| 1994 |
10 | | Oliver Costich,
John McLean,
John P. McDermott:
Confidentiality in a Replicated Architecture Trusted Database System: A Formal Model.
CSFW 1994: 60-65 |
9 | | Oliver Costich,
Myong H. Kang,
Judith N. Froscher:
The SINTRA Data Model: Structure and Operations.
DBSec 1994: 97-110 |
| 1993 |
8 | | Oliver Costich,
Myong H. Kang:
Maintaining Multilevel Transaction Atomicity in MLS Database Systems with Replicated Architecture.
DBSec 1993: 329-355 |
7 | | Myong H. Kang,
Oliver Costich,
Judith N. Froscher:
Using Object Modeling Techniques to Design MLS Data Models.
Security for Object-Oriented Systems 1993: 203-211 |
| 1992 |
6 | | Ira S. Moskowitz,
Oliver Costich:
A classical Automata Approach to Noninterference Type Problems.
CSFW 1992: 2-8 |
5 | | Oliver Costich,
Sushil Jajodia:
Maintaining Multilevel Transaction Atomicity in MLS Database Systems with Kernelized Architecture.
DBSec 1992: 249-266 |
4 | | Myong H. Kang,
Oliver Costich,
Judith N. Froscher:
A Practical Transaction Model and Untrusted Transaction Manager for a Multilevel-Secure Database System.
DBSec 1992: 285-300 |
| 1991 |
3 | | Oliver Costich,
Ira S. Moskowitz:
Analysis of a Storage Channel in the Two-Phase Commit Protocol.
CSFW 1991: 201-208 |
2 | | Oliver Costich:
Transaction Processing Using an Untrusted Scheduler in a Multilevel Database with Replicated Architecture.
DBSec 1991: 173-189 |
| 1972 |
1 | | Oliver Costich:
A Medvedev Characterization of Sets Recognized by Generalized Finite Automata.
Mathematical Systems Theory 6(3): 263-267 (1972) |