ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
[1989 Proceedings] Fifth Annual Computer Security Applications Conference
Latest Publications
TOTAL DOCUMENTS
62
(FIVE YEARS 0)
H-INDEX
4
(FIVE YEARS 0)
Published By IEEE Comput. Soc. Press
0818620064
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
An approach for evaluating the security of an Air Force type network
[1989 Proceedings] Fifth Annual Computer Security Applications Conference
◽
10.1109/csac.1989.81025
◽
2003
◽
Author(s):
N.K. Woodfield
Keyword(s):
Air Force
Download Full-text
A model of security monitoring
[1989 Proceedings] Fifth Annual Computer Security Applications Conference
◽
10.1109/csac.1989.81024
◽
2003
◽
Cited By ~ 2
Author(s):
M. Bishop
Keyword(s):
Security Monitoring
Download Full-text
A summary of the LDV solution to the homework problem
[1989 Proceedings] Fifth Annual Computer Security Applications Conference
◽
10.1109/csac.1989.81069
◽
2003
◽
Author(s):
P. Stachour
◽
D. Thomsen
Keyword(s):
Homework Problem
Download Full-text
Security approach for rapid prototyping in multilevel secure systems
[1989 Proceedings] Fifth Annual Computer Security Applications Conference
◽
10.1109/csac.1989.81073
◽
2003
◽
Author(s):
V.A. Ashby
◽
T. Gregg
◽
A. Lee
Keyword(s):
Rapid Prototyping
◽
Secure Systems
Download Full-text
Electronic information security in a digital environment
[1989 Proceedings] Fifth Annual Computer Security Applications Conference
◽
10.1109/csac.1989.81013
◽
2003
◽
Author(s):
R.M. Davis
Keyword(s):
Information Security
◽
Digital Environment
◽
Electronic Information
Download Full-text
Use of privacy-enhanced mail for software distribution
[1989 Proceedings] Fifth Annual Computer Security Applications Conference
◽
10.1109/csac.1989.81075
◽
2003
◽
Author(s):
W.C. Barker
Keyword(s):
Software Distribution
Download Full-text
RADC database security workshop oracle corporation homework problem solution
[1989 Proceedings] Fifth Annual Computer Security Applications Conference
◽
10.1109/csac.1989.81071
◽
2003
◽
Author(s):
B. Maimone
Keyword(s):
Database Security
◽
Problem Solution
◽
Homework Problem
Download Full-text
Secure database design panel
[1989 Proceedings] Fifth Annual Computer Security Applications Conference
◽
10.1109/csac.1989.81070
◽
2003
◽
Author(s):
T.H. Hinke
Keyword(s):
Database Design
Download Full-text
Secure database design: an implementation using a secure DBMS
[1989 Proceedings] Fifth Annual Computer Security Applications Conference
◽
10.1109/csac.1989.81072
◽
2003
◽
Author(s):
E.D. Sturms
Keyword(s):
Database Design
Download Full-text
The trusted server approach to multilevel security
[1989 Proceedings] Fifth Annual Computer Security Applications Conference
◽
10.1109/csac.1989.81074
◽
2003
◽
Cited By ~ 1
Author(s):
T.H. Hinke
Keyword(s):
Multilevel Security
Download Full-text
Load More ...
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close