Title :
Proceedings of the Sixth Annual Computer Security Applications Conference (Cat. No.90TH0351-7)
Abstract :
The following topics are dealt with: network security; cryptography; formal methods; trusted DBMS (database management system) research; international standards; trusted user interfaces; risk assessment in security engineering; open systems; auditing; integrity; system design and architecture; nonmilitary systems; and Department of Defense (DoD) applications
Keywords :
computer networks; cryptography; data integrity; database management systems; military computing; open systems; security of data; standards; user interfaces; Department of Defense; DoD applications; auditing; cryptography; database management system; formal methods; integrity; international standards; network security; nonmilitary systems; open systems; risk assessment; security engineering; system design; trusted DBMS; trusted user interfaces;
Conference_Titel :
Computer Security Applications Conference, 1990., Proceedings of the Sixth Annual
Conference_Location :
Tucson, AZ, USA
Print_ISBN :
0-8186-2105-2
DOI :
10.1109/CSAC.1990.143782