Author of the publication

The IEEE Symposium on Security and Privacy, in Retrospect.

, , and . IEEE Security & Privacy, 12 (3): 15-17 (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Ensuring Assurance in Mobile Computing., , , , , and . IEEE Symposium on Security and Privacy, page 114-118. IEEE Computer Society, (1997)Auditing: a relevant contribution to trusted database management systems., , , , , and . ACSAC, IEEE, (1989)A Contemporary Survey of Discretion Access Control Policy Assurance in Commercial Trusted Relational DBMS.. DBSec, volume A-60 of IFIP Transactions, page 376. North-Holland, (1994)Reflexions on Current Issues in Trusted DBMS.. DBSec, page 351-370. North-Holland, (1990)A Data Model for a Multilevel Replicated X.500 Server., and . DBSec, volume 79 of IFIP Conference Proceedings, page 195-211. Chapman & Hall, (1996)Multilevel Data Model for the Trusted ONTOS Prototype., , , and . DBSec, volume 51 of IFIP Conference Proceedings, page 111-126. Chapman & Hall, (1995)Customer Requirements for Security in Relational Database Management., , , , and . DBSec, volume 51 of IFIP Conference Proceedings, page 351-361. Chapman & Hall, (1995)Program confinement in KVM/370., , , and . ACM Annual Conference, page 404-410. ACM, (1977)We need to think about the foundations of computer security.. NSPW, page 120-125. ACM, (1993)If A1 is the Answer, What was the Question? An Edgy Na?f's Retrospective on Promulgating the Trusted Computer Systems Evaluation Criteria.. ACSAC, page 204-228. IEEE Computer Society, (2004)