Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
CSAC
CSAC 1989
Generate Citations
1989 Fifth Annual Computer Security Applications Conference
Dec. 4 1989 to Dec. 8 1989
Tucson, AZ, USA
Table of Contents
A structured risk analysis approach to resolve the data protection and integrity issues for computer-aided acquisition logistics support (CALS)
Full-text access may be available. Sign in or learn about subscription options.
pp. 4,5
by
R.A. Gove
,
A.R. Friedman
Electronic information security in a digital environment
Full-text access may be available. Sign in or learn about subscription options.
pp. 6,7,8,9
by
R.M. Davis
The CALS Data Protection and Integrity Industry Working Group
Full-text access may be available. Sign in or learn about subscription options.
pp. 10,11
by
B.C. Karp
Data protection requirements in computer-aided acquisition and logistic support
Full-text access may be available. Sign in or learn about subscription options.
pp. 12,13
by
W.C. Gorham
Human issues
Full-text access may be available. Sign in or learn about subscription options.
pp. 16,17
by
S.J. Reynolds
,
T.P. Grove
,
J.N. Parringin
Implementing sensitive but unclassified security, today-a workshop proposal
Full-text access may be available. Sign in or learn about subscription options.
pp. 20,21,22,23,24
by
R. Lang
A security standard for LANs
Full-text access may be available. Sign in or learn about subscription options.
pp. 27
by
M.E. Kirkpatrick
End-to-end encryption at the network layer
Full-text access may be available. Sign in or learn about subscription options.
pp. 28
by
R. Nelson
Electronic messaging security: a comparison of three approaches
Full-text access may be available. Sign in or learn about subscription options.
pp. 29
by
R. Housley
The role of vulnerability in risk management
Full-text access may be available. Sign in or learn about subscription options.
pp. 32,33,34,35,36,37,38
by
K. Otwell
,
B. Aldridge
Intrusion and anomaly detection in trusted systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 39,40,41,42,43,44,45
by
J.R. Winkler
,
W.J. Page
A model of security monitoring
Full-text access may be available. Sign in or learn about subscription options.
pp. 46,47,48,49,50,51,52
by
M. Bishop
An approach for evaluating the security of an Air Force type network
Full-text access may be available. Sign in or learn about subscription options.
pp. 53,54,55,56,57,58,59,60,61,62
by
N.K. Woodfield
Security standards for open systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 64-67
by
E.J. Humphreys
,
W. Ford
,
M. Stirland
,
T. Parker
Protection of call detail records data in federal telecommunications
Full-text access may be available. Sign in or learn about subscription options.
pp. 70,71,72,73,74,75,76,77
by
S. Chokhani
Security audit for embedded avionics systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 78,79,80,81,82,83,84
by
K.N. Rao
Development of a multi level data generation application for GEMSOS
Full-text access may be available. Sign in or learn about subscription options.
pp. 86,87,88,89,90
by
E.R. Schallenmuller
,
R.P. Cramer
,
B.T. Aldridge
Designing a trusted client-server distributed network
Full-text access may be available. Sign in or learn about subscription options.
pp. 91,92,93,94
by
S. Migues
,
R. Housley
The security policy of the secure distributed operating system prototype
Full-text access may be available. Sign in or learn about subscription options.
pp. 95,96,97,98,99,100,101,102
by
N. Proctor
,
R. Wong
Does TCB subsetting enhance trust?
Full-text access may be available. Sign in or learn about subscription options.
pp. 104
by
R.J. Feiertag
Considerations on TCB subsetting
Full-text access may be available. Sign in or learn about subscription options.
pp. 105,106
by
H.B. Winkler-Parenty
TCB subset architecture
Full-text access may be available. Sign in or learn about subscription options.
pp. 107
by
L.L. Vetter
Gemini developers: facts, myths, and war stories
Full-text access may be available. Sign in or learn about subscription options.
pp. 110,111
by
D. Gambel
A summary of the Unisys experience with GEMSOS
Full-text access may be available. Sign in or learn about subscription options.
pp. 112
by
D. Paul
Process execution controls as a mechanism to ensure consistency
Full-text access may be available. Sign in or learn about subscription options.
pp. 114-120
by
E.M. Bacic
Architectural support of fine-grained secure computing
Full-text access may be available. Sign in or learn about subscription options.
pp. 121,122,123,124,125,126,127,128,129,130
by
J.O. Bondi
,
M.A. Branstad
Access control by Boolean expression evaluation
Full-text access may be available. Sign in or learn about subscription options.
pp. 131,132,133,134,135,136,137,138,139
by
D.V. Miller
,
R.W. Baldwin
Assessment of security requirements for sensitive systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 142
by
N. Brown
Challenges faced today by computer security practitioners
Full-text access may be available. Sign in or learn about subscription options.
pp. 143
by
L.F. Reese
ADP security within the Customs Service
Full-text access may be available. Sign in or learn about subscription options.
pp. 144,145
by
W. Green
Computer security and air traffic automation
Full-text access may be available. Sign in or learn about subscription options.
pp. 146
by
S.D. Smith
Software methodology for development of a trusted BMS: identification of critical problems
Full-text access may be available. Sign in or learn about subscription options.
pp. 148,149,150,151,152,153,154,155,156,157,158,159,160,161,162,163,164,165
by
S.D. Crocker
,
E.J. Siarkiewicz
Developing trusted systems using DOD-STD-2167A
Full-text access may be available. Sign in or learn about subscription options.
pp. 166,167,168,169,170,171,172,173,174,175,176
by
T.C.V. Benzel
Security issues and Ada runtime support
Full-text access may be available. Sign in or learn about subscription options.
pp. 177,178,179,180,181,182,183
by
L.J. Harrison
A risk driven process model for the development of trusted systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 184,185,186,187,188,189,190,191,192
by
A. Marmor-Squires
,
J. McHugh
,
M. Branstad
,
B. Danner
,
L. Nagy
,
P. Rougeau
,
D. Sterne
Issues in distributed database security
Full-text access may be available. Sign in or learn about subscription options.
pp. 196,197,198,199,200,201,202,203
by
A.R. Downing
,
I.B. Greenberg
,
T.F. Lunt
Secure query processing in intelligent database management systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 204,205,206,207,208,209,210,211,212,213,214
by
M.B. Thuraisingham
TCB subsets: the next step
Full-text access may be available. Sign in or learn about subscription options.
pp. 216,217,218,219,220,221
by
L. Vetter
,
G. Smith
,
T.F. Lunt
Multi-party conflict: the problem and its solutions
Full-text access may be available. Sign in or learn about subscription options.
pp. 222,223,224,225,226,227,228,229,230,231
by
T.F. Keefe
,
D.J. Thomsen
,
W.T. Tsai
,
M.R. Hansch
Auditing: a relevant contribution to trusted database management systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 232
by
M. Schaefer
,
B. Hubbard
,
D. Sterne
,
T.K. Haley
,
J.N. McAuliffe
,
D. Wolcott
Network authentication tokens
Full-text access may be available. Sign in or learn about subscription options.
pp. 234,235,236,237,238
by
R. Davis
A survey of commercially available secure LAN products
Full-text access may be available. Sign in or learn about subscription options.
pp. 239,240,241,242,243,244,245,246,247
by
G. King
Applying the TNI to system certification and accreditation
Full-text access may be available. Sign in or learn about subscription options.
pp. 248,249,250,251,252
by
R.E. Niemeyer
An extended cryptographic key generation scheme for multilevel data security
Full-text access may be available. Sign in or learn about subscription options.
pp. 254,255,256,257,258,259,260,261,262
by
Lein Harn
,
Yaw-Ruey Chien
,
T. Kiesler
Two new efficient cryptosystems based on Rabin's scheme: alternatives to RSA cryptosystem
Full-text access may be available. Sign in or learn about subscription options.
pp. 263,264,265,266,267,268,269,270
by
L. Harn
,
T. Kiesler
Evaluation issues for an integrated 'INFOSEC' product
Full-text access may be available. Sign in or learn about subscription options.
pp. 271,272,273,274,275
by
F.L. Mayer
,
W.C. Barker
,
T.K. Haley
,
J.N. McAuliffe
,
D.F. Sterne
,
L.S. Vidmar
A perspective on integrity mechanisms
Full-text access may be available. Sign in or learn about subscription options.
pp. 279
by
R. Sandhu
Integrity panel position paper
Full-text access may be available. Sign in or learn about subscription options.
pp. 280
by
H.L. Johnson
Chinese wall security policy-an aggressive model
Full-text access may be available. Sign in or learn about subscription options.
pp. 282,283,284,285,286,287,288,289
by
T.Y. Lin
Security model consistency in secure object-oriented systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 290,291,292,293,294,295,296,297,298
by
T.F. Keefe
,
W.T. Tsai
Security model development environment
Full-text access may be available. Sign in or learn about subscription options.
pp. 299,300,301,302,303,304,305,306,307
by
J. Heaney
,
M. Adkins
,
G. Dolsen
,
J. Page
Report from the second RADC database security workshop
Full-text access may be available. Sign in or learn about subscription options.
pp. 310,311,312,313
by
T.F. Lunt
Multilevel secure database design: a practical application
Full-text access may be available. Sign in or learn about subscription options.
pp. 314,315,316,317,318,319,320,321
by
G.W. Smith
A summary of the LDV solution to the homework problem
Full-text access may be available. Sign in or learn about subscription options.
pp. 322
by
P. Stachour
,
D. Thomsen
Secure database design panel
Full-text access may be available. Sign in or learn about subscription options.
pp. 323
by
T.H. Hinke
RADC database security workshop oracle corporation homework problem solution
Full-text access may be available. Sign in or learn about subscription options.
pp. 324
by
B. Maimone
Secure database design: an implementation using a secure DBMS
Full-text access may be available. Sign in or learn about subscription options.
pp. 325
by
E.D. Sturms
Security approach for rapid prototyping in multilevel secure systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 328,329,330,331,332,333,334
by
V.A. Ashby
,
T. Gregg
,
A. Lee
The trusted server approach to multilevel security
Full-text access may be available. Sign in or learn about subscription options.
pp. 335,336,337,338,339,340,341
by
T.H. Hinke
Use of privacy-enhanced mail for software distribution
Full-text access may be available. Sign in or learn about subscription options.
pp. 344,345,346,347
by
W.C. Barker
Secure automated document delivery
Full-text access may be available. Sign in or learn about subscription options.
pp. 348,349,350,351,352,353,354,355,356
by
T. Casey
,
M. Roe
,
B. Tuck
,
S. Wilbur
Fifth Annual Computer Security Applications Conference (Cat. No.89TH0287-3)
Freely available from IEEE.
pp. 0_1-0_1
Showing 62 out of 62