-
2
-
-
0003400251
-
Secure computer system: Unified exposition and multics interpretation
-
March vailable from the National Technical Information Service as report number: AD A023
-
D. Bell and L. LaPadula. Secure computer system: Unified exposition and multics interpretation. Technical Report MTR-2997, The MITRE Corporation, Bedford, Massachusetts, March 1976. Available from the National Technical Information Service as report number: AD A023 588.
-
(1976)
Technical Report MTR-2997 the MITRE Corporation Bedford Massachusetts
, pp. 588
-
-
Bell, D.1
LaPadula, L.2
-
3
-
-
0025477726
-
A formal protection model of security in centralized, parallel, and distributed systems
-
August
-
G. Benson, I. Akyildiz, and W. Appelbe. A formal protection model of security in centralized, parallel, and distributed systems. ACM Transactions on Computer Systems, 8(3):183-213, August 1990.
-
(1990)
ACM Transactions on Computer Systems
, vol.8
, Issue.3
, pp. 183-213
-
-
Benson, G.1
Akyildiz, I.2
Appelbe, W.3
-
4
-
-
0016949746
-
A lattice model of secure information flow
-
May
-
D. Denning. A lattice model of secure information flow. Communications of the ACM, 19(5):236-243, May 1976.
-
(1976)
Communications of the ACM
, vol.19
, Issue.5
, pp. 236-243
-
-
Denning, D.1
-
6
-
-
84937399920
-
Issues in discretionary access control
-
Oakland, California
-
D. Downs, J. Rub, K. Kung, and C. Jordan. Issues in discretionary access control. In Proceedings of the 1985 Symposium on Security and Privacy, pages 208-218, Oakland, California, 1985.
-
(1985)
Proceedings of the 1985 Symposium on Security and Privacy
, pp. 208-218
-
-
Downs, D.1
Rub, J.2
Kung, K.3
Jordan, C.4
-
9
-
-
33846326094
-
The distributed compartment model for resource management and access control
-
University of Florida, Gainesville, Florida 32611, October Available via anonymous ftp from site ftp.cis.ufl.edu in cis/tech-reports/tr94 as file tr94-035.ps.Z, or via the World Wide Web with as the uniform resource locator
-
S. Greenwald and R. Newman-Wolfe. The distributed compartment model for resource management and access control. Technical Report TR94-035, Department of Computer & Information Sciences, University of Florida, Gainesville, Florida 32611, October 1994. Available via anonymous ftp from site ftp.cis.ufl.edu in cis/tech-reports/tr94 as file tr94-035.ps.Z, or via the World Wide Web with "http://www.cis.ufl.edu/cis/tech-reports" as the uniform resource locator.
-
(1994)
Technical Report TR94-035 Department of Computer & Information Sciences
-
-
Greenwald, S.1
Newman-Wolfe, R.2
-
10
-
-
0027260194
-
Security in the IEEE mass storage system reference model
-
Monterey, California, April
-
A. Hanushevsky. Security in the IEEE mass storage system reference model. In Twelfth IEEE Symposium on Mass Storage Systems, pages 67-77, Monterey, California, April 1993.
-
(1993)
Twelfth IEEE Symposium on Mass Storage Systems
, pp. 67-77
-
-
Hanushevsky, A.1
-
11
-
-
85031736446
-
-
January Object Management Group, Framingham Corporation Center, 492 Old Connecticut Path, Framingham, Massachusetts Draft 4.0 of the Common Facilities Task Force Architecture document. Also available on the World Wide Web at URL
-
A. Hütt, Editor. Common facilities architecture draft 4.0. Technical report, Object Management Group, Framingham Corporation Center, 492 Old Connecticut Path, Framingham, Massachusetts 01701-4568, January 1995. Draft 4.0 of the Common Facilities Task Force Architecture document. Also available on the World Wide Web at URL: http://www.omg.org/docs/1995/95-01-02.ps.
-
(1995)
Common Facilities Architecture Draft 4.0. Technical Report
, pp. 01701-4568
-
-
Hütt, A.1
-
12
-
-
0015672289
-
A note on the confinement problem
-
October
-
B. Lampson. A note on the confinement problem. Communications of the ACM, 16(10):613-615, October 1973.
-
(1973)
Communications of the ACM
, vol.16
, Issue.10
, pp. 613-615
-
-
Lampson, B.1
-
13
-
-
84942392263
-
Military message systems: Requirements and security model
-
Naval Research Laboratory, Washington, D.C., September
-
C. Landwehr and C. Heitmeyer. Military message systems: Requirements and security model. Memorandum Report 4925, Naval Research Laboratory, Washington, D.C., September 1982.
-
(1982)
Memorandum Report 4925
-
-
Landwehr, C.1
Heitmeyer, C.2
-
14
-
-
84976780900
-
A security model for military message systems
-
August
-
C. Landwehr, C. Heitmeyer, and J. McLean. A security model for military message systems. ACM Transactions on Computer Systems, 2(3):198-222, August 1984.
-
(1984)
ACM Transactions on Computer Systems
, vol.2
, Issue.3
, pp. 198-222
-
-
Landwehr, C.1
Heitmeyer, C.2
McLean, J.3
-
15
-
-
0022012611
-
A comment on the basic security theorem of Bell and LaPadula
-
February
-
J. McLean. A comment on the "basic security theorem" of Bell and LaPadula. Information Processing Letters, 20(2):67-70, February 1985.
-
(1985)
Information Processing Letters
, vol.20
, Issue.2
, pp. 67-70
-
-
McLean, J.1
-
16
-
-
0025435009
-
Amoeba a distributed operating system for the 1990s
-
May
-
S. MuIIender, G. van Rossum, A. Tanenbaum, R. van Renesse, and H. van Staveren. Amoeba a distributed operating system for the 1990s. Computer, pages 44-53, May 1990.
-
(1990)
Computer
, pp. 44-53
-
-
Mullender, S.1
Van Rossum, G.2
Tanenbaum, A.3
Van Renesse, R.4
Van Staveren, H.5
-
17
-
-
0010512569
-
A guide to understanding covert channel analysis of trusted systems
-
National Computer Security Center National Security Agency, Fort George G. Meade, Maryland
-
National Computer Security Center. A guide to understanding covert channel analysis of trusted systems. Technical Report NCSC-TG-030 Version-1, National Security Agency, Fort George G. Meade, Maryland, 1993.
-
(1993)
Technical Report NCSC-TG-030 Version-1
-
-
-
18
-
-
0010311985
-
A brief overview of the DCS distributed conferencing system
-
Summer Usenix Conference, Nashville, Tennessee, June 1991
-
R. Newman-Wolfe, C. Ramirez, H. Pelimuhandiram, M. Montes, M. Webb, and D. Wilson. A brief overview of the DCS distributed conferencing system. In Proceedings of the U SENIX 1991 Summer Usenix Conference, pages 437-452, Nashville, Tennessee, June 1991.
-
(1991)
Proceedings of the U SENIX
, pp. 437-452
-
-
Newman-Wolfe, R.1
Ramirez, C.2
Pelimuhandiram, H.3
Montes, M.4
Webb, M.5
Wilson, D.6
-
19
-
-
0004198635
-
-
Prentice-Hall, Inc., Englewood Cliffs, New Jersey
-
C. Pfleeger. Security in Computing. Prentice-Hall, Inc., Englewood Cliffs, New Jersey, 1989.
-
(1989)
Security in Computing
-
-
Pfleeger, C.1
-
20
-
-
0028699105
-
Role-based access control: A multi-dimensional view
-
Orlando, Florida, December
-
R. Sandhu, E. Coyne, H. Feinstein, and C. Youman. Role-based access control: A multi-dimensional view. In Tenth Annual Computer Security Applications Conference, pages 54-62, Orlando, Florida, December 1994.
-
(1994)
Tenth Annual Computer Security Applications Conference
, pp. 54-62
-
-
Sandhu, R.1
Coyne, E.2
Feinstein, H.3
Youman, C.4
-
21
-
-
0030086382
-
Role-based access control models
-
February
-
R. Sandhu, E. Coyne, H. Feinstein, and C. Youman. Role-based access control models. Computer, 29(2):38-47, February 1996.
-
(1996)
Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.1
Coyne, E.2
Feinstein, H.3
Youman, C.4
-
22
-
-
0024714097
-
Integrating security in a large distributed system
-
August
-
M. Satyanarayanan. Integrating security in a large distributed system. ACM Transactions on Computer Systems, 7(3):247-280, August 1989.
-
(1989)
ACM Transactions on Computer Systems
, vol.7
, Issue.3
, pp. 247-280
-
-
Satyanarayanan, M.1
-
23
-
-
0347577581
-
Secure distributed computing
-
November
-
J. Schiller. Secure distributed computing. Scientific American, pages 72-76, November 1994.
-
(1994)
Scientific American
, pp. 72-76
-
-
Schiller, J.1
-
24
-
-
0001636850
-
Kerberos: An authentication service for open network systems
-
Winter USENIX Conference, Dallas, Texas, February 1988
-
J. Steiner, C. Neuman, and J. Schiller. Kerberos: An authentication service for open network systems. In Proceedings of the 1988 Winter USENIX Conference, pages 191-202, Dallas, Texas, February 1988.
-
(1988)
Proceedings of the
, pp. 191-202
-
-
Steiner, J.1
Neuman, C.2
Schiller, J.3
-
25
-
-
0023420349
-
Formal specification of an access control system
-
September
-
S. Stepney and S. Lord. Formal specification of an access control system. Software-Practice and Experience, 17(9):575-593, September 1987.
-
(1987)
Software-Practice and Experience
, vol.17
, Issue.9
, pp. 575-593
-
-
Stepney, S.1
Lord, S.2
-
26
-
-
84949270672
-
User's manual for the secure military message system M2 prototype
-
Naval Research Laboratory, Washington, D.C., March
-
B. Tretick, M. Cornwell, C. Landwehr, R. Jacob, and J. Tschohl. User's manual for the secure military message system M2 prototype. Memorandum Report 5757, Naval Research Laboratory, Washington, D.C., March 1986.
-
(1986)
Memorandum Report 5757
-
-
Tretick, B.1
Cornwell, M.2
Landwehr, C.3
Jacob, R.4
Tschohl, J.5
-
27
-
-
84976775333
-
Military message experiment- i executive summary
-
Naval Research Laboratory, Washington, D.C., March Available from the National Technical Information Service as report number: AD A112
-
S. Wilson, N. Goodwin, E. Bersoff, and I. Thomas N.M. Military message experiment-vol. I executive summary. Technical Report NRL Rep. 4454, Naval Research Laboratory, Washington, D.C., March 1982. Available from the National Technical Information Service as report number: AD A112 789.
-
(1982)
Technical Report NRL Rep 4454
, pp. 789
-
-
Wilson, S.1
Goodwin, N.2
Bersoff, E.3
Thomas, N.M.I.4
-
28
-
-
85072531344
-
Applications for multilevel secure operating systems
-
Reston, Virginia, June 4-7 1979
-
J. Woodward. Applications for multilevel secure operating systems. In Proceedings of the AFIPS 1979 National Computer Conference, volume 48, pages 319-328, Reston, Virginia, June 4-7 1979.
-
Proceedings of the AFIPS 1979 National Computer Conference
, vol.48
, pp. 319-328
-
-
Woodward, J.1
|