You are here

NSPW 1992 & 1993 Proceedings

The papers are here.

David Bailey.
Managing Complexity in Secure Networks.

Dixie B. Baker.
The Evolved Threat Paradigm: Look Who's Wearing the Black Hats!.

Dorothy E. Denning.
A New Paradigm for Trusted Systems.

Yvo Desmedt.
Computer Security by Redefining What a Computer Is.

John Dobson.
New Security Paradigms: What Other Concepts Do We Need As Well?.

José de J. Vásquez-Gómez.
Modelling Multidomain Security.

Grace L Hammonds.
Confidentiality, Integrity, Assured Service: Tying Security All Together.

Hilary H. Hosmer.
The Multipolicy Paradigm for Trusted Systems.

Hilary H. Hosmer.
SECURITY IS FUZZY! Applying the Fuzzy Logic Paradigm to the Multipolicy Paradigm.

Donald M. Howe.
Information System Security Engineering: A Spiral Approach to Revolution.

Leonard J. LaPadula.
Prospect on Security Paradigms.

Leonard J. LaPadula and James G. Williams.
External Consistency in a Networking Environment.

T. Y. Lin.
Concurrent Automata, Database Computers, and Security: A "New" Security Paradigm for Secure Parallel Processing.

T. Y. Lin.
Bell and LaPadula Axioms: A "New" Paradigm for an "Old" Model.

John McLean.
New Paradigms for High Assurance Software.

Catherine Meadows.
An Outline of a Taxonomy for Computer Security Research and Development.

J. Bret Michael, Edgar H. Sibley, and David C. Littman.
Integration of Formal and Heuristic Reasoning as a Basis for Testing and Debugging Computer Security Policy.

Terry Rooker.
The Reference Monitor: An Idea Whose Time Has Come.

Terry Rooker.
Application Level Security Using an Object-Oriented Graphical User Interface.

Marvin Schaefer.
We Need to Think About the Foundations of Computer Security.

W. R. Shockley.
Identification and Authentication when Users have Multiple Accounts.

James M. Slack.
Security in an Object-Oriented Database.

Mark Smith.
The No-Policy Paradigm: Towards a Policy-Free Protocol Supporting a Secure X Window System.

Ros Strens and John Dobson.
How Responsibility Modelling Leads to Security Requirements.

R. K. Thomas and R. S. Sandhu.
Towards a task-based paradigm for flexible and adaptable access control in distributed applications.

Bhavani Thuraisingham.
Secure Computing with the Actor Paradigm.

James G. Williams.
A Shift in Security Modeling Paradigms.

Kioumars Yazdanian and Frederic Cuppens.
Neighborhood Data and Database Security.