-
1
-
-
85091932273
-
-
Mac OS X. http://www.apple.com/macosx.
-
-
-
Mac, OS X.1
-
2
-
-
85091931376
-
-
The Mozilla Project
-
The Mozilla Project. http://www.mozilla.org/.
-
-
-
-
4
-
-
85091894820
-
-
At&t leaks sensitive info in nsa suit. May 2006
-
At&t leaks sensitive info in nsa suit. http: //news.com.com/2100-1028 3-6077353. html?part=rss\&tag=6077353\&subj=news, May 2006.
-
-
-
-
5
-
-
0023408117
-
Processing Encrypted Data
-
N. Ahituv, Y. Lapid, and S. Neumann. Processing Encrypted Data. Communications of the ACM, 30(9):777-780, 1987.
-
(1987)
Communications of the ACM
, vol.30
, Issue.9
, pp. 777-780
-
-
Ahituv, N.1
Lapid, Y.2
Neumann, S.3
-
6
-
-
0030419725
-
A domain and type enforcement UNIX prototype
-
L. Badger, D. F. Sterne, D. L. Sherman, and K. M. Walker. A domain and type enforcement UNIX prototype. Computing Systems, 9(1):47-83, 1996.
-
(1996)
Computing Systems
, vol.9
, Issue.1
, pp. 47-83
-
-
Badger, L.1
Sterne, D. F.2
Sherman, D. L.3
Walker, K. M.4
-
14
-
-
1242349397
-
Modeling mandatory access control in role-based security systems
-
M. Nyanchama and S. L. Osborn. Modeling mandatory access control in role-based security systems. In IFIPWorkshop on Database Security, pages 129- 144, 1995.
-
(1995)
IFIPWorkshop on Database Security
, pp. 129-144
-
-
Nyanchama, M.1
Osborn, S. L.2
-
16
-
-
0030333205
-
Replacing Personally-Identifying Information in Medical Records, the Scrub System
-
pages Cimino JJ
-
L. Sweeney. Replacing Personally-Identifying Information in Medical Records, the Scrub System. In Journal of the American Medical Informatics Assoc., pages 333-337. Cimino JJ, 1996.
-
(1996)
Journal of the American Medical Informatics Assoc
, pp. 333-337
-
-
Sweeney, L.1
-
17
-
-
84939548725
-
Automated Trust Negotiation
-
IEEE Press, pages January
-
W. H.Winsborough, K. E. Seamons, and V. E. Jones. Automated Trust Negotiation. In Proceedings of DARPA Information Survuvability Conference and Exposition, Volume I, IEEE Press, pages 88-102, January 2000.
-
(2000)
Proceedings of DARPA Information Survuvability Conference and Exposition
, vol.I
, pp. 88-102
-
-
Winsborough, W. H.1
Seamons, K. E.2
Jones, V. E.3
-
18
-
-
85077745984
-
TCP wrapper: Network monitoring, access control, and booby traps
-
September
-
W.Venema. TCP wrapper: Network monitoring, access control, and booby traps. In Proceedings of the 3rd Usenix Security Symposium, September 1992.
-
(1992)
Proceedings of the 3rd Usenix Security Symposium
-
-
Venema, W.1
|