Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Panel Summary: The Future of Software Regulation., , and . NSPW, page 117-126. ACM, (2014)Evolution of a trusted B3 window system prototype., , , , , , , , and . S&P, page 226-239. IEEE Computer Society, (1992)NetWare 4 as an example of role-based access control., and . ACM Workshop on Role-Based Access Control, ACM, (1995)Applying a Reusable Election Threat Model at the County Level., , and . EVT/WOTE, USENIX Association, (2011)A prototype for Trusted X labeling policies.. ACSAC, page 221-230. IEEE, (1990)A prototype B3 trusted X Window System., , , , , , , , and . ACSAC, page 44-55. IEEE, (1991)User interface for a high assurance, windowing system., and . ACSAC, page 256-264. IEEE, (1993)A comparison of trusted X security policies, architectures, and interoperability., and . ACSAC, page 142-152. IEEE, (1992)A High Assurance Window System Prototype., , , , , , , , , and . J. Comput. Secur., 2 (2-3): 159-190 (1993)Virtual Window Systems: A New Approach to Supporting Concurrent Heterogeneous Windowing Systems., and . USENIX Summer, USENIX Association, (1992)