The conference--held December 1990 in Tucson, Arizona--showcased over 50 contributions and panels on network security, cryptography, formal methods, trusted DBMS research, international standards, trusted user interface issues, security engineering risk assessment and audit, ethics, computer crime, COMPUSEC labs in government, and development of trusted systems. No subject index. Acidic paper. Annotation copyrighted by Book News, Inc., Portland, ORPaul T. Ward, aquot;The Transformation Schema: An Extension of the Data Flow Diagram to Represent Timing and Control, aquot; IEEE Transactions on Software Engineering, SE-12. ... Melir Page- Jones, The Practical Guide to Structured Systems Design, Yourdon Press, 1988. 17. ... IEEE, Standard for Software Quality Assurance Plans, ANSI/IEEE Std 730-1984, 17 December 1984. 36. ... C. Hoare, aquot;Proofs of Correctness of Data Representationsaquot;, Acta Informatica, 1, 1, 1972, pp. 217-281. 39.
Title | : | Proceedings of the Sixth Annual Computer Security Applications Conference |
Author | : | IEEE Computer Society |
Publisher | : | IEEE Computer Society - 1990 |
You must register with us as either a Registered User before you can Download this Book. You'll be greeted by a simple sign-up page.
Once you have finished the sign-up process, you will be redirected to your download Book page.
How it works: