2007 |
9 | EE | Jeremy Epstein:
Electronic Voting.
IEEE Computer 40(8): 92-95 (2007) |
2006 |
8 | EE | Jeremy Epstein:
Fifteen Years after TX: A Look Back at High Assurance Multi-Level Secure Windowing.
ACSAC 2006: 301-320 |
7 | EE | Jeremy Epstein,
Scott R. Matsumoto,
Gary McGraw:
Software Security and SOA: Danger, Will Robinson!
IEEE Security & Privacy 4(1): 80-83 (2006) |
2000 |
6 | EE | Jeremy Epstein,
L. Thomas,
Eric Monteith:
Using Operating System Wrappers to Increase the Resiliency to Commercial Firewalls.
ACSAC 2000: 236-245 |
1999 |
5 | EE | Jeremy Epstein:
Architecture and Concepts of the ARGuE Guard.
ACSAC 1999: 45-54 |
1996 |
4 | EE | Jeremy Epstein,
Tim Williams:
Using Fortezza For Transparent File Encryption.
ACSAC 1996: 140-147 |
1995 |
3 | EE | Jeremy Epstein,
Ravi S. Sandhu:
NetWare 4 as an example of role-based access control.
ACM Workshop on Role-Based Access Control 1995 |
1993 |
2 | | Jeremy Epstein,
John McHugh,
Hilarie K. Orman,
R. Pascale,
Ann B. Marmor-Squires,
B. Danner,
C. Martin,
M. Branstad,
J. Benson,
D. Rothnie:
A High Assurance Window System Prototype.
Journal of Computer Security 2(2-3): 159-190 (1993) |
1990 |
1 | | Jeremy Epstein,
Marvin Shugerman:
A Trusted X Window System Server for Trusted Mach.
USENIX MACH Symposium 1990: 141-156 |