A security model for military message systems
ACM Transactions on Computer Systems (TOCS)
Miro: Visual Specification of Security
IEEE Transactions on Software Engineering
A new security policy for distributed resource management and access control
NSPW '96 Proceedings of the 1996 workshop on New security paradigms
Discussion topic: what is the old security paradigm?
Proceedings of the 1998 workshop on New security paradigms
Mathematics, Technology, and Trust: Formal Verification, Computer Security, and the U.S. Military
IEEE Annals of the History of Computing
Mathematical Models of Computer Security
FOSAD '00 Revised versions of lectures given during the IFIP WG 1.7 International School on Foundations of Security Analysis and Design on Foundations of Security Analysis and Design: Tutorial Lectures
The Role of the Development Process in Operating System Security
ISW '00 Proceedings of the Third International Workshop on Information Security
Action Systems for Security Specification
CSFW '96 Proceedings of the 9th IEEE workshop on Computer Security Foundations
Basic Concepts and Taxonomy of Dependable and Secure Computing
IEEE Transactions on Dependable and Secure Computing
NETRA:: seeing through access control
Proceedings of the fourth ACM workshop on Formal methods in security
A high assurance MLS file server
ACM SIGOPS Operating Systems Review
A formalism for visual security protocol modeling
Journal of Visual Languages and Computing
The epistemology of computer security
ACM SIGSOFT Software Engineering Notes
Improved multilevel security with latent semantic indexing
Expert Systems with Applications: An International Journal
Enforcing confidentiality in relational databases by reducing inference control to access control
ISC'07 Proceedings of the 10th international conference on Information Security
Hi-index | 0.89 |