ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Tenth Annual Computer Security Applications Conference
Latest Publications
TOTAL DOCUMENTS
33
(FIVE YEARS 0)
H-INDEX
6
(FIVE YEARS 0)
Published By IEEE
0818667958
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
Applying the Abadi-Lamport composition theorem in real-world secure system integration environments
Tenth Annual Computer Security Applications Conference
◽
10.1109/csac.1994.367294
◽
2002
◽
Cited By ~ 1
Author(s):
J.A. Hemenway
◽
J. Fellows
Keyword(s):
Real World
◽
System Integration
◽
Composition Theorem
Download Full-text
STU-III-multilevel secure computer interface
Tenth Annual Computer Security Applications Conference
◽
10.1109/csac.1994.367310
◽
2002
◽
Cited By ~ 2
Author(s):
E.D. Myers
Keyword(s):
Computer Interface
Download Full-text
The effects of trusted technology on distributed applications
Tenth Annual Computer Security Applications Conference
◽
10.1109/csac.1994.367302
◽
2002
◽
Author(s):
M.V. Joyce
Keyword(s):
Distributed Applications
Download Full-text
System-of-systems security engineering
Tenth Annual Computer Security Applications Conference
◽
10.1109/csac.1994.367304
◽
2002
◽
Cited By ~ 12
Author(s):
D.J. Bodeau
Keyword(s):
System Of Systems
◽
Security Engineering
◽
Systems Security
◽
Systems Security Engineering
Download Full-text
A practical approach to user authentication
Tenth Annual Computer Security Applications Conference
◽
10.1109/csac.1994.367316
◽
2002
◽
Cited By ~ 6
Author(s):
M. Brown
◽
S.J. Rogers
Keyword(s):
User Authentication
◽
Practical Approach
Download Full-text
Availability: theory and fundamentals for practical evaluation and use
Tenth Annual Computer Security Applications Conference
◽
10.1109/csac.1994.367301
◽
2002
◽
Cited By ~ 1
Author(s):
K.J. Keus
◽
M. Ullmann
Keyword(s):
Practical Evaluation
Download Full-text
The MITRE security perimeter
Tenth Annual Computer Security Applications Conference
◽
10.1109/csac.1994.367306
◽
2002
◽
Author(s):
D.S. Goldberg
Download Full-text
Ops/Intel interface lessons learned: the integrator's perspective
Tenth Annual Computer Security Applications Conference
◽
10.1109/csac.1994.367300
◽
2002
◽
Cited By ~ 3
Author(s):
K. Arndt
◽
M. Burgoon
◽
J. Firey
◽
K. Rodenhausen
Keyword(s):
Lessons Learned
Download Full-text
Role-based access control: a multi-dimensional view
Tenth Annual Computer Security Applications Conference
◽
10.1109/csac.1994.367293
◽
2002
◽
Cited By ~ 24
Author(s):
R.S. Sandhu
◽
E.J. Coyne
◽
H.L. Feinstein
◽
C.E. Youman
Keyword(s):
Access Control
◽
Role Based Access Control
◽
Role Based
Download Full-text
Using security models to investigate CMW design and implementation
Tenth Annual Computer Security Applications Conference
◽
10.1109/csac.1994.367299
◽
2002
◽
Author(s):
C.L. Robinson
◽
S.R. Wiseman
Keyword(s):
Design And Implementation
◽
Security Models
Download Full-text
Load More ...
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close