2003 |
10 | EE | Peter G. Neumann,
Richard J. Feiertag:
PSOS Revisited.
ACSAC 2003: 208-216 |
2000 |
9 | EE | Richard J. Feiertag,
Stuart Staniford-Chen,
Karl N. Levitt,
Mark Heckman,
Dave Peticolas,
Rick Crawford,
Lee Benzinger,
Sue Rho,
Stephen Wu:
Intrusion detection inter-component adaptive negotiation.
Computer Networks 34(4): 605-621 (2000) |
1999 |
8 | EE | Richard J. Feiertag,
Stuart Staniford-Chen,
Karl N. Levitt,
Mark Heckman,
Dave Peticolas,
Rick Crawford,
Lee Benzinger,
Sue Rho,
Stephen Wu:
Intrusion Detection Inter-component Adaptive Negotiation.
Recent Advances in Intrusion Detection 1999 |
1991 |
7 | | E. John Sebes,
Richard J. Feiertag:
Implicit Discretionary Access Propagation: A new Interpretation of DAC.
CSFW 1991: 183-187 |
6 | | N. L. Kelem,
Richard J. Feiertag:
A Separation Model for Virtual Machine Monitors.
IEEE Symposium on Security and Privacy 1991: 78-86 |
1983 |
5 | | Thomas A. Berson,
Richard J. Feiertag,
R. Kenneth Bauer:
Processor-per-Domain Guard Architecture.
IEEE Symposium on Security and Privacy 1983: 120 |
4 | EE | R. Kenneth Bauer,
Thomas A. Berson,
Richard J. Feiertag:
A Key Distribution Protocol Using Event Markers
ACM Trans. Comput. Syst. 1(3): 249-255 (1983) |
1977 |
3 | | Richard J. Feiertag,
Karl N. Levitt,
Lawrence Robinson:
Proving Multilevel Security of a System Design.
SOSP 1977: 57-65 |
1976 |
2 | | Peter G. Neumann,
Richard J. Feiertag,
Karl N. Levitt,
Lawrence Robinson:
Software Development and Proofs of Multi-Level Security.
ICSE 1976: 421-428 |
1971 |
1 | | Richard J. Feiertag,
Elliott I. Organick:
The MULTICS Input/Output System.
SOSP 1971: 35-41 |