Stop the war!
Остановите войну!
for scientists:
default search action
NSPW 1994: Little Compton, Rhode Island, USA
- Hilary H. Hosmer, John E. Dobson, Eric Leighninger:
Proceedings of the 1994 Workshop on New Security Paradigms, Little Compton, Rhode Island, USA, August 3-5,1994. IEEE Computer Society Press 1994, ISBN 0-8186-6335-9 - David Elliott Bell:
Modeling the "multipolicy machine". 2-9 - John Dobson:
Messages, communication, information security and value. 10-19 - Martin Ferris:
New email security infrastructure. 20-27 - Thomas L. Lincoln:
"HIS-Treck - the next generation": an introduction to future hospital information systems. 28-31 - Daniel J. Essin, Thomas L. Lincoln:
Healthcare information architecture: elements of a new paradigm. 32-41 - T. Y. Lin:
Anomaly detection: a soft computing approach. 44-53 - Sergei Ovchinnikov:
Fuzzy sets and secure computer systems. 54-62 - Adrian Spalka:
Formal semantics of confidentiality in multilevel logic databases. 64-73 - Ruth Nelson:
What is a secret - and - what does that have to do with computer security? 74-79 - Silvana Castano, Giancarlo Martella, Pierangela Samarati:
A new approach to security system development. 82-88 - Deborah Hamilton:
Providing non-hierarchical security through interface mechanisms. 89-95 - Bruce Schneier:
Designing encryption algorithms for real people. 98-101 - Elisa Bertino, Claudio Bettini, Pierangela Samarati:
A discretionary access control model with temporal authorizations. 102-107 - Charles G. Limoges, Ruth R. Nelson, John H. Heimann, David S. Becker:
Versatile integrity and security environment (VISE) for computer systems. 109-118
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.