Default Cover Image

1989 Fifth Annual Computer Security Applications Conference

Dec. 4 1989 to Dec. 8 1989

Tucson, AZ, USA

Table of Contents

Electronic information security in a digital environmentFull-text access may be available. Sign in or learn about subscription options.pp. 6,7,8,9
The CALS Data Protection and Integrity Industry Working GroupFull-text access may be available. Sign in or learn about subscription options.pp. 10,11
Data protection requirements in computer-aided acquisition and logistic supportFull-text access may be available. Sign in or learn about subscription options.pp. 12,13
Human issuesFull-text access may be available. Sign in or learn about subscription options.pp. 16,17
Implementing sensitive but unclassified security, today-a workshop proposalFull-text access may be available. Sign in or learn about subscription options.pp. 20,21,22,23,24
A security standard for LANsFull-text access may be available. Sign in or learn about subscription options.pp. 27
End-to-end encryption at the network layerFull-text access may be available. Sign in or learn about subscription options.pp. 28
Electronic messaging security: a comparison of three approachesFull-text access may be available. Sign in or learn about subscription options.pp. 29
The role of vulnerability in risk managementFull-text access may be available. Sign in or learn about subscription options.pp. 32,33,34,35,36,37,38
Intrusion and anomaly detection in trusted systemsFull-text access may be available. Sign in or learn about subscription options.pp. 39,40,41,42,43,44,45
A model of security monitoringFull-text access may be available. Sign in or learn about subscription options.pp. 46,47,48,49,50,51,52
An approach for evaluating the security of an Air Force type networkFull-text access may be available. Sign in or learn about subscription options.pp. 53,54,55,56,57,58,59,60,61,62
Security standards for open systemsFull-text access may be available. Sign in or learn about subscription options.pp. 64-67
Protection of call detail records data in federal telecommunicationsFull-text access may be available. Sign in or learn about subscription options.pp. 70,71,72,73,74,75,76,77
Security audit for embedded avionics systemsFull-text access may be available. Sign in or learn about subscription options.pp. 78,79,80,81,82,83,84
Development of a multi level data generation application for GEMSOSFull-text access may be available. Sign in or learn about subscription options.pp. 86,87,88,89,90
Designing a trusted client-server distributed networkFull-text access may be available. Sign in or learn about subscription options.pp. 91,92,93,94
The security policy of the secure distributed operating system prototypeFull-text access may be available. Sign in or learn about subscription options.pp. 95,96,97,98,99,100,101,102
Does TCB subsetting enhance trust?Full-text access may be available. Sign in or learn about subscription options.pp. 104
Considerations on TCB subsettingFull-text access may be available. Sign in or learn about subscription options.pp. 105,106
TCB subset architectureFull-text access may be available. Sign in or learn about subscription options.pp. 107
Gemini developers: facts, myths, and war storiesFull-text access may be available. Sign in or learn about subscription options.pp. 110,111
A summary of the Unisys experience with GEMSOSFull-text access may be available. Sign in or learn about subscription options.pp. 112
Process execution controls as a mechanism to ensure consistencyFull-text access may be available. Sign in or learn about subscription options.pp. 114-120
Architectural support of fine-grained secure computingFull-text access may be available. Sign in or learn about subscription options.pp. 121,122,123,124,125,126,127,128,129,130
Access control by Boolean expression evaluationFull-text access may be available. Sign in or learn about subscription options.pp. 131,132,133,134,135,136,137,138,139
Assessment of security requirements for sensitive systemsFull-text access may be available. Sign in or learn about subscription options.pp. 142
Challenges faced today by computer security practitionersFull-text access may be available. Sign in or learn about subscription options.pp. 143
ADP security within the Customs ServiceFull-text access may be available. Sign in or learn about subscription options.pp. 144,145
Computer security and air traffic automationFull-text access may be available. Sign in or learn about subscription options.pp. 146
Software methodology for development of a trusted BMS: identification of critical problemsFull-text access may be available. Sign in or learn about subscription options.pp. 148,149,150,151,152,153,154,155,156,157,158,159,160,161,162,163,164,165
Developing trusted systems using DOD-STD-2167AFull-text access may be available. Sign in or learn about subscription options.pp. 166,167,168,169,170,171,172,173,174,175,176
Security issues and Ada runtime supportFull-text access may be available. Sign in or learn about subscription options.pp. 177,178,179,180,181,182,183
A risk driven process model for the development of trusted systemsFull-text access may be available. Sign in or learn about subscription options.pp. 184,185,186,187,188,189,190,191,192
Issues in distributed database securityFull-text access may be available. Sign in or learn about subscription options.pp. 196,197,198,199,200,201,202,203
Secure query processing in intelligent database management systemsFull-text access may be available. Sign in or learn about subscription options.pp. 204,205,206,207,208,209,210,211,212,213,214
TCB subsets: the next stepFull-text access may be available. Sign in or learn about subscription options.pp. 216,217,218,219,220,221
Multi-party conflict: the problem and its solutionsFull-text access may be available. Sign in or learn about subscription options.pp. 222,223,224,225,226,227,228,229,230,231
Auditing: a relevant contribution to trusted database management systemsFull-text access may be available. Sign in or learn about subscription options.pp. 232
Network authentication tokensFull-text access may be available. Sign in or learn about subscription options.pp. 234,235,236,237,238
A survey of commercially available secure LAN productsFull-text access may be available. Sign in or learn about subscription options.pp. 239,240,241,242,243,244,245,246,247
Applying the TNI to system certification and accreditationFull-text access may be available. Sign in or learn about subscription options.pp. 248,249,250,251,252
An extended cryptographic key generation scheme for multilevel data securityFull-text access may be available. Sign in or learn about subscription options.pp. 254,255,256,257,258,259,260,261,262
Two new efficient cryptosystems based on Rabin's scheme: alternatives to RSA cryptosystemFull-text access may be available. Sign in or learn about subscription options.pp. 263,264,265,266,267,268,269,270
Evaluation issues for an integrated 'INFOSEC' productFull-text access may be available. Sign in or learn about subscription options.pp. 271,272,273,274,275
A perspective on integrity mechanismsFull-text access may be available. Sign in or learn about subscription options.pp. 279
Integrity panel position paperFull-text access may be available. Sign in or learn about subscription options.pp. 280
Chinese wall security policy-an aggressive modelFull-text access may be available. Sign in or learn about subscription options.pp. 282,283,284,285,286,287,288,289
Security model consistency in secure object-oriented systemsFull-text access may be available. Sign in or learn about subscription options.pp. 290,291,292,293,294,295,296,297,298
Security model development environmentFull-text access may be available. Sign in or learn about subscription options.pp. 299,300,301,302,303,304,305,306,307
Report from the second RADC database security workshopFull-text access may be available. Sign in or learn about subscription options.pp. 310,311,312,313
Multilevel secure database design: a practical applicationFull-text access may be available. Sign in or learn about subscription options.pp. 314,315,316,317,318,319,320,321
A summary of the LDV solution to the homework problemFull-text access may be available. Sign in or learn about subscription options.pp. 322
Secure database design panelFull-text access may be available. Sign in or learn about subscription options.pp. 323
RADC database security workshop oracle corporation homework problem solutionFull-text access may be available. Sign in or learn about subscription options.pp. 324
Secure database design: an implementation using a secure DBMSFull-text access may be available. Sign in or learn about subscription options.pp. 325
Security approach for rapid prototyping in multilevel secure systemsFull-text access may be available. Sign in or learn about subscription options.pp. 328,329,330,331,332,333,334
The trusted server approach to multilevel securityFull-text access may be available. Sign in or learn about subscription options.pp. 335,336,337,338,339,340,341
Use of privacy-enhanced mail for software distributionFull-text access may be available. Sign in or learn about subscription options.pp. 344,345,346,347
Secure automated document deliveryFull-text access may be available. Sign in or learn about subscription options.pp. 348,349,350,351,352,353,354,355,356
Showing 62 out of 62