Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Role mailboxes.. RFC, (May 1980)NBS Network Measurement Methodology Applied to Synchronous Communications., and . SIGMETRICS Perform. Evaluation Rev., 10 (2): 29-36 (1981)Network security: Protocol reference model and the trusted computer system evaluation criteria., and . IEEE Netw., 1 (2): 24-33 (1987)Trusted computing update., and . Comput. Secur., 14 (1): 57-68 (1995)End-To-End Encryption Implementation Problems in an Asynchronous Network.. INFOCOM, page 257-264. IEEE, (1983)Special Feature: A Taxonomy for Valid Test Workload Generation., and . Computer, 12 (12): 60-65 (1979)The Relationship of System & Product Specifications and Evaluations.. ACSAC, page 112-113. IEEE Computer Society, (2004)Symbiosis Among IT Security Standards, Policies, and Criteria.. Security and Control of Information Technology in Society, volume A-43 of IFIP Transactions, page 145-159. North-Holland, (1993)A Methodology for Interactive Computer Service Measurement., and . Commun. ACM, 20 (12): 936-944 (1977)A higher level of computer security through active policies., and . Comput. Secur., 14 (2): 147-157 (1995)