Jeffrey Picciotto

According to our database1, Jeffrey Picciotto authored at least 7 papers between 1987 and 1994.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

1994
Extended labeling policies for enhanced application support.
Comput. Secur., 1994

1992
A comparison of trusted X security policies, architectures, and interoperability.
Proceedings of the Eighth Annual Computer Security Applications Conference, 1992

1991
Towards trusted cut and paste in the X Window System.
Proceedings of the Seventh Annual Computer Security Applications Conference, 1991

1990
Compartmented Mode Workstation: Prototype Highlights.
IEEE Trans. Software Eng., 1990

1987
The Design of an Effective Auditing Subsystem.
Proceedings of the 1987 IEEE Symposium on Security and Privacy, 1987

Compartimented Mode Workstation: Results Through Prototyping.
Proceedings of the 1987 IEEE Symposium on Security and Privacy, 1987

Privileges and their use by trusted applications.
Proceedings of the 1987 Fall Joint Computer Conference on Exploring technology: today and tomorrow, 1987


  Loading...