UNIX security in a supercomputing environment
Proceedings of the 1989 ACM/IEEE conference on Supercomputing
ABYSS: An Architecture for Software Protection
IEEE Transactions on Software Engineering
A formal protection model of security in centralized, parallel, and distributed systems
ACM Transactions on Computer Systems (TOCS)
A Retrospective on the VAX VMM Security Kernel
IEEE Transactions on Software Engineering
Knowledge Representation and Reasoning in the Design of Composite Systems
IEEE Transactions on Software Engineering - Special issue on knowledge representation and reasoning in software development
Security services in the OSI reference model
ACM SIGSAC Review
A logic for reasoning about security
ACM Transactions on Computer Systems (TOCS)
Reference model for data management security and privacy
ACM SIGSAC Review - Special issue on Issues '91: data management security and privacy standards
A taxonomy of computer program security flaws
ACM Computing Surveys (CSUR)
Assessing computer security vulnerability
ACM SIGOPS Operating Systems Review
IEEE Transactions on Software Engineering
The DGSA: unmet information security challenges for operating system designers
ACM SIGOPS Operating Systems Review
A security model for dynamic adaptive traffic masking
NSPW '97 Proceedings of the 1997 workshop on New security paradigms
Confidentiality, integrity, assured service: tying security all together
NSPW '92-93 Proceedings on the 1992-1993 workshop on New security paradigms
Identification and authentication when users have multiple accounts
NSPW '92-93 Proceedings on the 1992-1993 workshop on New security paradigms
Role based access control on MLS systems without kernel changes
RBAC '98 Proceedings of the third ACM workshop on Role-based access control
NSPW '96 Proceedings of the 1996 workshop on New security paradigms
Availability policies in an adversarial environment
NSPW '96 Proceedings of the 1996 workshop on New security paradigms
Protection wrappers: a simple and portable sandbox for untrusted applications
Proceedings of the 8th ACM SIGOPS European workshop on Support for composing distributed applications
Secrecy by typing in security protocols
Journal of the ACM (JACM)
Application of security tot he computing science classroom
Proceedings of the thirty-first SIGCSE technical symposium on Computer science education
The essence of information assurance and its implications for the Ada community
Proceedings of the 2002 annual ACM SIGAda international conference on Ada: The engineering of correct and reliable software for real-time & distributed systems using Ada and related technologies
Java Security: Present and Near Future
IEEE Micro
Database Concurrency Control in Multilevel Secure Database Management Systems
IEEE Transactions on Knowledge and Data Engineering
Security Protocols and Specifications
FoSSaCS '99 Proceedings of the Second International Conference on Foundations of Software Science and Computation Structure, Held as Part of the European Joint Conferences on the Theory and Practice of Software, ETAPS'99
Managing data flow in a DAC supporting security system
Journal of Network and Computer Applications
Access control systems: from host-centric to network-centric computing
IBM Systems Journal
Technology and Web User Data Privacy: A Survey of Risks and Countermeasures
IEEE Security and Privacy
Building an information security education program
Proceedings of the 1st annual conference on Information security curriculum development
A logical approach to multilevel security of probabilistic systems
Distributed Computing
Leveraging architectural models to inject trust into software systems
SESS '05 Proceedings of the 2005 workshop on Software engineering for secure systems—building trustworthy applications
Reducing TCB size by using untrusted components: small kernels versus virtual-machine monitors
Proceedings of the 11th workshop on ACM SIGOPS European workshop
Access control in a core calculus of dependency
Proceedings of the eleventh ACM SIGPLAN international conference on Functional programming
Access Control in a Core Calculus of Dependency
Electronic Notes in Theoretical Computer Science (ENTCS)
Opportunistic Scheduling Of Secure Tasks In A Multiprocessor Environment
Journal of Integrated Design & Process Science
The flask security architecture: system support for diverse security policies
SSYM'99 Proceedings of the 8th conference on USENIX Security Symposium - Volume 8
USITS'97 Proceedings of the USENIX Symposium on Internet Technologies and Systems on USENIX Symposium on Internet Technologies and Systems
From security patterns to implementation using petri nets
Proceedings of the fourth international workshop on Software engineering for secure systems
Security Functional Components for Building a Secure Network Computing Environment
Information Systems Security
Towards multilaterally secure computing platforms-with open source and trusted computing
Information Security Tech. Report
IT-security and privacy: design and use of privacy-enhancing security mechanisms
IT-security and privacy: design and use of privacy-enhancing security mechanisms
Computer security from a programming language and static analysis perspective
ESOP'03 Proceedings of the 12th European conference on Programming
SP 800-12. An Introduction to Computer Security: the NIST Handbook
SP 800-12. An Introduction to Computer Security: the NIST Handbook
Hi-index | 0.00 |