메뉴 건너뛰기




Volumn Part F129440, Issue , 1996, Pages 74-86

A new security policy for distributed resource management and access control

Author keywords

[No Author keywords available]

Indexed keywords

DISTRIBUTED COMPUTER SYSTEMS; NATURAL RESOURCES MANAGEMENT; RESOURCE ALLOCATION; SECURITY SYSTEMS;

EID: 0002263608     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/304851.304870     Document Type: Conference Paper
Times cited : (10)

References (28)
  • 2
    • 0003400251 scopus 로고
    • Secure computer system: Unified exposition and multics interpretation
    • March vailable from the National Technical Information Service as report number: AD A023
    • D. Bell and L. LaPadula. Secure computer system: Unified exposition and multics interpretation. Technical Report MTR-2997, The MITRE Corporation, Bedford, Massachusetts, March 1976. Available from the National Technical Information Service as report number: AD A023 588.
    • (1976) Technical Report MTR-2997 the MITRE Corporation Bedford Massachusetts , pp. 588
    • Bell, D.1    LaPadula, L.2
  • 3
    • 0025477726 scopus 로고
    • A formal protection model of security in centralized, parallel, and distributed systems
    • August
    • G. Benson, I. Akyildiz, and W. Appelbe. A formal protection model of security in centralized, parallel, and distributed systems. ACM Transactions on Computer Systems, 8(3):183-213, August 1990.
    • (1990) ACM Transactions on Computer Systems , vol.8 , Issue.3 , pp. 183-213
    • Benson, G.1    Akyildiz, I.2    Appelbe, W.3
  • 4
    • 0016949746 scopus 로고
    • A lattice model of secure information flow
    • May
    • D. Denning. A lattice model of secure information flow. Communications of the ACM, 19(5):236-243, May 1976.
    • (1976) Communications of the ACM , vol.19 , Issue.5 , pp. 236-243
    • Denning, D.1
  • 9
    • 33846326094 scopus 로고
    • The distributed compartment model for resource management and access control
    • University of Florida, Gainesville, Florida 32611, October Available via anonymous ftp from site ftp.cis.ufl.edu in cis/tech-reports/tr94 as file tr94-035.ps.Z, or via the World Wide Web with as the uniform resource locator
    • S. Greenwald and R. Newman-Wolfe. The distributed compartment model for resource management and access control. Technical Report TR94-035, Department of Computer & Information Sciences, University of Florida, Gainesville, Florida 32611, October 1994. Available via anonymous ftp from site ftp.cis.ufl.edu in cis/tech-reports/tr94 as file tr94-035.ps.Z, or via the World Wide Web with "http://www.cis.ufl.edu/cis/tech-reports" as the uniform resource locator.
    • (1994) Technical Report TR94-035 Department of Computer & Information Sciences
    • Greenwald, S.1    Newman-Wolfe, R.2
  • 10
    • 0027260194 scopus 로고
    • Security in the IEEE mass storage system reference model
    • Monterey, California, April
    • A. Hanushevsky. Security in the IEEE mass storage system reference model. In Twelfth IEEE Symposium on Mass Storage Systems, pages 67-77, Monterey, California, April 1993.
    • (1993) Twelfth IEEE Symposium on Mass Storage Systems , pp. 67-77
    • Hanushevsky, A.1
  • 11
    • 85031736446 scopus 로고
    • January Object Management Group, Framingham Corporation Center, 492 Old Connecticut Path, Framingham, Massachusetts Draft 4.0 of the Common Facilities Task Force Architecture document. Also available on the World Wide Web at URL
    • A. Hütt, Editor. Common facilities architecture draft 4.0. Technical report, Object Management Group, Framingham Corporation Center, 492 Old Connecticut Path, Framingham, Massachusetts 01701-4568, January 1995. Draft 4.0 of the Common Facilities Task Force Architecture document. Also available on the World Wide Web at URL: http://www.omg.org/docs/1995/95-01-02.ps.
    • (1995) Common Facilities Architecture Draft 4.0. Technical Report , pp. 01701-4568
    • Hütt, A.1
  • 12
    • 0015672289 scopus 로고
    • A note on the confinement problem
    • October
    • B. Lampson. A note on the confinement problem. Communications of the ACM, 16(10):613-615, October 1973.
    • (1973) Communications of the ACM , vol.16 , Issue.10 , pp. 613-615
    • Lampson, B.1
  • 13
    • 84942392263 scopus 로고
    • Military message systems: Requirements and security model
    • Naval Research Laboratory, Washington, D.C., September
    • C. Landwehr and C. Heitmeyer. Military message systems: Requirements and security model. Memorandum Report 4925, Naval Research Laboratory, Washington, D.C., September 1982.
    • (1982) Memorandum Report 4925
    • Landwehr, C.1    Heitmeyer, C.2
  • 15
    • 0022012611 scopus 로고
    • A comment on the basic security theorem of Bell and LaPadula
    • February
    • J. McLean. A comment on the "basic security theorem" of Bell and LaPadula. Information Processing Letters, 20(2):67-70, February 1985.
    • (1985) Information Processing Letters , vol.20 , Issue.2 , pp. 67-70
    • McLean, J.1
  • 17
    • 0010512569 scopus 로고
    • A guide to understanding covert channel analysis of trusted systems
    • National Computer Security Center National Security Agency, Fort George G. Meade, Maryland
    • National Computer Security Center. A guide to understanding covert channel analysis of trusted systems. Technical Report NCSC-TG-030 Version-1, National Security Agency, Fort George G. Meade, Maryland, 1993.
    • (1993) Technical Report NCSC-TG-030 Version-1
  • 18
    • 0010311985 scopus 로고
    • A brief overview of the DCS distributed conferencing system
    • Summer Usenix Conference, Nashville, Tennessee, June 1991
    • R. Newman-Wolfe, C. Ramirez, H. Pelimuhandiram, M. Montes, M. Webb, and D. Wilson. A brief overview of the DCS distributed conferencing system. In Proceedings of the U SENIX 1991 Summer Usenix Conference, pages 437-452, Nashville, Tennessee, June 1991.
    • (1991) Proceedings of the U SENIX , pp. 437-452
    • Newman-Wolfe, R.1    Ramirez, C.2    Pelimuhandiram, H.3    Montes, M.4    Webb, M.5    Wilson, D.6
  • 19
    • 0004198635 scopus 로고
    • Prentice-Hall, Inc., Englewood Cliffs, New Jersey
    • C. Pfleeger. Security in Computing. Prentice-Hall, Inc., Englewood Cliffs, New Jersey, 1989.
    • (1989) Security in Computing
    • Pfleeger, C.1
  • 21
    • 0030086382 scopus 로고    scopus 로고
    • Role-based access control models
    • February
    • R. Sandhu, E. Coyne, H. Feinstein, and C. Youman. Role-based access control models. Computer, 29(2):38-47, February 1996.
    • (1996) Computer , vol.29 , Issue.2 , pp. 38-47
    • Sandhu, R.1    Coyne, E.2    Feinstein, H.3    Youman, C.4
  • 22
    • 0024714097 scopus 로고
    • Integrating security in a large distributed system
    • August
    • M. Satyanarayanan. Integrating security in a large distributed system. ACM Transactions on Computer Systems, 7(3):247-280, August 1989.
    • (1989) ACM Transactions on Computer Systems , vol.7 , Issue.3 , pp. 247-280
    • Satyanarayanan, M.1
  • 23
    • 0347577581 scopus 로고
    • Secure distributed computing
    • November
    • J. Schiller. Secure distributed computing. Scientific American, pages 72-76, November 1994.
    • (1994) Scientific American , pp. 72-76
    • Schiller, J.1
  • 24
    • 0001636850 scopus 로고
    • Kerberos: An authentication service for open network systems
    • Winter USENIX Conference, Dallas, Texas, February 1988
    • J. Steiner, C. Neuman, and J. Schiller. Kerberos: An authentication service for open network systems. In Proceedings of the 1988 Winter USENIX Conference, pages 191-202, Dallas, Texas, February 1988.
    • (1988) Proceedings of the , pp. 191-202
    • Steiner, J.1    Neuman, C.2    Schiller, J.3
  • 25
    • 0023420349 scopus 로고
    • Formal specification of an access control system
    • September
    • S. Stepney and S. Lord. Formal specification of an access control system. Software-Practice and Experience, 17(9):575-593, September 1987.
    • (1987) Software-Practice and Experience , vol.17 , Issue.9 , pp. 575-593
    • Stepney, S.1    Lord, S.2
  • 26
    • 84949270672 scopus 로고
    • User's manual for the secure military message system M2 prototype
    • Naval Research Laboratory, Washington, D.C., March
    • B. Tretick, M. Cornwell, C. Landwehr, R. Jacob, and J. Tschohl. User's manual for the secure military message system M2 prototype. Memorandum Report 5757, Naval Research Laboratory, Washington, D.C., March 1986.
    • (1986) Memorandum Report 5757
    • Tretick, B.1    Cornwell, M.2    Landwehr, C.3    Jacob, R.4    Tschohl, J.5
  • 27
    • 84976775333 scopus 로고
    • Military message experiment- i executive summary
    • Naval Research Laboratory, Washington, D.C., March Available from the National Technical Information Service as report number: AD A112
    • S. Wilson, N. Goodwin, E. Bersoff, and I. Thomas N.M. Military message experiment-vol. I executive summary. Technical Report NRL Rep. 4454, Naval Research Laboratory, Washington, D.C., March 1982. Available from the National Technical Information Service as report number: AD A112 789.
    • (1982) Technical Report NRL Rep 4454 , pp. 789
    • Wilson, S.1    Goodwin, N.2    Bersoff, E.3    Thomas, N.M.I.4
  • 28
    • 85072531344 scopus 로고    scopus 로고
    • Applications for multilevel secure operating systems
    • Reston, Virginia, June 4-7 1979
    • J. Woodward. Applications for multilevel secure operating systems. In Proceedings of the AFIPS 1979 National Computer Conference, volume 48, pages 319-328, Reston, Virginia, June 4-7 1979.
    • Proceedings of the AFIPS 1979 National Computer Conference , vol.48 , pp. 319-328
    • Woodward, J.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.