| 2003 |
| 10 | EE | Peter G. Neumann,
Richard J. Feiertag:
PSOS Revisited.
ACSAC 2003: 208-216 |
| 2000 |
| 9 | EE | Richard J. Feiertag,
Stuart Staniford-Chen,
Karl N. Levitt,
Mark Heckman,
Dave Peticolas,
Rick Crawford,
Lee Benzinger,
Sue Rho,
Stephen Wu:
Intrusion detection inter-component adaptive negotiation.
Computer Networks 34(4): 605-621 (2000) |
| 1999 |
| 8 | EE | Richard J. Feiertag,
Stuart Staniford-Chen,
Karl N. Levitt,
Mark Heckman,
Dave Peticolas,
Rick Crawford,
Lee Benzinger,
Sue Rho,
Stephen Wu:
Intrusion Detection Inter-component Adaptive Negotiation.
Recent Advances in Intrusion Detection 1999 |
| 1991 |
| 7 | | E. John Sebes,
Richard J. Feiertag:
Implicit Discretionary Access Propagation: A new Interpretation of DAC.
CSFW 1991: 183-187 |
| 6 | | N. L. Kelem,
Richard J. Feiertag:
A Separation Model for Virtual Machine Monitors.
IEEE Symposium on Security and Privacy 1991: 78-86 |
| 1983 |
| 5 | | Thomas A. Berson,
Richard J. Feiertag,
R. Kenneth Bauer:
Processor-per-Domain Guard Architecture.
IEEE Symposium on Security and Privacy 1983: 120 |
| 4 | EE | R. Kenneth Bauer,
Thomas A. Berson,
Richard J. Feiertag:
A Key Distribution Protocol Using Event Markers
ACM Trans. Comput. Syst. 1(3): 249-255 (1983) |
| 1977 |
| 3 | | Richard J. Feiertag,
Karl N. Levitt,
Lawrence Robinson:
Proving Multilevel Security of a System Design.
SOSP 1977: 57-65 |
| 1976 |
| 2 | | Peter G. Neumann,
Richard J. Feiertag,
Karl N. Levitt,
Lawrence Robinson:
Software Development and Proofs of Multi-Level Security.
ICSE 1976: 421-428 |
| 1971 |
| 1 | | Richard J. Feiertag,
Elliott I. Organick:
The MULTICS Input/Output System.
SOSP 1971: 35-41 |