Search the dblp DataBase
George W. Dinolt :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
George W. Dinolt , Lee Benzinger , Mark Yatabe Combining Components and Policies. [Citation Graph (0, 0)][DBLP ] CSFW, 1994, pp:22-33 [Conf ] Cynthia E. Irvine , David J. Shifflett , Paul Clark , Timothy E. Levin , George W. Dinolt MYSEA Technology Demonstration. [Citation Graph (0, 0)][DBLP ] DISCEX (2), 2003, pp:10-12 [Conf ] Cynthia E. Irvine , David J. Shifflett , Paul Clark , Timothy E. Levin , George W. Dinolt Monterey Security Enhanced Architecture Project. [Citation Graph (0, 0)][DBLP ] DISCEX (2), 2003, pp:176-181 [Conf ] Craig W. Rasmussen , Cynthia E. Irvine , George W. Dinolt , Timothy E. Levin , Karen L. Burke A Program for Education in Certification and Accreditation. [Citation Graph (0, 0)][DBLP ] World Conference on Information Security Education, 2003, pp:131-149 [Conf ] George W. Dinolt , Richard B. Neely , P. C. Baker , J. Freeman Multinet Gateway-Towards A1 Certification. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 1984, pp:226-226 [Conf ] J. C. Williams , George W. Dinolt A Graph-Theoretic Formulation of Multilevel Secure Distributed Systems: An Overview. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 1987, pp:97-105 [Conf ] J. C. Williams , George W. Dinolt Formal Model of a Trusted File Server. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 1989, pp:157-166 [Conf ] Cube-Type Algebraic Attacks on Wireless Encryption Protocols. [Citation Graph (, )][DBLP ] Search in 0.001secs, Finished in 0.002secs