Author of the publication

Fuzzy Multi-Level Security: An Experiment on Quantified Risk-Adaptive Access Control.

, , , , , and . IEEE Symposium on Security and Privacy, page 222-230. IEEE Computer Society, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Increased Information Flow Needs for High-Assurance Composite Evaluations., and . IWIA, page 129-140. (2004)The Feasibility of Automated Feedback-Directed Specification-Based Test Generation: A Case Study of a High-Assurance Operating System., , , , , , and . ISSRE, page 229-238. IEEE Computer Society, (2008)New Methods for Immediate Revocation.. IEEE Symposium on Security and Privacy, page 48-55. IEEE Computer Society, (1989)A VMM Security Kernel for the VAX Architecture., , , , and . IEEE Symposium on Security and Privacy, page 2-19. IEEE Computer Society, (1990)Authenticating Mandatory Access Controls and Preserving Privacy for a High-Assurance Smart Card., , , , , and . ESORICS, volume 2808 of Lecture Notes in Computer Science, page 181-200. Springer, (2003)Storage Channels in Disk Arm Optimization., and . IEEE Symposium on Security and Privacy, page 52-63. IEEE Computer Society, (1991)An Augmented Capability Architecture to Support Lattice Security and Traceability of Access., and . IEEE Symposium on Security and Privacy, page 2-12. IEEE Computer Society, (1984)Performance and security lessons learned from virtualizing the alpha processor.. ISCA, page 392-401. ACM, (2007)The Lattice Security Model In A Public Computing Network.. ACM Annual Conference (1), page 453-459. ACM, (1978)Multi-Level Security Requirements for Hypervisors.. ACSAC, page 267-275. IEEE Computer Society, (2005)