-
2
-
-
85084161247
-
Why Johnny can't encrypt: A usability evaluation of PGP 5.0
-
USENIX, Aug.
-
A. Whitten and J. D. Tygar, "Why Johnny can't encrypt: A usability evaluation of PGP 5.0," in Proceedings of the 8th USENIX Security Symposium, (Washington D.C., USA), pp. 169-184, USENIX, Aug. 1999.
-
(1999)
Proceedings of the 8th USENIX Security Symposium, (Washington D.C., USA)
, pp. 169-184
-
-
Whitten, A.1
Tygar, J.D.2
-
3
-
-
0005008199
-
Layered Multipoint Network Defense and Security Policy Enforcement
-
IEEE Press, June
-
S. Wolthusen, "Layered Multipoint Network Defense and Security Policy Enforcement," in Proceedings from the Second Annual IEEE SMC Information Assurance Workshop, United States Military Academy, (West Point, NY, USA), pp. 100-108, IEEE Press, June 2001.
-
(2001)
Proceedings from the Second Annual IEEE SMC Information Assurance Workshop, United States Military Academy, (West Point, NY, USA)
, pp. 100-108
-
-
Wolthusen, S.1
-
4
-
-
19944394692
-
ssmail: Opportunistic Encryption in sendmail
-
USENIX, Nov.
-
D. Bentley, G. G. Rose, and T. Whalen, "ssmail: Opportunistic Encryption in sendmail," in Proceedings of the 13th Conference on Systems Administration (LISA-99), (Seattle, WA, USA), pp. 1-8, USENIX, Nov. 1999.
-
(1999)
Proceedings of the 13th Conference on Systems Administration (LISA-99), (Seattle, WA, USA)
, pp. 1-8
-
-
Bentley, D.1
Rose, G.G.2
Whalen, T.3
-
5
-
-
0033206712
-
A Proxy Approach to e-Mail Security
-
Dec.
-
I. Brown and C. R. Snow, "A Proxy Approach to e-Mail Security," Software - Practice and Experience, vol. 29, pp. 1049-1060, Dec. 1999.
-
(1999)
Software - Practice and Experience
, vol.29
, pp. 1049-1060
-
-
Brown, I.1
Snow, C.R.2
-
7
-
-
0344937028
-
-
Nov. Obsoletes RFC 1651
-
J. Klensin, N. Freed, M. Rose, E. Stefferud, and D. Crocker, "RFC 1869: SMTP Service Extensions," Nov. 1995. Obsoletes RFC 1651.
-
(1995)
RFC 1869: SMTP Service Extensions
-
-
Klensin, J.1
Freed, N.2
Rose, M.3
Stefferud, E.4
Crocker, D.5
-
11
-
-
0003415244
-
-
Jan.
-
T. Berners-Lee, R. Fielding, H. Frystyk, J. Gettys, and J. Mogul, "RFC 2068: Hypertext Transfer Protocol - HTTP/1.1," Jan. 1997.
-
(1997)
RFC 2068: Hypertext Transfer Protocol - HTTP/1.1
-
-
Berners-Lee, T.1
Fielding, R.2
Frystyk, H.3
Gettys, J.4
Mogul, J.5
-
13
-
-
0008626109
-
-
Nov. Obsoletes RFC 1521, RFC 1522, RFC 1590. Updated by RFC 2184, RFC 2231
-
N. Freed and N. Borenstein, "RFC 2045: Multipurpose Internet Mail Extensions (MIME) Part One: Format of Internet Message Bodies," Nov. 1996. Obsoletes RFC 1521, RFC 1522, RFC 1590. Updated by RFC 2184, RFC 2231.
-
(1996)
RFC 2045: Multipurpose Internet Mail Extensions (MIME) Part One: Format of Internet Message Bodies
-
-
Freed, N.1
Borenstein, N.2
-
19
-
-
4544255488
-
-
Bellevue, WA, USA: Microsoft Press, 3rd ed.
-
D. Solomon and M. Russinovich, Inside Windows 2000. Bellevue, WA, USA: Microsoft Press, 3rd ed., 2000.
-
(2000)
Inside Windows 2000
-
-
Solomon, D.1
Russinovich, M.2
-
22
-
-
0001282303
-
Automata on Infinite Objects
-
J. van Leeuwen, ed. ch. 4, Cambridge, MA, USA: MIT Press
-
W. Thomas, "Automata on Infinite Objects," in Handbook of Theoretical Computer Science (J. van Leeuwen, ed.), vol. B, ch. 4, pp. 133-192, Cambridge, MA, USA: MIT Press, 1990.
-
(1990)
Handbook of Theoretical Computer Science
, vol.B
, pp. 133-192
-
-
Thomas, W.1
-
23
-
-
4544285485
-
Techniques and Applications of Digital Watermarking and Content Protection
-
Norwood, MA, USA: Artech House
-
M. Arnold, M. Schmucker, and S. D. Wolthusen, Techniques and Applications of Digital Watermarking and Content Protection. The Artech House Computer Security Series, Norwood, MA, USA: Artech House, 2003.
-
(2003)
The Artech House Computer Security Series
-
-
Arnold, M.1
Schmucker, M.2
Wolthusen, S.D.3
-
25
-
-
84904260165
-
Transparent Access To Encrypted Data Using Operating System Network Stack Extensions
-
R. Steinmetz, J. Dittman, and M. Steinebach, eds.), (Darmstadt, Germany), IFIP, Kluwer Academic Publishers, May
-
E. Rademer and S. Wolthusen, "Transparent Access To Encrypted Data Using Operating System Network Stack Extensions," in Communications and Multimedia Security Issues of the New Century: Proceedings of the IFIP TC6/TC11 Fifth Joint Working Conference on Communications and Multimedia Security (CMS'01) (R. Steinmetz, J. Dittman, and M. Steinebach, eds.), (Darmstadt, Germany), pp. 213-226, IFIP, Kluwer Academic Publishers, May 2001.
-
(2001)
Communications and Multimedia Security Issues of the New Century: Proceedings of the IFIP TC6/TC11 Fifth Joint Working Conference on Communications and Multimedia Security (CMS'01)
, pp. 213-226
-
-
Rademer, E.1
Wolthusen, S.2
-
26
-
-
0018055076
-
Design of a Message Processing System for a Multilevel Secure Environment
-
Anaheim, CA, USA AFIPS, AFIPS Press, Nov.
-
S. R. Ames, Jr. and D. R. Oestreicher, "Design of a Message Processing System for a Multilevel Secure Environment," in Proceedings of the National Computer Conference, vol. 47, (Anaheim, CA, USA), pp. 765-771, AFIPS, AFIPS Press, Nov. 1978.
-
(1978)
Proceedings of the National Computer Conference
, vol.47
, pp. 765-771
-
-
Ames, S.R.1
Oestreicher, D.R.2
-
27
-
-
85072531344
-
Applications for Multilevel Secure Operating Systems
-
New York, NY, USA AFIPS, AFIPS Press, Nov.
-
J. P. L. Woodward, "Applications for Multilevel Secure Operating Systems," in Proceedings of the National Computer Conference, vol. 48, (New York, NY, USA), pp. 319-328, AFIPS, AFIPS Press, Nov. 1979.
-
(1979)
Proceedings of the National Computer Conference
, vol.48
, pp. 319-328
-
-
Woodward, J.P.L.1
-
28
-
-
84937349626
-
KSOS - Computer Network Applications
-
New York, NY, USA, AFIPS, AFIPS Press, June
-
M. A. Padlipsky, K. J. Biba, and R. B. Neely, "KSOS - Computer Network Applications," in Proceedings of the National Computer Conference, vol. 48, (New York, NY, USA), pp. 365-371, AFIPS, AFIPS Press, June 1979.
-
(1979)
Proceedings of the National Computer Conference
, vol.48
, pp. 365-371
-
-
Padlipsky, M.A.1
Biba, K.J.2
Neely, R.B.3
-
29
-
-
84937355368
-
-
tech. rep., The MITRE Corporation, Bedford, MA, USA, Oct. Number MTR-3323
-
J. Goodwin, G. Mitchell, and P. S. Tasker, "Concept of Operations for Message Handling at CINCPAC," tech. rep., The MITRE Corporation, Bedford, MA, USA, Oct. 1976. Number MTR-3323.
-
(1976)
Concept of Operations for Message Handling at CINCPAC
-
-
Goodwin, J.1
Mitchell, G.2
Tasker, P.S.3
-
30
-
-
84946413883
-
-
tech. rep., The MITRE Corporation, Bedford, MA, USA, June Number MTR-3433
-
J. D. Tangney, S. R. Ames, Jr., and E. L. Burke, "Security Evaluation Criteria for MMP Message Service Selection," tech. rep., The MITRE Corporation, Bedford, MA, USA, June 1977. Number MTR-3433.
-
(1977)
Security Evaluation Criteria for MMP Message Service Selection
-
-
Tangney, J.D.1
Ames, S.R.2
Burke, E.L.3
-
32
-
-
84946440840
-
Certification and Accreditation Approach for the WWMCCS Guard
-
Oct.
-
B. Tretick, "Certification and Accreditation Approach for the WWMCCS Guard," in Proceedings 16th NIST-NCSC National Computer Security Conference, (Baltimore, MD, USA), pp. 245-252, Oct. 1993.
-
(1993)
Proceedings 16th NIST-NCSC National Computer Security Conference, (Baltimore, MD, USA)
, pp. 245-252
-
-
Tretick, B.1
-
33
-
-
84946440841
-
Operational Requirements for Multilevel Security
-
IEEE Press, Dec.
-
B. Tretick, "Operational Requirements for Multilevel Security," in Proceedings 9th Annual Computer Security Applications Conference (ACSAC'93), (Orlando, FL, USA), pp. 30-35, IEEE Press, Dec. 1993.
-
(1993)
Proceedings 9th Annual Computer Security Applications Conference (ACSAC'93), (Orlando, FL, USA)
, pp. 30-35
-
-
Tretick, B.1
-
34
-
-
84942392263
-
Military Message Systems: Requirements and Security Model
-
tech. rep., Naval Research Laboratory, Washington D.C., USA, Sept.
-
C. E. Landwehr and C. L. Heitmeyer, "Military Message Systems: Requirements and Security Model," tech. rep., Naval Research Laboratory, Washington D.C., USA, Sept. 1982. NRL Memorandum 4925.
-
(1982)
NRL Memorandum 4925
-
-
Landwehr, C.E.1
Heitmeyer, C.L.2
-
35
-
-
84976780900
-
A Security Model for Military Message System
-
Aug.
-
C. E. Landwehr, C. L. Heitmeyer, and J. McLean, "A Security Model for Military Message System," ACM Transactions on Computer Systems, vol. 2, pp. 198-222, Aug. 1984.
-
(1984)
ACM Transactions on Computer Systems
, vol.2
, pp. 198-222
-
-
Landwehr, C.E.1
Heitmeyer, C.L.2
McLean, J.3
-
36
-
-
0021651307
-
Designing Secure Message Systems: The Military Message Systems (MMS) Project
-
IFIP, Kluwer Academic Publishers, May
-
C. L. Heitmeyer and C. E. Landwehr, "Designing Secure Message Systems: The Military Message Systems (MMS) Project," in Proceedings of the IFIP TC6.5 Working Conference on Computer-Based Message Services, (Nottingham, UK), pp. 245-255, IFIP, Kluwer Academic Publishers, May 1984.
-
(1984)
Proceedings of the IFIP TC6.5 Working Conference on Computer-Based Message Services, (Nottingham, UK)
, pp. 245-255
-
-
Heitmeyer, C.L.1
Landwehr, C.E.2
-
37
-
-
84946440842
-
Specifications for Three Members of the Military Message System (MMS) Family
-
tech. rep., Naval Research Laboratory, Washington D.C., USA, Mar.
-
C. L. Heitmeyer and M. Cornwell, "Specifications for Three Members of the Military Message System (MMS) Family," tech. rep., Naval Research Laboratory, Washington D.C., USA, Mar. 1982. NRL Memorandum 5654.
-
(1982)
NRL Memorandum 5654
-
-
Heitmeyer, C.L.1
Cornwell, M.2
-
38
-
-
84946440843
-
Security Architecture for A Secure Military Message System
-
tech. rep., Naval Research Laboratory, Washington D.C., USA, Apr.
-
M. R. Cornwell and A. P. Moore, "Security Architecture for a Secure Military Message System," tech. rep., Naval Research Laboratory, Washington D.C., USA, Apr. 1989. NRL Memorandum 9187.
-
(1989)
NRL Memorandum 9187
-
-
Cornwell, M.R.1
Moore, A.P.2
-
39
-
-
33745434355
-
Constructing a High Assurance Mail Guard
-
Oct.
-
R. E. Smith, "Constructing a High Assurance Mail Guard," in Proceedings 17th NIST-NCSC National Computer Security Conference, (Gaithersburg, MD, USA), pp. 247-253, Oct. 1994.
-
(1994)
Proceedings 17th NIST-NCSC National Computer Security Conference, (Gaithersburg, MD, USA)
, pp. 247-253
-
-
Smith, R.E.1
-
40
-
-
0027719713
-
A Pump for Rapid, Reliable, Secure Communications
-
ACM Press, Nov.
-
M. H. Kang and I. S. Moskowitz, "A Pump for Rapid, Reliable, Secure Communications," in Proceedings of the 1st ACM Conference on Computer and Communications Security, (Fairfax, VA, USA), pp. 118-129, ACM Press, Nov. 1993.
-
(1993)
Proceedings of the 1st ACM Conference on Computer and Communications Security, (Fairfax, VA, USA)
, pp. 118-129
-
-
Kang, M.H.1
Moskowitz, I.S.2
-
41
-
-
0029220610
-
A Network Version of the Pump
-
IEEE Press, May
-
M. H. Kang, I. S. Moskowitz, and D. C. Lee, "A Network Version of the Pump," in Proceedings of the 1996 IEEE Symposium on Security and Privacy (SOSP '96), (Oakland, CA, USA), pp. 144-154, IEEE Press, May 1996.
-
(1996)
Proceedings of the 1996 IEEE Symposium on Security and Privacy (SOSP '96), (Oakland, CA, USA)
, pp. 144-154
-
-
Kang, M.H.1
Moskowitz, I.S.2
Lee, D.C.3
-
42
-
-
0000446356
-
A Network Pump
-
May Revised from [41]
-
M. H. Kang, I. S. Moskowitz, and D. C. Lee, "A Network Pump," IEEE Transactions on Software Engineering, vol. 22, pp. 329-338, May 1996. Revised from [41].
-
(1996)
IEEE Transactions on Software Engineering
, vol.22
, pp. 329-338
-
-
Kang, M.H.1
Moskowitz, I.S.2
Lee, D.C.3
-
43
-
-
84910325294
-
A System Architecture to Support a Verifiable Secure Multilevel Security System
-
IEEE Press, Apr.
-
G. I. Davida, R. A. DeMillo, and R. J. Lipton, "A System Architecture to Support a Verifiable Secure Multilevel Security System," in Proceedings of the 1980 IEEE Symposium on Security and Privacy (SOSP '80), (Oakland, CA, USA), pp. 137-145, IEEE Press, Apr. 1980.
-
(1980)
Proceedings of the 1980 IEEE Symposium on Security and Privacy (SOSP '80), (Oakland, CA, USA)
, pp. 137-145
-
-
Davida, G.I.1
DeMillo, R.A.2
Lipton, R.J.3
-
44
-
-
84962298764
-
Architecture and Concepts of the ARGuE Guard
-
IEEE Press, Dec.
-
J. Epstein, "Architecture and Concepts of the ARGuE Guard," in Proceedings 15th Annual Computer Security Applications Conference (ACSAC'99), (Phoenix, AZ, USA), pp. 45-54, IEEE Press, Dec. 1999.
-
(1999)
Proceedings 15th Annual Computer Security Applications Conference (ACSAC'99), (Phoenix, AZ, USA)
, pp. 45-54
-
-
Epstein, J.1
-
45
-
-
33745450547
-
Genoa TIE, Advanced Boundary Controller Experiment
-
IEEE Press, Dec.
-
E. Monteith, "Genoa TIE, Advanced Boundary Controller Experiment," in Proceedings 17th Annual Computer Security Applications Conference (ACSAC'01), (New Orleans, LA, USA), pp. 74-82, IEEE Press, Dec. 2001.
-
(2001)
Proceedings 17th Annual Computer Security Applications Conference (ACSAC'01), (New Orleans, LA, USA)
, pp. 74-82
-
-
Monteith, E.1
|