Paul D. Stachour

Learn More
In a multilevel secure database management system (MLS/ DBMS) users cleared at different security levels access and share a database consisting of data at a variety of sensitivity levels. The system should ensure that the users only acquire the information to which they are authorized. This is difficult as users could pose multiple queries and deduce(More)
Use of reusable software is key to significant gains in programmer productivity. However, in order to effectively develop it, measurable characteristics of reusability supported by guidelines for implementing them in source code are necessary. This paper describes an ongoing research project at the Honeywell Computer Sciences Center (CSC) to define these(More)
S o m e o n e ra ised the concern that by discuss ing extensions , doesn ' t this sound an a l a rm that ASIS is not mature and is not comple t e? This is hardly the case. The matur i ty o f ASIS has a l ready been demons t ra ted with the Ada C o m p i l e r Val ida t ion Capabi l i ty ( A C V C ) using ASIS for GNAT_ The A C V C was compi led . ASIS was(More)
  • 1