2002 |
10 | EE | Paul A. Karger,
Roger R. Schell:
Thirty Years Later: Lessons from the Multics Security Evaluation.
ACSAC 2002: 119-148 |
2001 |
9 | EE | Roger R. Schell:
Information Security: Science, Pseudoscience, and Flying Pigs.
ACSAC 2001: 205-218 |
1997 |
8 | | James P. Anderson,
Sheila Brand,
Li Gong,
Thomas Haigh,
Steven B. Lipner,
Teresa F. Lunt,
Ruth Nelson,
William Neugent,
Hilarie K. Orman,
Marcus J. Ranum,
Roger R. Schell,
Eugene H. Spafford:
Firewalls: An Expert Roundtable.
IEEE Software 14(5): 60-66 (1997) |
1990 |
7 | EE | Roger R. Schell,
David Bailey:
Taschenlexicon sicherheit der informationstechnik : by Dr. Hartmut Pohl with assistance from Ludger Hutte and Ursula Weiler, DATAKONTEXT-VERLAG Gmbh, Postfach 400253, D-5000 Koln 40, F.R.G., ISBN 3-89209-000-9, 1989.
Computers & Security 9(5): 459-460 (1990) |
6 | EE | Teresa F. Lunt,
Dorothy E. Denning,
Roger R. Schell,
Mark Heckman,
William R. Shockley:
The SeaView Security Model.
IEEE Trans. Software Eng. 16(6): 593-607 (1990) |
1987 |
5 | | Dorothy E. Denning,
Teresa F. Lunt,
Roger R. Schell,
Mark Heckman,
William R. Shockley:
A Multilevel Relational Data Model.
IEEE Symposium on Security and Privacy 1987: 220-234 |
4 | | Dorothy E. Denning,
Selim G. Akl,
Mark Heckman,
Teresa F. Lunt,
Matthew Morgenstern,
Peter G. Neumann,
Roger R. Schell:
Views for Multilevel Database Security.
IEEE Trans. Software Eng. 13(2): 129-140 (1987) |
1986 |
3 | | Dorothy E. Denning,
Selim G. Akl,
Matthew Morgenstern,
Peter G. Neumann,
Roger R. Schell,
Mark Heckman:
Views for Multilevel Database Security.
IEEE Symposium on Security and Privacy 1986: 156-172 |
1984 |
2 | | M. Schaefer,
Roger R. Schell:
Toward an Understanding of Extensible Architectures for Evaluated Trusted Computer System Products.
IEEE Symposium on Security and Privacy 1984: 41-51 |
1983 |
1 | | Roger R. Schell:
Evaluating Security Properties of Computer Systems.
IEEE Symposium on Security and Privacy 1983: 89-95 |