-
3
-
-
0030644182
-
Security engineering of lattice-based policies
-
Rockport, Massachusetts . IEEE Press
-
Ciarán Bryce. Security Engineering of Lattice-Based Policies. In Proceedings of the Computer Security Foundations Workshop, pages 195-207, Rockport, Massachusetts, 1997. IEEE Press.
-
(1997)
Proceedings of the Computer Security Foundations Workshop
, pp. 195-207
-
-
Bryce, C.1
-
5
-
-
0023266943
-
A comparsion of commercial and military computer security policies
-
IEEE Computer Society, April
-
David D. Clark and David R. Wilson. A Comparsion of Commercial and Military Computer Security Policies. In Proceedings of the IEEE Symposium on Security and Privacy, pages 184-194. IEEE Computer Society, April 1987.
-
(1987)
Proceedings of the IEEE Symposium on Security and Privacy
, pp. 184-194
-
-
Clark, D.D.1
Wilson, D.R.2
-
6
-
-
0016949746
-
A lattice model of secure information flow
-
May
-
Dorothy E. Denning. A Lattice Model of Secure Information Flow. Communications of the ACM, 19(5):236-242, May 1976.
-
(1976)
Communications of the ACM
, vol.19
, Issue.5
, pp. 236-242
-
-
Denning, D.E.1
-
9
-
-
0011356981
-
The birliX security architecture
-
IOS Press
-
Hermann Härtig, Winfried E. Kühnhauser, and Oliver C. Kowalski. The BirliX Security Architecture. Journal of Computer Security, IOS Press, 2(1):5-21, 1993.
-
(1993)
Journal of Computer Security
, vol.2
, Issue.1
, pp. 5-21
-
-
Härtig, H.1
Kühnhauser, W.E.2
Kowalski, O.C.3
-
10
-
-
0016984825
-
Protection in operating systems
-
August
-
Michael A. Harrison, Walter L. Ruzzo, and Jeffrey D. Ullman. Protection in Operating Systems. Communications of the ACM, 19(8):461-471, August 1976.
-
(1976)
Communications of the ACM
, vol.19
, Issue.8
, pp. 461-471
-
-
Harrison, M.A.1
Ruzzo, W.L.2
Ullman, J.D.3
-
11
-
-
85034119114
-
-
GMD Technical Report (to appear), German National Research Center for Information Technology, St. Augustin, Germany
-
Winfried E. Kühnhauser and Martin Protzen. An Automatic Code Generator for Skippy Types. GMD Technical Report (to appear), German National Research Center for Information Technology, St. Augustin, Germany, 1999.
-
(1999)
An Automatic Code Generator for Skippy Types
-
-
Kühnhauser, W.E.1
Protzen, M.2
-
12
-
-
0029192605
-
A paradigm for user-defined security policies
-
Bad Neuenahr, Germany, September 1995. IEEE Computer Society Press
-
Winfried E. Kühnhauser. A Paradigm for User-Defined Security Policies. In Proceedings of the 14th IEEE Symposium on Reliable Distributed Systems, pages 135-144, Bad Neuenahr, Germany, September 1995. IEEE Computer Society Press.
-
Proceedings of the 14th IEEE Symposium on Reliable Distributed Systems
, pp. 135-144
-
-
Kühnhauser, W.E.1
-
13
-
-
0039479451
-
A classification of interdormain actions
-
October
-
Winfried E. Kühnhauser. A Classification of Interdormain Actions. Operating Systems Review, 32(4):47-61, October 1998.
-
(1998)
Operating Systems Review
, vol.32
, Issue.4
, pp. 47-61
-
-
Kühnhauser, W.E.1
-
15
-
-
85084163247
-
Providing policy control over object operations in a mach based system
-
USENIX Association
-
Spencer E. Minear. Providing Policy Control Over Object Operations in a Mach Based System. In Proceedings of the fifth USENIX UNIX Security Symposium, pages 141156. USENIX Association, 1995.
-
(1995)
Proceedings of the Fifth USENIX UNIX Security Symposium
, pp. 141156
-
-
Minear, S.E.1
-
16
-
-
0013255393
-
Developing and using a "policy neutral" access control policy
-
ACM SIG on Security, Audit, and Control, ACM Press
-
Duane Olawski, Todd Fine, Edward Schneider, and Ray Spencer. Developing and Using a "Policy Neutral" Access Control Policy. In Proceedings of the New Security Paradigms Workshop, pages 60-67. ACM SIG on Security, Audit, and Control, ACM Press, 1996.
-
(1996)
Proceedings of the New Security Paradigms Workshop
, pp. 60-67
-
-
Olawski, D.1
Fine, T.2
Schneider, E.3
Spencer, R.4
-
18
-
-
0002604871
-
A lattice interpretation of the Chinese wall policy
-
NIST-NCSC, United States Government Printing Office: 1992-625-512:60546
-
Ravi S. Sandhu. A Lattice Interpretation of the Chinese Wall Policy. In Proceedings of the 15th National Computer Security Conference, pages 329-339. NIST-NCSC, United States Government Printing Office: 1992-625-512:60546, 1992.
-
(1992)
Proceedings of the 15th National Computer Security Conference
, pp. 329-339
-
-
Sandhu, R.S.1
-
20
-
-
0027983441
-
Adaptability using reflection
-
Susann Sonntag, Hermann Härtig, Oliver Kowalski, Winfried E. Kühnhauser, and Wolfgang Lux. Adaptability Using Reflection. In Proceedings of the Hawaii International Conference on System Sciences, 1994.
-
(1994)
Proceedings of the Hawaii International Conference on System Sciences
-
-
Sonntag, S.1
Härtig, H.2
Kowalski, O.3
Kühnhauser, W.E.4
Lux, W.5
-
21
-
-
84956852410
-
A new model of security for distributed systems
-
ACM SIG on Security, Audit, and Control, ACM Press
-
William A. Wulf, Chenxi Wang, and Darrell M. Kienzle. A New Model of Security for Distributed Systems. In Proceedings of the New Security Paradigms Workshop, pages 34-43. ACM SIG on Security, Audit, and Control, ACM Press, 1996.
-
(1996)
Proceedings of the New Security Paradigms Workshop
, pp. 34-43
-
-
Wulf, W.A.1
Wang, C.2
Kienzle, D.M.3
|