Roger R. Schell

Orcid: 0000-0002-5331-1780

According to our database1, Roger R. Schell authored at least 24 papers between 1974 and 2016.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2016
Using Proven Reference Monitor Patterns for Security Evaluation.
Inf., 2016

Cyber defense triad for where security matters.
Commun. ACM, 2016

2015
A multi-level secure file sharing server and its application to a multi-level secure cloud.
Proceedings of the 34th IEEE Military Communications Conference, 2015

2012
A high-assurance, virtual guard architecture.
Proceedings of the 31st IEEE Military Communications Conference, 2012

2011
Using a high assurance TCB for infrastructure security.
Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, 2011

2002
Thirty Years Later: Lessons from the Multics Security Evaluation.
Proceedings of the 18th Annual Computer Security Applications Conference (ACSAC 2002), 2002

2001
Information Security: Science, Pseudoscience, and Flying Pigs.
Proceedings of the 17th Annual Computer Security Applications Conference (ACSAC 2001), 2001

2000
Platform Security: What is Lacking?
Inf. Secur. Tech. Rep., 2000

1997
Firewalls: An Expert Roundtable.
IEEE Softw., 1997

1990
The SeaView Security Model.
IEEE Trans. Software Eng., 1990

Taschenlexicon sicherheit der informationstechnik : by Dr. Hartmut Pohl with assistance from Ludger Hutte and Ursula Weiler, DATAKONTEXT-VERLAG Gmbh, Postfach 400253, D-5000 Koln 40, F.R.G., ISBN 3-89209-000-9, 1989.
Comput. Secur., 1990

Architecture for an embedded secure data base management system.
Proceedings of the Sixth Annual Computer Security Applications Conference, 1990

1988
Element-level classification with A1 assurance.
Comput. Secur., 1988

A near-term design for the SeaView multilevel database system.
Proceedings of the 1988 IEEE Symposium on Security and Privacy, 1988

1987
Views for Multilevel Database Security.
IEEE Trans. Software Eng., 1987

A Multilevel Relational Data Model.
Proceedings of the 1987 IEEE Symposium on Security and Privacy, 1987

1986
Views for Multilevel Database Security.
Proceedings of the 1986 IEEE Symposium on Security and Privacy, 1986

1984
Toward an Understanding of Extensible Architectures for Evaluated Trusted Computer System Products.
Proceedings of the 1984 IEEE Symposium on Security and Privacy, Oakland, California, USA, April 29, 1984

1983
A Security Kernel for a Multiprocessor Microcomputer.
Computer, 1983

Security Kernel Design and Implementation: An Introduction.
Computer, 1983

Evaluating Security Properties of Computer Systems.
Proceedings of the 1983 IEEE Symposium on Security and Privacy, 1983

1981
Mechanism Sufficiency Validation by Assignment.
Proceedings of the 1981 IEEE Symposium on Security and Privacy, 1981

The Structure of a Security Kernel for the Z8000 Multiprocessor.
Proceedings of the 1981 IEEE Symposium on Security and Privacy, 1981

1974
Security kernels.
Proceedings of the American Federation of Information Processing Societies: 1974 National Computer Conference, 1974


  Loading...