Computational mail as network infrastructure for computer-supported cooperative work
CSCW '92 Proceedings of the 1992 ACM conference on Computer-supported cooperative work
Authentication in the Taos operating system
ACM Transactions on Computer Systems (TOCS) - Special issue on operating systems principles
Support for the file system security requirements of computational E-mail systems
CCS '94 Proceedings of the 2nd ACM Conference on Computer and communications security
NSPW '96 Proceedings of the 1996 workshop on New security paradigms
A Flexible Security System for Using Internet Content
IEEE Software
Results of the IFIP WG 11.3 Workshop on Database Security V: Status and Prospects
EMail With A Mind of Its Own: The Safe-Tcl Language for Enabled Mail
Proceedings of the IFIP TC6/WG6.5 International Conference on Upper Layer Protocols, Architectures and Applications
New security architectural directions for Java
COMPCON '97 Proceedings of the 42nd IEEE International Computer Conference
Specifying security for CSCW systems
CSFW '95 Proceedings of the 8th IEEE workshop on Computer Security Foundations
Implementation of a discretionary access control model for script-based systems
CSFW '95 Proceedings of the 8th IEEE workshop on Computer Security Foundations
Practical Domain and Type Enforcement for UNIX
SP '95 Proceedings of the 1995 IEEE Symposium on Security and Privacy
Flexible control of downloaded executable content
Flexible control of downloaded executable content
Safe Tcl: a toolbox for constructing electronic meeting places
WOEC'95 Proceedings of the 1st conference on USENIX Workshop on Electronic Commerce - Volume 1
TRON: process-specific file protection for the UNIX operating system
TCON'95 Proceedings of the USENIX 1995 Technical Conference Proceedings
A secure environment for untrusted helper applications confining the Wily Hacker
SSYM'96 Proceedings of the 6th conference on USENIX Security Symposium, Focusing on Applications of Cryptography - Volume 6
Building systems that flexibly control downloaded executable context
SSYM'96 Proceedings of the 6th conference on USENIX Security Symposium, Focusing on Applications of Cryptography - Volume 6
Flexible control of downloaded executable content
ACM Transactions on Information and System Security (TISSEC)
Security architecture for component-based operating systems
Proceedings of the 8th ACM SIGOPS European workshop on Support for composing distributed applications
RBAC '00 Proceedings of the fifth ACM workshop on Role-based access control
Operating system protection for fine-grained programs
SSYM'98 Proceedings of the 7th conference on USENIX Security Symposium - Volume 7
Injecting a permission-based delegation model to secure web-based workflow systems
ISI'09 Proceedings of the 2009 IEEE international conference on Intelligence and security informatics
Integrating business process modelling and ERP role engineering
International Journal of Business Information Systems
Hi-index | 0.00 |