메뉴 건너뛰기




Volumn 33, Issue 2, 1999, Pages 51-64

Embedding security policies into a distributed computing environment

Author keywords

Custodian; DCE; Distributed computing environment; Information domain; Micro kernel; Multipolicy system; Policy domain; Policy persistency; Policy separation; Reference monitor; Security policy

Indexed keywords


EID: 0009423019     PISSN: 01635980     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/311094.311105     Document Type: Article
Times cited : (5)

References (21)
  • 3
    • 0030644182 scopus 로고    scopus 로고
    • Security engineering of lattice-based policies
    • Rockport, Massachusetts . IEEE Press
    • Ciarán Bryce. Security Engineering of Lattice-Based Policies. In Proceedings of the Computer Security Foundations Workshop, pages 195-207, Rockport, Massachusetts, 1997. IEEE Press.
    • (1997) Proceedings of the Computer Security Foundations Workshop , pp. 195-207
    • Bryce, C.1
  • 5
    • 0023266943 scopus 로고
    • A comparsion of commercial and military computer security policies
    • IEEE Computer Society, April
    • David D. Clark and David R. Wilson. A Comparsion of Commercial and Military Computer Security Policies. In Proceedings of the IEEE Symposium on Security and Privacy, pages 184-194. IEEE Computer Society, April 1987.
    • (1987) Proceedings of the IEEE Symposium on Security and Privacy , pp. 184-194
    • Clark, D.D.1    Wilson, D.R.2
  • 6
    • 0016949746 scopus 로고
    • A lattice model of secure information flow
    • May
    • Dorothy E. Denning. A Lattice Model of Secure Information Flow. Communications of the ACM, 19(5):236-242, May 1976.
    • (1976) Communications of the ACM , vol.19 , Issue.5 , pp. 236-242
    • Denning, D.E.1
  • 11
    • 85034119114 scopus 로고    scopus 로고
    • GMD Technical Report (to appear), German National Research Center for Information Technology, St. Augustin, Germany
    • Winfried E. Kühnhauser and Martin Protzen. An Automatic Code Generator for Skippy Types. GMD Technical Report (to appear), German National Research Center for Information Technology, St. Augustin, Germany, 1999.
    • (1999) An Automatic Code Generator for Skippy Types
    • Kühnhauser, W.E.1    Protzen, M.2
  • 12
    • 0029192605 scopus 로고    scopus 로고
    • A paradigm for user-defined security policies
    • Bad Neuenahr, Germany, September 1995. IEEE Computer Society Press
    • Winfried E. Kühnhauser. A Paradigm for User-Defined Security Policies. In Proceedings of the 14th IEEE Symposium on Reliable Distributed Systems, pages 135-144, Bad Neuenahr, Germany, September 1995. IEEE Computer Society Press.
    • Proceedings of the 14th IEEE Symposium on Reliable Distributed Systems , pp. 135-144
    • Kühnhauser, W.E.1
  • 13
    • 0039479451 scopus 로고    scopus 로고
    • A classification of interdormain actions
    • October
    • Winfried E. Kühnhauser. A Classification of Interdormain Actions. Operating Systems Review, 32(4):47-61, October 1998.
    • (1998) Operating Systems Review , vol.32 , Issue.4 , pp. 47-61
    • Kühnhauser, W.E.1
  • 15
    • 85084163247 scopus 로고
    • Providing policy control over object operations in a mach based system
    • USENIX Association
    • Spencer E. Minear. Providing Policy Control Over Object Operations in a Mach Based System. In Proceedings of the fifth USENIX UNIX Security Symposium, pages 141156. USENIX Association, 1995.
    • (1995) Proceedings of the Fifth USENIX UNIX Security Symposium , pp. 141156
    • Minear, S.E.1
  • 16
    • 0013255393 scopus 로고    scopus 로고
    • Developing and using a "policy neutral" access control policy
    • ACM SIG on Security, Audit, and Control, ACM Press
    • Duane Olawski, Todd Fine, Edward Schneider, and Ray Spencer. Developing and Using a "Policy Neutral" Access Control Policy. In Proceedings of the New Security Paradigms Workshop, pages 60-67. ACM SIG on Security, Audit, and Control, ACM Press, 1996.
    • (1996) Proceedings of the New Security Paradigms Workshop , pp. 60-67
    • Olawski, D.1    Fine, T.2    Schneider, E.3    Spencer, R.4
  • 18
    • 0002604871 scopus 로고
    • A lattice interpretation of the Chinese wall policy
    • NIST-NCSC, United States Government Printing Office: 1992-625-512:60546
    • Ravi S. Sandhu. A Lattice Interpretation of the Chinese Wall Policy. In Proceedings of the 15th National Computer Security Conference, pages 329-339. NIST-NCSC, United States Government Printing Office: 1992-625-512:60546, 1992.
    • (1992) Proceedings of the 15th National Computer Security Conference , pp. 329-339
    • Sandhu, R.S.1
  • 21
    • 84956852410 scopus 로고    scopus 로고
    • A new model of security for distributed systems
    • ACM SIG on Security, Audit, and Control, ACM Press
    • William A. Wulf, Chenxi Wang, and Darrell M. Kienzle. A New Model of Security for Distributed Systems. In Proceedings of the New Security Paradigms Workshop, pages 34-43. ACM SIG on Security, Audit, and Control, ACM Press, 1996.
    • (1996) Proceedings of the New Security Paradigms Workshop , pp. 34-43
    • Wulf, W.A.1    Wang, C.2    Kienzle, D.M.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.