A survey of commercially available secure LAN productsKing, G. et al. | 1990
- 248
-
Applying the TNI to system certification and accreditationNiemeyer, R.E. et al. | 1990
- 254
-
An extended cryptographic key generation scheme for multilevel data securityLein Harn / Yaw-Ruey Chien / Kiesler, T. et al. | 1990
- 263
-
Two new efficient cryptosystems based on Rabin's scheme: alternatives to RSA cryptosystemHarn, L. / Kiesler, T. et al. | 1990
- 271
-
Evaluation issues for an integrated 'INFOSEC' productMayer, F.L. / Barker, W.C. / Haley, T.K. / McAuliffe, J.N. / Sterne, D.F. / Vidmar, L.S. et al. | 1990
- 279
-
A perspective on integrity mechanismsSandhu, R. et al. | 1990
- 280
-
Integrity panel position paperJohnson, H.L. et al. | 1990
- 282
-
Chinese wall security policy-an aggressive modelLin, T.Y. et al. | 1990
- 290
-
Security model consistency in secure object-oriented systemsKeefe, T.F. / Tsai, W.T. et al. | 1990
- 299
-
Security model development environmentHeaney, J. / Adkins, M. / Dolsen, G. / Page, J. et al. | 1990
- 310
-
Report from the second RADC database security workshopLunt, T.F. et al. | 1990
- 314
-
Multilevel secure database design: a practical applicationSmith, G.W. et al. | 1990
- 322
-
A summary of the LDV solution to the homework problemStachour, P. / Thomsen, D. et al. | 1990
- 323
-
Secure database design panelHinke, T.H. et al. | 1990
- 324
-
RADC database security workshop oracle corporation homework problem solutionMaimone, B. et al. | 1990
- 325
-
Secure database design: an implementation using a secure DBMSSturms, E.D. et al. | 1990
- 328
-
Security approach for rapid prototyping in multilevel secure systemsAshby, V.A. / Gregg, T. / Lee, A. et al. | 1990
- 335
-
The trusted server approach to multilevel securityHinke, T.H. et al. | 1990
- 344
-
Use of privacy-enhanced mail for software distributionBarker, W.C. et al. | 1990
- 348
-
Secure automated document deliveryCasey, T. / Roe, M. / Tuck, B. / Wilbur, S. et al. | 1990