Secure databases: protection against user influence
ACM Transactions on Database Systems (TODS)
The tracker: a threat to statistical database security
ACM Transactions on Database Systems (TODS)
Linear queries in statistical databases
ACM Transactions on Database Systems (TODS)
A Linear Time Algorithm for Deciding Subject Security
Journal of the ACM (JACM)
Third Generation Computer Systems
ACM Computing Surveys (CSUR)
ACM Computing Surveys (CSUR)
An Axiomatic Approach to Information Flow in Programs
ACM Transactions on Programming Languages and Systems (TOPLAS)
Specification and verification of the UCLA Unix security kernel
Communications of the ACM
A model for verification of data security in operating systems
Communications of the ACM
Certification of programs for secure information flow
Communications of the ACM
A lattice model of secure information flow
Communications of the ACM
Security Kernel validation in practice
Communications of the ACM
Protection in operating systems
Communications of the ACM
A note on the confinement problem
Communications of the ACM
An axiomatic basis for computer programming
Communications of the ACM
The enforcement of security policies for computation
SOSP '75 Proceedings of the fifth ACM symposium on Operating systems principles
The Multics kernel design project
SOSP '77 Proceedings of the sixth ACM symposium on Operating systems principles
Proving multilevel security of a system design
SOSP '77 Proceedings of the sixth ACM symposium on Operating systems principles
Information transmission in computational systems
SOSP '77 Proceedings of the sixth ACM symposium on Operating systems principles
On the synthesis and analysis of protection systems
SOSP '77 Proceedings of the sixth ACM symposium on Operating systems principles
The transfer of information and authority in a protection system
SOSP '79 Proceedings of the seventh ACM symposium on Operating systems principles
A mechanism for information control in parallel systems
SOSP '79 Proceedings of the seventh ACM symposium on Operating systems principles
Structured specification of a Security Kernel
Proceedings of the international conference on Reliable software
A verifiable protection system
Proceedings of the international conference on Reliable software
Implications of a virtual memory mechanism for implementing protection in a family of operating systems
Secure information flow in computer systems.
Secure information flow in computer systems.
Formal verification of the ucla security kernel: abstract model, mapping functions, theorem generation, and proofs.
The multics system: an examination of its structure
The multics system: an examination of its structure
A security model for military message systems
ACM Transactions on Computer Systems (TOCS)
The development and proof of a formal specification for a multilevel secure system
ACM Transactions on Computer Systems (TOCS)
The NTree: a two dimension partial order for protection groups
ACM Transactions on Computer Systems (TOCS)
The schematic protection model: its definition and analysis for acyclic attenuating schemes
Journal of the ACM (JACM)
Formal Verification of Fault Tolerance Using Theorem-Proving Techniques
IEEE Transactions on Computers
Recognizing Immediacy in an N-Tree Hierarchy and its Application to Protection Groups
IEEE Transactions on Software Engineering
A Model for Multilevel Security in Computer Networks
IEEE Transactions on Software Engineering
Concurrency control in multilevel-secure databases based on replicated architecture
SIGMOD '90 Proceedings of the 1990 ACM SIGMOD international conference on Management of data
Toward a multilevel secure relational data model
SIGMOD '91 Proceedings of the 1991 ACM SIGMOD international conference on Management of data
A logic for reasoning about security
ACM Transactions on Computer Systems (TOCS)
Information systems security design methods: implications for information systems development
ACM Computing Surveys (CSUR)
A taxonomy of computer program security flaws
ACM Computing Surveys (CSUR)
Computational Issues in Secure Interoperation
IEEE Transactions on Software Engineering
Software architecture styles as graph grammars
SIGSOFT '96 Proceedings of the 4th ACM SIGSOFT symposium on Foundations of software engineering
Access control in virtual environments
VRST '97 Proceedings of the ACM symposium on Virtual reality software and technology
Programming languages for mobile code
ACM Computing Surveys (CSUR)
Bell and LaPadula axioms: a “new” paradigm for an “old” model
NSPW '92-93 Proceedings on the 1992-1993 workshop on New security paradigms
Formal semantics of confidentiality in multilevel logic databases
NSPW '94 Proceedings of the 1994 workshop on New security paradigms
A new approach to security system development
NSPW '94 Proceedings of the 1994 workshop on New security paradigms
A new model of security for distributed systems
NSPW '96 Proceedings of the 1996 workshop on New security paradigms
An integrated framework for security and dependability
Proceedings of the 1998 workshop on New security paradigms
Security and privacy requirements in computing
ACM '86 Proceedings of 1986 ACM Fall joint computer conference
A modular approach to composing access control policies
Proceedings of the 7th ACM conference on Computer and communications security
An algebra for composing access control policies
ACM Transactions on Information and System Security (TISSEC)
Mathematics, Technology, and Trust: Formal Verification, Computer Security, and the U.S. Military
IEEE Annals of the History of Computing
Enriching the Expressive Power of Security Labels
IEEE Transactions on Knowledge and Data Engineering
A MAC Policy Framework for Multilevel Relational Databases
IEEE Transactions on Knowledge and Data Engineering
A Semantic Framework of the Multilevel Secure Relational Model
IEEE Transactions on Knowledge and Data Engineering
IEEE Transactions on Knowledge and Data Engineering
Describing Software Architecture Styles Using Graph Grammars
IEEE Transactions on Software Engineering
Database Concurrency Control in Multilevel Secure Database Management Systems
IEEE Transactions on Knowledge and Data Engineering
Providing Dynamic Security Control in a Federated Database
VLDB '94 Proceedings of the 20th International Conference on Very Large Data Bases
Access Control: Policies, Models, and Mechanisms
FOSAD '00 Revised versions of lectures given during the IFIP WG 1.7 International School on Foundations of Security Analysis and Design on Foundations of Security Analysis and Design: Tutorial Lectures
State of the Art in Applied Cryptography, Course on Computer Security and Industrial Cryptography - Revised Lectures
Security Issues in Mobile Code Systems
Mobile Agents and Security
Language Issues in Mobile Program Security
Mobile Agents and Security
Static Analysis of Processes for No and Read-Up nad No Write-Down
FoSSaCS '99 Proceedings of the Second International Conference on Foundations of Software Science and Computation Structure, Held as Part of the European Joint Conferences on the Theory and Practice of Software, ETAPS'99
A security model for distributed product data management system
Computers in Industry - Advanced web technologies for industrial applications
CSFW '96 Proceedings of the 9th IEEE workshop on Computer Security Foundations
Hierarchical function distribution - a design principle for advanced multicomputer architectures
ISCA '83 Proceedings of the 10th annual international symposium on Computer architecture
Reflections on the verification of the security of an operating system kernel
SOSP '83 Proceedings of the ninth ACM symposium on Operating systems principles
An Investigation of CC's Contribution to Confidence in Security
ICCNMC '01 Proceedings of the 2001 International Conference on Computer Networks and Mobile Computing (ICCNMC'01)
On security in capability-based systems
ACM SIGOPS Operating Systems Review
Managing classified documents in a relational database
Das'01 Proceedings of the fifteenth annual working conference on Database and application security
Experiences with the enforcement of access rights extracted from ODRL-based digital contracts
Proceedings of the 3rd ACM workshop on Digital rights management
Toward an integrative model of application-software security
Practicing software engineering in the 21st century
Protecting network users in mobile code systems
Journal of Parallel and Distributed Computing
Model-Based Evaluation: From Dependability to Security
IEEE Transactions on Dependable and Secure Computing
Journal of Computing Sciences in Colleges
Web-based interactive courseware for information security
Proceedings of the 6th conference on Information technology education
Labels and event processes in the asbestos operating system
Proceedings of the twentieth ACM symposium on Operating systems principles
Statistical databases: their model, query language and security
SSDBM'83 Proceedings of the 2nd international workshop on Proceedings of the Second International Workshop on Statistical Database Management
A Methodology for Architectural Design of Concurrent and Distributed Software Systems
The Journal of Supercomputing
Information security models and metrics
Proceedings of the 43rd annual Southeast regional conference - Volume 2
Multimedia-based authorization and access control policy specification
Proceedings of the 3rd ACM workshop on Secure web services
eBPSM: a new security paradigm for e-business organisations (e-business process security model)
Proceedings of the ninth international conference on Electronic commerce
An object-oriented environment for OIS applications
VLDB '85 Proceedings of the 11th international conference on Very Large Data Bases - Volume 11
VLDB '02 Proceedings of the 28th international conference on Very Large Data Bases
Making information flow explicit in HiStar
OSDI '06 Proceedings of the 7th symposium on Operating systems design and implementation
Labels and event processes in the Asbestos operating system
ACM Transactions on Computer Systems (TOCS)
A multimedia access control language for virtual and ambient intelligence environments
Proceedings of the 2007 ACM workshop on Secure web services
Privacy-preserving indexing of documents on the network
VLDB '03 Proceedings of the 29th international conference on Very large data bases - Volume 29
MCSE: a multimedia context-based security engine
EDBT '08 Proceedings of the 11th international conference on Extending database technology: Advances in database technology
Access control policies and languages
International Journal of Computational Science and Engineering
Evaluating the cost reduction of static code analysis for software security
Proceedings of the third ACM SIGPLAN workshop on Programming languages and analysis for security
Security Functional Components for Building a Secure Network Computing Environment
Information Systems Security
Enforcing role based access control model with multimedia signatures
Journal of Systems Architecture: the EUROMICRO Journal
Detecting Inference Channels in Private Multimedia Data via Social Networks
Proceedings of the 23rd Annual IFIP WG 11.3 Working Conference on Data and Applications Security XXIII
Privacy-preserving indexing of documents on the network
The VLDB Journal — The International Journal on Very Large Data Bases
Security considerations for personal computers
IBM Systems Journal
An overview of computer security
IBM Systems Journal
Laissez-faire file sharing: access control designed for individuals at the endpoints
NSPW '09 Proceedings of the 2009 workshop on New security paradigms workshop
Review of software security defects taxonomy
RSKT'10 Proceedings of the 5th international conference on Rough set and knowledge technology
View-based access control with high assurance
SP'96 Proceedings of the 1996 IEEE conference on Security and privacy
Java security: from hotjava to netscape and beyond
SP'96 Proceedings of the 1996 IEEE conference on Security and privacy
Modeling process-related RBAC models with extended UML activity models
Information and Software Technology
Making information flow explicit in HiStar
Communications of the ACM
Flexible dynamic information flow control in Haskell
Proceedings of the 4th ACM symposium on Haskell
Policies, models, and languages for access control
DNIS'05 Proceedings of the 4th international conference on Databases in Networked Information Systems
Modeling and evaluating the survivability of an intrusion tolerant database system
ESORICS'06 Proceedings of the 11th European conference on Research in Computer Security
ICISC'05 Proceedings of the 8th international conference on Information Security and Cryptology
Hi-index | 0.02 |