메뉴 건너뛰기




Volumn 32, Issue 1, 1998, Pages 3-20

The DGSA: Unmet information security challenges for operating system designers

Author keywords

[No Author keywords available]

Indexed keywords


EID: 0002713585     PISSN: 01635980     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/280559.280562     Document Type: Article
Times cited : (5)

References (26)
  • 1
    • 0003400251 scopus 로고
    • Air Force Electronic Systems Division, Hanscom AFB, MA. ESD-TR-75-306. Also available through National Technical Information Service, Springfield, VA as NTIS AD-A023588
    • D.E. Bell and L.J. La Padula. 1975. Secure Computer Systems: Unified Exposition and Multics Interpretation. Air Force Electronic Systems Division, Hanscom AFB, MA. ESD-TR-75-306. (Also available through National Technical Information Service, Springfield, VA as NTIS AD-A023588).
    • (1975) Secure Computer Systems: Unified Exposition and Multics Interpretation
    • Bell, D.E.1    La Padula, L.J.2
  • 3
    • 0023266943 scopus 로고
    • A comparison of commercial and military computer security policies
    • Oakland, CA, April 1987
    • David D. Clark and David R. Wilson. 1987. A comparison of commercial and military computer security policies. In Proceedings IEEE Symposium on Security and Privacy, pages 184-194, Oakland, CA, April 1987.
    • (1987) Proceedings IEEE Symposium on Security and Privacy , pp. 184-194
    • Clark, D.D.1    Wilson, D.R.2
  • 5
  • 6
    • 85084163247 scopus 로고
    • Providing Policy Control Over Object Operations in a Mach Based System. June 1995
    • Spencer E. Minear. 1995. Providing Policy Control Over Object Operations in a Mach Based System. In Proceedings of the Fifth USENIX UNIX Security Symposium, pages 141-156, June 1995.
    • (1995) Proceedings of the Fifth USENIX UNIX Security Symposium , pp. 141-156
    • Minear, S.E.1
  • 10
    • 0542358539 scopus 로고    scopus 로고
    • Volume 6 of TAFIM - The DGSA is available through http://www-library.itsi.disa.mil:8018/tafim/as Volume 6 of Version 3.0 and may be downloaded in a variety of forms. The DGSA is available from the NIST Security BBS in WordPerfect and Post-Script formats. The NIST BBS is accessible by anonymous FTP Internet service at csrc.nist.gov (129.6.54.11) and by dial-up modem (9600 baud) at 301-948-5140. For FTP, the files are located in the /bbs/secpubs directory. For download the files are located in #13 directory. Refer to V6README.TXT for a list of the individual files.
    • Volume 6 of TAFIM
  • 19
    • 0016555241 scopus 로고
    • The Protection of Information in Computer Systems
    • September 1975. IEEE, Piscataway, N.J.
    • Jerome H. Saltzer and Michael D. Schroeder. 1975. The Protection of Information in Computer Systems. Proceedings of the IEEE Volume 63, September 1975. IEEE, Piscataway, N.J. pp 1278-1308.
    • (1975) Proceedings of the IEEE , vol.63 , pp. 1278-1308
    • Saltzer, J.H.1    Schroeder, M.D.2
  • 22
    • 0003563348 scopus 로고
    • Van Nostrand Rheinhold Company, New York, ISBN 0-442-23022-2, 1988
    • Morrie Gasser. 1988. Building a Secure Computer System. Van Nostrand Rheinhold Company, New York, ISBN 0-442-23022-2, 1988.
    • (1988) Building a Secure Computer System
    • Gasser, M.1
  • 23
    • 0005314068 scopus 로고
    • National Computer Security Center, Fort George G. Meade, MD. September 1991
    • _. 1991. Integrity in Automated Information Systems. National Computer Security Center, Fort George G. Meade, MD. September 1991.
    • (1991) Integrity in Automated Information Systems


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.