Marshall D. Abrams

According to our database1, Marshall D. Abrams authored at least 36 papers between 1968 and 2004.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2004
Security in Large System Acquisition.
Proceedings of the COTS-Based Software Systems, Third International Conference, 2004

The Relationship of System & Product Specifications and Evaluations.
Proceedings of the 20th Annual Computer Security Applications Conference (ACSAC 2004), 2004

1999
Software Engineering and Security Engineering - An Argument for Merger (panel).
Proceedings of the 12th Conference on Software Engineering Education and Training, 1999

1998
Assurance - What is it?
Proceedings of the Integrity and Internal Control in Information Systems, 1998

Security Engineering in an Evolutionary Acquisition Environment.
Proceedings of the 1998 Workshop on New Security Paradigms, 1998

1995
Striving for correctness.
Comput. Secur., 1995

A higher level of computer security through active policies.
Comput. Secur., 1995

New thinking about information technology security.
Comput. Secur., 1995

Trusted computing update.
Comput. Secur., 1995

Trusted system concepts.
Comput. Secur., 1995

1994
Editorial: why bad things happen to good systems, and what to do about it.
Proceedings of the 10th Annual Computer Security Applications Conference, 1994

1993
Report of an integrity research study group.
Comput. Secur., 1993

Extending the ISO Access Framework for Multiple Policies.
Proceedings of the Computer Security, 1993

Symbiosis Among IT Security Standards, Policies, and Criteria.
Proceedings of the Security and Control of Information Technology in Society, 1993

1992
Rule-based Trusted Access Control.
Proceedings of the IT Security: The Need for International Cooperation, 1992

1990
Computer access control policy choices.
Comput. Secur., 1990

A Generalized Framework for Database Access Controls.
Proceedings of the Database Security, 1990

1988
LAN security: A case study.
Proceedings of the Computer Communication Technologies for the 90's, Proceedings of the Ninth International Conference on Computer Communication, Tel Aviv, Israel, October 30, 1988

1987
Network security: Protocol reference model and the trusted computer system evaluation criteria.
IEEE Netw., 1987

Computer and network security.
IEEE, ISBN: 978-0-8186-0756-1, 1987

1985
Observations on Operating a Local Area Network.
Computer, 1985

1984
Computer networks - a tutorial (4. ed.).
IEEE, ISBN: 978-0-8186-0568-0, 1984

1983
End-To-End Encryption Implementation Problems in an Asynchronous Network.
Proceedings of the Proceedings IEEE INFOCOM 83, San Diego, CA, USA, April 18-21, 1983, 1983

1981
NBS Network Measurement Methodology Applied to Synchronous Communications.
SIGMETRICS Perform. Evaluation Rev., 1981

1980
Role mailboxes.
RFC, May, 1980

1979
Special Feature: A Taxonomy for Valid Test Workload Generation.
Computer, 1979

1977
The NBS Network Measurement System.
IEEE Trans. Commun., 1977

A Methodology for Interactive Computer Service Measurement.
Commun. ACM, 1977

Remote terminal emulation in the procurement of teleprocessing systems.
Proceedings of the American Federation of Information Processing Societies: 1977 National Computer Conference, 1977

Techniques for evaluating the effectiveness of interactive computer service.
Proceedings of the 1977 annual conference, 1977

1976
SIGMETRICS (Panel Session).
Proceedings of the 1976 Annual Conference, Houston, Texas, USA, October 20-22, 1976, 1976

1973
On The Passing Of MOBIDIC-B.
Computer, 1973

Measuring and modelling man-computer interaction.
Proceedings of the 1973 ACM SIGME Symposium, 1973

1972
Serving remote users on the ARPANET.
RFC, July, 1972

1971
Data structures for computer graphics.
ACM SIGPLAN Notices, 1971

1968
A comparative sampling of the systems for producing computer-drawn flowcharts.
Proceedings of the 23rd ACM national conference, 1968


  Loading...