Sciweavers

53
Voted
SP
1987
IEEE
15 years 20 days ago
Reasoning About Security Models
John McLean
59
Voted
SP
1987
IEEE
15 years 20 days ago
Visa Scheme for Inter-Organization Network Security
Deborah Estrin, Gene Tsudik
50
Voted
SP
1987
IEEE
15 years 20 days ago
Toward Verified Execution Environments
William R. Bevier, Warren A. Hunt Jr., William D. ...
SP
1987
IEEE
118views Security Privacy» more  SP 1987»
15 years 20 days ago
A Comparison of Commercial and Military Computer Security Policies
Most discussions of computer security focus on control of disclosure. In Particular, the U.S. Department of Defense has developed a set of criteria for computer mechanisms to prov...
D. D. Clark, D. R. Wilson