Richard J. Feiertag

According to our database1, Richard J. Feiertag authored at least 13 papers between 1971 and 2003.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2003
PSOS Revisited.
Proceedings of the 19th Annual Computer Security Applications Conference (ACSAC 2003), 2003

2000
Intrusion detection inter-component adaptive negotiation.
Comput. Networks, 2000

1991
A Separation Model for Virtual Machine Monitors.
Proceedings of the 1991 IEEE Symposium on Security and Privacy, 1991

Implicit Discretionary Access Propagation: A new Interpretation of DAC.
Proceedings of the 4th IEEE Computer Security Foundations Workshop, 1991

1989
Does TCB subsetting enhance trust?
Proceedings of the Fifth Annual Computer Security Applications Conference, 1989

1985
Polonium: An Identity Authentication System.
Proceedings of the 1985 IEEE Symposium on Security and Privacy, 1985

1983
A Key Distribution Protocol Using Event Markers
ACM Trans. Comput. Syst., 1983

Processor-per-Domain Guard Architecture.
Proceedings of the 1983 IEEE Symposium on Security and Privacy, 1983

1981
An avenue for exploitation and development of verification technology.
ACM SIGSOFT Softw. Eng. Notes, 1981

1979
The foundations of a provably secure operating system (PSOS).
Proceedings of the 1979 International Workshop on Managing Requirements Knowledge, 1979

1977
Proving Multilevel Security of a System Design.
Proceedings of the Sixth Symposium on Operating System Principles, 1977

1976
Software Development and Proofs of Multi-Level Security.
Proceedings of the 2nd International Conference on Software Engineering, 1976

1971
The MULTICS Input/Output System.
Proceedings of the Third Symposium on Operating System Principles, 1971


  Loading...