ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
[1992] Proceedings Eighth Annual Computer Security Application Conference
Latest Publications
TOTAL DOCUMENTS
25
(FIVE YEARS 0)
H-INDEX
8
(FIVE YEARS 0)
Published By IEEE Comput. Soc. Press
0818631155
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
A cautionary note on image downgrading
[1992] Proceedings Eighth Annual Computer Security Application Conference
◽
10.1109/csac.1992.228224
◽
2003
◽
Cited By ~ 37
Author(s):
C. Kurak
◽
J. McHugh
Keyword(s):
Cautionary Note
Download Full-text
Providing security in a phone book database using triggers
[1992] Proceedings Eighth Annual Computer Security Application Conference
◽
10.1109/csac.1992.228230
◽
2003
◽
Author(s):
S.T. Lewis
◽
S.R. Wiseman
◽
N.D. Poulter
Keyword(s):
Phone Book
Download Full-text
Performance analysis of a method for high level prevention of traffic analysis
[1992] Proceedings Eighth Annual Computer Security Application Conference
◽
10.1109/csac.1992.228227
◽
2003
◽
Cited By ~ 14
Author(s):
R.E. Newman-Wolfe
◽
B.R. Venkatraman
Keyword(s):
Performance Analysis
◽
Traffic Analysis
◽
High Level
Download Full-text
Paradigms for verification of authorization at source of electronic documents in an integrated environment
[1992] Proceedings Eighth Annual Computer Security Application Conference
◽
10.1109/csac.1992.228219
◽
2003
◽
Cited By ~ 2
Author(s):
S. Russell
Keyword(s):
Electronic Documents
◽
Integrated Environment
Download Full-text
An overview of the AMC WWMCCS CAT Guard
[1992] Proceedings Eighth Annual Computer Security Application Conference
◽
10.1109/csac.1992.228234
◽
2003
◽
Cited By ~ 1
Author(s):
R.A. Vick
Download Full-text
Security Products (Security Pro) Transition Analysis Facility (STAF): Pragmatic concepts for MLS technology transition
[1992] Proceedings Eighth Annual Computer Security Application Conference
◽
10.1109/csac.1992.228237
◽
2003
◽
Cited By ~ 1
Author(s):
C. Arangio
◽
T. Chen
◽
S. Neidhardt
Keyword(s):
Transition Analysis
◽
Technology Transition
Download Full-text
Standards for computer systems security: An interoperability analysis of SDNS SP3 and ISO NLSP
[1992] Proceedings Eighth Annual Computer Security Application Conference
◽
10.1109/csac.1992.228220
◽
2003
◽
Author(s):
W.D. Maughan
Keyword(s):
Computer Systems
◽
Systems Security
Download Full-text
Security test and evaluation for multilevel-mode accreditation: Lessons learned
[1992] Proceedings Eighth Annual Computer Security Application Conference
◽
10.1109/csac.1992.228235
◽
2003
◽
Cited By ~ 1
Author(s):
D.J. Bodeau
◽
N.R. Brusil
◽
I.N. Chang
◽
M.J. Reece
Keyword(s):
Lessons Learned
◽
Test And Evaluation
◽
Security Test
Download Full-text
Security constraint processing during multilevel secure database design
[1992] Proceedings Eighth Annual Computer Security Application Conference
◽
10.1109/csac.1992.228231
◽
2003
◽
Cited By ~ 9
Author(s):
G. Pernul
Keyword(s):
Database Design
◽
Constraint Processing
◽
Security Constraint
Download Full-text
Implementing transaction control expressions by checking for absence of access rights
[1992] Proceedings Eighth Annual Computer Security Application Conference
◽
10.1109/csac.1992.228226
◽
2003
◽
Cited By ~ 7
Author(s):
P.E. Ammann
◽
R.S. Sandhu
Keyword(s):
Access Rights
Download Full-text
Load More ...
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close