The development and proof of a formal specification for a multilevel secure system
ACM Transactions on Computer Systems (TOCS)
Firewalls and Internet security: repelling the wily hacker
Firewalls and Internet security: repelling the wily hacker
Portable run-time support for dynamic object-oriented parallel processing
ACM Transactions on Computer Systems (TOCS)
The multipolicy paradigm for trusted systems
NSPW '92-93 Proceedings on the 1992-1993 workshop on New security paradigms
Formal Models for Computer Security
ACM Computing Surveys (CSUR)
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
A lattice model of secure information flow
Communications of the ACM
Protection and the control of information sharing in multics
Communications of the ACM
Dynamic, Object-Oriented Parallel Processing
IEEE Parallel & Distributed Technology: Systems & Technology
Computer
A Distributed Key Generation Technique
A Distributed Key Generation Technique
Legion: The Next Logical Step Toward a Nationwide Virtual Computer
Legion: The Next Logical Step Toward a Nationwide Virtual Computer
The DGSA: unmet information security challenges for operating system designers
ACM SIGOPS Operating Systems Review
A practical approach to security assessment
NSPW '97 Proceedings of the 1997 workshop on New security paradigms
Meta objects for access control: extending capability-based security
NSPW '97 Proceedings of the 1997 workshop on New security paradigms
NSPW '96 Proceedings of the 1996 workshop on New security paradigms
Meta objects for access control: a formal model for role-based principals
Proceedings of the 1998 workshop on New security paradigms
Embedding security policies into a distributed computing environment
ACM SIGOPS Operating Systems Review
Hi-index | 0.01 |