-
1
-
-
70349250376
-
A security architecture for transient trust
-
Fairfax, Virginia, USA. ACM, New York
-
Irvine, C.E., Levin, T.E., Clark, P.C., Nguyen, T.D.: A security architecture for transient trust. In: Proc. of Computer Security Architecture Workshop, Fairfax, Virginia, USA. ACM, New York (2008)
-
(2008)
Proc. of Computer Security Architecture Workshop
-
-
Irvine, C.E.1
Levin, T.E.2
Clark, P.C.3
Nguyen, T.D.4
-
2
-
-
70350673636
-
Trusted emergency management
-
Technical Report NPS-CS-09-001, Naval Postgraduate School, Monterey, CA Naval Postgraduate School
-
Levin, T.E., Irvine, C.E., Benzel, T.V., Nguyen, T.D., Clark, P.C., Bhaskara, G.: Trusted emergency management. Technical Report NPS-CS-09-001, Naval Postgraduate School, Monterey, CA (Naval Postgraduate School)
-
-
-
Levin, T.E.1
Irvine, C.E.2
Benzel, T.V.3
Nguyen, T.D.4
Clark, P.C.5
Bhaskara, G.6
-
3
-
-
0025022888
-
Beyond the pale of MAC and DAC: Defining new forms of access control
-
Oakland, CA, pp, IEEE Computer Society, Los Alamitos
-
McCollum, C.J., Messing, J.R., Notargiacomo, L.: Beyond the pale of MAC and DAC: defining new forms of access control. In: Proc. of Symposium on Security and Privacy, Oakland, CA, pp. 190-200. IEEE Computer Society, Los Alamitos (1990)
-
(1990)
Proc. of Symposium on Security and Privacy
, pp. 190-200
-
-
McCollum, C.J.1
Messing, J.R.2
Notargiacomo, L.3
-
4
-
-
70350660377
-
Immediacy in distributed trusted systems
-
New Orleans, Louisiana. IEEE Computer Societ, Los Alamitos
-
Grossman, G.: Immediacy in distributed trusted systems. In: Proc. of Annual Computer Security Applications Conference, New Orleans, Louisiana. IEEE Computer Societ, Los Alamitos (1995)
-
(1995)
Proc. of Annual Computer Security Applications Conference
-
-
Grossman, G.1
-
5
-
-
70350691570
-
Securecore security architecture: Authority mode and emergency management
-
Technical Report NPS-CS-07-012 and ISI-TR-647, Naval Postgraduate School and USC Information Science Institute, Monterey, CA October
-
Levin, T., Bhaskara, G., Nguyen, T.D., Clark, P.C., Benzel, T.V., Irvine, C.E.: Securecore security architecture: Authority mode and emergency management. Technical Report NPS-CS-07-012 and ISI-TR-647, Naval Postgraduate School and USC Information Science Institute, Monterey, CA (October 2007)
-
(2007)
-
-
Levin, T.1
Bhaskara, G.2
Nguyen, T.D.3
Clark, P.C.4
Benzel, T.V.5
Irvine, C.E.6
-
6
-
-
70350693704
-
-
NSA: U.S. Government Protection Profile for Separation Kernels in Environments Requiring High Robustness, Version 1.03. National Security Agency June 2007
-
NSA: U.S. Government Protection Profile for Separation Kernels in Environments Requiring High Robustness, Version 1.03. National Security Agency (June 2007)
-
-
-
-
7
-
-
79959537786
-
Analysis of three multilevel security architectures
-
Fairfax, Virginia, USA, pp, ACM, New York
-
Levin, T.E., Irvine, C.E., Weissman, C., Nguyen, T.D.: Analysis of three multilevel security architectures. In: Proc. of Computer Security ArchitectureWorkshop, Fairfax, Virginia, USA, pp. 37-46. ACM, New York (2007)
-
(2007)
Proc. of Computer Security ArchitectureWorkshop
, pp. 37-46
-
-
Levin, T.E.1
Irvine, C.E.2
Weissman, C.3
Nguyen, T.D.4
-
8
-
-
70350643158
-
Securecore software architecture: Trusted path application (TPA) requirements
-
Technical Report NPS-CS-07-001, Naval Postgraduate School, Monterey, CA December
-
Clark, P.C., Irvine, C.E., Levin, T.E., Nguyen, T.D., Vidas, T.M.: Securecore software architecture: Trusted path application (TPA) requirements. Technical Report NPS-CS-07-001, Naval Postgraduate School, Monterey, CA (December 2007)
-
(2007)
-
-
Clark, P.C.1
Irvine, C.E.2
Levin, T.E.3
Nguyen, T.D.4
Vidas, T.M.5
-
9
-
-
42549167254
-
Hardware-rooted trust for secure key management and transient trust
-
Alexandria, Virginia, USA, pp, ACM, New York
-
Dwoskin, J.S., Lee, R.B.: Hardware-rooted trust for secure key management and transient trust. In: Proc. of 14th ACM conference on Computer and communications security, Alexandria, Virginia, USA, pp. 389-400. ACM, New York (2007)
-
(2007)
Proc. of 14th ACM conference on Computer and communications security
, pp. 389-400
-
-
Dwoskin, J.S.1
Lee, R.B.2
-
10
-
-
21644486314
-
TCG specification architecture overview
-
TCG:, Technical Report 1.2, Trusted Computing Group April
-
TCG: TCG specification architecture overview. Technical Report 1.2, Trusted Computing Group (April 2004)
-
(2004)
-
-
-
11
-
-
0033293553
-
Building a high-performance, programmable secure coprocessor
-
Smith, S., Weingart, S.: Building a high-performance, programmable secure coprocessor. Computer Networks 31, 831-860 (1999)
-
(1999)
Computer Networks
, vol.31
, pp. 831-860
-
-
Smith, S.1
Weingart, S.2
-
12
-
-
0029697680
-
A security policy model for clinical information systems
-
Oakland, CA, May
-
Anderson, R.J.: A security policy model for clinical information systems. In: IEEE Symposium on Security and Privacy, Oakland, CA, May 1996, pp. 30-43 (1996)
-
(1996)
IEEE Symposium on Security and Privacy
, pp. 30-43
-
-
Anderson, R.J.1
|