Modeling the “multipolicy machine” (DOI)
D. Elliott Bell
Messages, communication, information security and value (DOI)
John Dobson
New email security infrastructure (DOI)
Martin Ferris
“HIS-Treck -- the next generation”: an introduction to future hospital information systems (DOI)
Thomas L. Lincoln
Healthcare information architecture: elements of a new paradigm (DOI)
Daniel J. Essin, Thomas L. Lincoln
Anomaly detection: a soft computing approach (DOI)
T. Y. Lin
Fuzzy sets and secure computer systems (DOI)
Sergei Ovchinnikov
Formal semantics of confidentiality in multilevel logic databases (DOI)
Adrian Spalka
What is a secret—and—what does that have to do with computer security? (DOI)
Ruth Nelson
A new approach to security system development (DOI)
Silvana Castano, Giancarlo Martella, Pierangela Samarati
Providing non-hierarchical security through interface mechanisms (DOI)
Deborah Hamilton
Designing encryption algorithms for real people (DOI)
Bruce Schneier
A discretionary access control model with temporal authorizations (DOI)
Elisa Bertino, Claudio Bettini, Pierangela Samarati
Versatile integrity and security environment (VISE) for computer systems (DOI)
Charles G. Limoges, Ruth R. Nelson, John H. Heimann, David S. Becker