메뉴 건너뛰기




Volumn 13, Issue 3, 1981, Pages 247-278

Formal Models for Computer Security

Author keywords

access matrix; aggregation; capabilltms; computer; confidentiality; confinement; information flow; integmty; operating system; privacy; protection; samtlzatlon; security; security classes; verification

Indexed keywords

COMPUTER SYSTEMS, DIGITAL;

EID: 0019608720     PISSN: 03600300     EISSN: 15577341     Source Type: Journal    
DOI: 10.1145/356850.356852     Document Type: Article
Times cited : (263)

References (81)
  • 1
    • 0018055076 scopus 로고
    • Design of a message processing system for a multilevel secure environment
    • AFIPS Press, Arlington, Va
    • Ames, S. R., And Oestreicher, D. R. “Design of a message processing system for a multilevel secure environment,” in Proc AFIPS Nat Computer Conf., vol. 47, AFIPS Press, Arlington, Va, 1978, pp. 765-771.
    • (1978) Proc AFIPS Nat Computer Conf. , vol.47 , pp. 765-771
    • Ames, S.R.1    Oestreicher, D.R.2
  • 2
    • 84976652219 scopus 로고
    • Demonstrating security for trusted apphcatlons on a security kernel
    • MITRE Corp, Bedford, Mass., April
    • Ames, S. R., And Keeton-Williams, J. G. “Demonstrating security for trusted apphcatlons on a security kernel,” MITRE Corp, Bedford, Mass., April 1980
    • (1980)
    • Ames, S.R.1    Keeton-Williams, J.G.2
  • 3
    • 23844435685 scopus 로고
    • Computer security technology planning study
    • ESD-TR-73-51 ESD/AFSC, Hanscom AFB, Bedford, Mass., Oct. NTISAD-758 206
    • Anderson, J. P. “Computer security technology planning study,” ESD-TR-73-51, vol 1, ESD/AFSC, Hanscom AFB, Bedford, Mass., Oct. 1972 (NTISAD-758 206)
    • (1972) , vol.1
    • Anderson, J.P.1
  • 4
    • 84976840591 scopus 로고
    • An axiomatic approach to informahon flow in programs
    • Jan.
    • Andrews, G. R., And Reitman, R. P. “An axiomatic approach to informahon flow in programs,” ACM Trans Program Lang Syst 2, 1 (Jan. 1980), 56-76.
    • (1980) ACM Trans Program Lang Syst , vol.2 , Issue.1 , pp. 56-76
    • Andrews, G.R.1    Reitman, R.P.2
  • 5
    • 0003400251 scopus 로고
    • Secure computer systems Mathematical foundations
    • ESD-TR-73-278 ESD/AFSC, Hanscom AFB, Bedford, Mass., Nov. (MTR-2547, vol. 1, MITRE Corp., Bedford, Mass.)
    • Bell, D. E., And Lapadula, L. J. “Secure computer systems Mathematical foundations,” ESD-TR-73-278, vol. 1, ESD/AFSC, Hanscom AFB, Bedford, Mass., Nov. 1973 (MTR-2547, vol. 1, MITRE Corp., Bedford, Mass.)
    • (1973) , vol.1
    • Bell, D.E.1    Lapadula, L.J.2
  • 6
    • 0003400257 scopus 로고
    • Secure computer systems A mathematmal model
    • ESD-TR-73-278 ESD/AFSC, Hanscom AFB, Bedford, Mass., Nov (MTR-2547, vol 2, MITRE Corp., Bedford, Mass.)
    • Bell, D. E., And Lapadula, L. J. “Secure computer systems A mathematmal model,” ESD-TR-73-278, vol. 2, ESD/AFSC, Hanscom AFB, Bedford, Mass., Nov. 1973 (MTR-2547, vol 2, MITRE Corp., Bedford, Mass.).
    • (1973) , vol.2
    • Bell, D.E.1    Lapadula, L.J.2
  • 7
    • 0003400251 scopus 로고
    • Secure Computer systems: A refinement of the mathematmal model
    • ESD-TR-73-278, ESD/AFSC, Hanscom AFB, Bedford, Mass, April, MTR 2547, MITRE Corp., Bedford, Mass.
    • Bell, D. E. “Secure Computer systems: A refinement of the mathematmal model,” ESD-TR-73-278, vol. 3, ESD/AFSC, Hanscom AFB, Bedford, Mass, April 1974 (MTR 2547, vol. 3, MITRE Corp., Bedford, Mass.).
    • (1974) , vol.3-3
    • Bell, D.E.1
  • 8
    • 0003400257 scopus 로고
    • Secure computer systems. Mathematical foundations and model
    • M74-244, MITRE Corp, Bedford, Mass., Oct.
    • Bell, D. E., And Lapadula, L. J. “Secure computer systems. Mathematical foundations and model,” M74-244, MITRE Corp, Bedford, Mass., Oct. 1974.
    • (1974)
    • Bell, D.E.1    Lapadula, L.J.2
  • 9
    • 0003400251 scopus 로고
    • Secure computer system. Unified exposition and multIcs interpretatmn
    • MTR-2997, MITRE Corp., Bedford, Mass., July
    • Bell, D. E., And Lapadula, L. J. “Secure computer system. Unified exposition and multIcs interpretatmn,” MTR-2997, MITRE Corp., Bedford, Mass., July 1975.
    • (1975)
    • Bell, D.E.1    Lapadula, L.J.2
  • 10
    • 0003400255 scopus 로고
    • Integrity considerations for secure computer systems
    • ESD-TR-76-372, ESD/AFSC, Hanscom AFB, Bedford, Mass., April MITRE MTR-3153, NTIS AD A039324
    • Biea, K. J. “Integrity considerations for secure computer systems,” ESD-TR-76-372, ESD/AFSC, Hanscom AFB, Bedford, Mass., April 1977 (MITRE MTR-3153, NTIS AD A039324)
    • (1977)
    • Biea, K.J.1
  • 13
    • 84976832941 scopus 로고
    • Secure communications processor kernel software, detailed specification, part I, rev. D
    • Honeywell Inc, Avionics Diwsion, St. Petersburg, Fla.
    • Bonneau, C. H. “Secure communications processor kernel software, detailed specification, part I, rev. D,” Honeywell Inc, Avionics Diwsion, St. Petersburg, Fla., 1980.
    • (1980)
    • Bonneau, C.H.1
  • 14
    • 84976846871 scopus 로고
    • A new model of computer security with integrity and aggregatmn consideratmns
    • I. P. Sharp Assoc, Ottawa, Ont., Canada, March
    • Bonyun, D. “A new model of computer security with integrity and aggregatmn consideratmns,” I. P. Sharp Assoc, Ottawa, Ont., Canada, March 1978.
    • (1978)
    • Bonyun, D.1
  • 15
    • 84915673441 scopus 로고
    • A theorem-prover for recursive functions A user's manual
    • Tech. Rep. CSL-91, SRI Internatmnal, Menlo Park, Calif, June
    • Boyer, R. S., And Moore, J. S. “A theorem-prover for recursive functions A user's manual,” Tech. Rep. CSL-91, SRI Internatmnal, Menlo Park, Calif, June 1979.
    • (1979)
    • Boyer, R.S.1    Moore, J.S.2
  • 17
    • 0001760770 scopus 로고
    • Information transmission in sequential programs
    • R. A. DeMillo, D. P., Dobkin, A. K Jones, and R. J. Lipton (Eds.), Academic Press, New York
    • Cohen, E. “Information transmission in sequential programs,” in Foundation of secure computation, R. A. DeMillo, D. P., Dobkin, A. K Jones, and R. J. Lipton (Eds.), Academic Press, New York, 1978, pp. 297-336.
    • (1978) Foundation of secure computation , pp. 297-336
    • Cohen, E.1
  • 18
    • 0017907186 scopus 로고
    • Even databases that lie can be compromised
    • Jan
    • Demillo, R. A., Dobkin, D., And Lipton, R.J. “Even databases that lie can be compromised,” IEEE Trans Softw. Eng. SE-4, 1 (Jan. 1977), 74-75.
    • (1977) IEEE Trans Softw. Eng. , vol.SE-4 , Issue.1 , pp. 74-75
    • Demillo, R.A.1    Dobkin, D.2    Lipton, R.J.3
  • 19
    • 0015200983 scopus 로고
    • Third generation computer systems
    • Dec
    • Denning, P. J. “Third generation computer systems,”Computing Surveys 3, 4 (Dec. 1971), 171-216.
    • (1971) Computing Surveys , vol.3 , Issue.4 , pp. 171-216
    • Denning, P.J.1
  • 20
    • 0041684496 scopus 로고
    • Secure information flow in computer systems
    • Ph D. dissertation, Purdue Univ., West Lafayette, Ind., May
    • Denning, D. E. “Secure information flow in computer systems,” Ph D. dissertation, Purdue Univ., West Lafayette, Ind., May 1975.
    • (1975)
    • Denning, D.E.1
  • 21
    • 0016949746 scopus 로고
    • A lattice model of secure information flow
    • May
    • Denning, D. E. “A lattice model of secure information flow,” Commun. ACM 19, 5 (May 1976), 236-243.
    • (1976) Commun. ACM , vol.19 , Issue.5 , pp. 236-243
    • Denning, D.E.1
  • 22
    • 0017517624 scopus 로고
    • Certification of programs for secure information flow
    • July
    • Denning, D. E., And Denning, P. J.“Certification of programs for secure information flow,” Commun ACM 20, 7 (July 1977), 504-512.
    • (1977) Commun ACM , vol.20 , Issue.7 , pp. 504-512
    • Denning, D.E.1    Denning, P.J.2
  • 23
    • 0018442066 scopus 로고
    • The tracker: A threat to statmtical database security
    • March
    • Denning, D. E., Denning, P. J., And Schwartz, M. D. “The tracker: A threat to statmtical database security,” ACM Trans. Database Syst. 4, 1 (March 1979), 76-96.
    • (1979) ACM Trans. Database Syst , vol.4 , Issue.1 , pp. 76-96
    • Denning, D.E.1    Denning, P.J.2    Schwartz, M.D.3
  • 24
    • 0018519346 scopus 로고
    • Data security
    • Sept
    • Denning, D. E., And Denning, P. J. “Data security,” Comput. Surv 11, 3 (Sept. 1979), 227-249.
    • (1979) Comput. Surv , vol.11 , Issue.3 , pp. 227-249
    • Denning, D.E.1    Denning, P.J.2
  • 25
    • 0018444418 scopus 로고
    • Secure databases: protection against user Influence [sw]
    • March
    • Dobkin, D., Jones, A. K. And Lipton, R. J. “Secure databases: protection against user Influence [sw],” ACM Trans. Database Syst. 4, (March 1979), 97-106.
    • (1979) ACM Trans. Database Syst. , vol.4 , pp. 97-106
    • Dobkin, D.1    Jones, A.K.2    Lipton, R.J.3
  • 27
    • 85072519230 scopus 로고
    • The foundations of a provably secure operating system (PSOS)
    • AFIPS Press, Arlington, Va
    • Feiertag, R. J., And Neumann, P. G. “The foundations of a provably secure operating system (PSOS),” in Proc AFIPS Nat. Computer Conf., vol. 48, AFIPS Press, Arlington, Va, 1979, pp. 329-334.
    • (1979) Proc AFIPS Nat. Computer Conf. , vol.48 , pp. 329-334
    • Feiertag, R.J.1    Neumann, P.G.2
  • 28
    • 0016382977 scopus 로고
    • Memoryless subsystems
    • May
    • Fenton, J. S. “Memoryless subsystems,” Comput. J 17, 2 (May 1974), 143-147.
    • (1974) Comput. J , vol.17 , Issue.2 , pp. 143-147
    • Fenton, J.S.1
  • 29
    • 84976721711 scopus 로고
    • A validation technique for computer security based on the theory of constraints
    • ESD-TR-78-182, ESD/AFSC, Hanscom AFB, Bedford, Mass., Dec (MITRE MTR-3661, NTIS ADA065111)
    • Furtek, F. C.“A validation technique for computer security based on the theory of constraints,” ESD-TR-78-182, ESD/AFSC, Hanscom AFB, Bedford, Mass., Dec 1978 (MITRE MTR-3661, NTIS ADA065111).
    • (1978)
    • Furtek, F.C.1
  • 30
    • 84949036570 scopus 로고
    • Constraints and compromise
    • R. A. DeMillo, D. P Dobkin, A K. Jones, and R. J. Lipton (Eds.), Academic Press, New York
    • Furtek, F. C. “Constraints and compromise,” in Foundations of secure computation, R. A. DeMillo, D. P Dobkin, A K. Jones, and R. J. Lipton (Eds.), Academic Press, New York, 1978, pp. 189-204.
    • (1978) Foundations of secure computation , pp. 189-204
    • Furtek, F.C.1
  • 31
  • 32
    • 84976741353 scopus 로고
    • Specification and verification of real-time, distributed systems using the theory of constraints
    • Tech Rep. P-1027, Charles Stark Draper Laboratory, Cambridge, Mass., April
    • Furtek, F. C. “Specification and verification of real-time, distributed systems using the theory of constraints,” Tech Rep. P-1027, Charles Stark Draper Laboratory, Cambridge, Mass., April 1980.
    • (1980)
    • Furtek, F.C.1
  • 33
    • 84976672259 scopus 로고
    • GNOSIS External Specifications
    • Tymshare, Cupertino, Calif.
    • “GNOSIS External Specifications,“ Tymshare, Cupertino, Calif., 1980.
    • (1980)
  • 35
    • 84942812332 scopus 로고    scopus 로고
    • Protectlon-Prmciples and practice
    • AFIPS Press, Arlmgton, Va
    • Graham, G. S., And Denning, P. J. “Protectlon-Prmciples and practice,” in Proc 1972 AFIPS Spring Jt Computer Conf, vol. 40, AFIPS Press, Arlmgton, Va, pp. 417-429.
    • Proc 1972 AFIPS Spring Jt Computer Conf , vol.40 , pp. 417-429
    • Graham, G.S.1    Denning, P.J.2
  • 36
    • 0042992510 scopus 로고
    • A model of a protected data management system
    • ESD-TR-76-289, ESD/AFSC, Hanscom AFB, Bedford, Mass, June (I P. Sharp, Ottawa, Canada NTIS ADA 035256)
    • Grohn, M.J. ”A model of a protected data management system,” ESD-TR-76-289, ESD/AFSC, Hanscom AFB, Bedford, Mass, June 1976 (I P. Sharp, Ottawa, Canada NTIS ADA 035256).
    • (1976)
    • Grohn, M.J.1
  • 37
    • 0016984825 scopus 로고
    • Protection in operating systems
    • Aug
    • Harrison, M. A., Ruzzo, W. L., And Ullman, J.D. “Protection in operating systems,” Commun. ACM 19, 8 (Aug. 1976), 461-471.
    • (1976) Commun. ACM , vol.19 , Issue.8 , pp. 461-471
    • Harrison, M.A.1    Ruzzo, W.L.2    Ullman, J.D.3
  • 38
    • 48349088544 scopus 로고
    • Secure data management system
    • RADC-TR-75-266, Rome Air Dev. Center, AFSC, GriffiNS AFB, N Y., Nov (NTIS AD A019201)
    • Hinke, T. H., And Schaefer, M. “Secure data management system,” RADC-TR-75-266, Rome Air Dev. Center, AFSC, GriffiNS AFB, N Y., Nov 1975 (NTIS AD A019201)
    • (1975)
    • Hinke, T.H.1    Schaefer, M.2
  • 39
    • 84945708698 scopus 로고
    • An axiomatic basis for computer programming
    • Oct
    • Hoare, C. A. R. “An axiomatic basis for computer programming,” Commun. ACM 12, 10 (Oct. 1969), 576-583.
    • (1969) Commun. ACM , vol.12 , Issue.10 , pp. 576-583
    • Hoare, C.A.R.1
  • 42
    • 33646744335 scopus 로고
    • Protection mechanism models: Their usefulness
    • R. A. DeMillo, D. P Dobkin, A. K. Jones, and R. J Lipton (Eds.), Academic Press, New York
    • Jones, A. K. “Protection mechanism models: Their usefulness,” in Foundatmns of secure computation, R. A. DeMillo, D. P Dobkin, A. K. Jones, and R. J Lipton (Eds.), Academic Press, New York, 1978, pp. 237-254.
    • (1978) Foundatmns of secure computation , pp. 237-254
    • Jones, A.K.1
  • 43
    • 0017999069 scopus 로고
    • The enforcement of security policies for cormputation
    • Aug
    • Jones, A. K., And Lipton, R.J. “The enforcement of security policies for cormputation,” J. Compt. Syst. Sci, 17, 1, (Aug. 1978), 35-55.
    • (1978) J. Compt. Syst. Sci , vol.17 , Issue.1 , pp. 35-55
    • Jones, A.K.1    Lipton, R.J.2
  • 44
    • 35048844102 scopus 로고
    • Verification of the UCLA security kernel: Abstract model, mapping, theorem generatmn and proof
    • Ph.D. dissertation, UCLA, Losangeles, Calif
    • Kemmerer, R.A. “Verification of the UCLA security kernel: Abstract model, mapping, theorem generatmn and proof,” Ph.D. dissertation, UCLA, Losangeles, Calif., 1979.
    • (1979)
    • Kemmerer, R.A.1
  • 45
    • 84976834237 scopus 로고
    • KSOS Verification Plan
    • WDLTR7809, Ford Aerospace and Communications Corp, Western Development Lab. Div., Palo Alto, Calif., and SRI International, Menlo Park, Calif
    • “KSOS Verification Plan,” WDLTR7809, Ford Aerospace and Communications Corp, Western Development Lab. Div., Palo Alto, Calif., and SRI International, Menlo Park, Calif, 1978.
    • (1978)
  • 47
    • 0015672289 scopus 로고
    • A note on the confinement problem
    • Oct
    • Lampson, B.W. “A note on the confinement problem,” Commun ACM 16, 10 (Oct. 1973), 613-615.
    • (1973) Commun ACM , vol.16 , Issue.10 , pp. 613-615
    • Lampson, B.W.1
  • 48
    • 84976849179 scopus 로고
    • Assertions for verafication of multilevel secure military message systems
    • contribution to Workshop on Formal Verification, SRI International, Menlo Park, Calif., April
    • Landwehr, C. E. “Assertions for verafication of multilevel secure military message systems,” contribution to Workshop on Formal Verification, SRI International, Menlo Park, Calif., April 1980
    • (1980)
    • Landwehr, C.E.1
  • 49
    • 0017512599 scopus 로고
    • A linear time algorithm for deciding subject security
    • July
    • Lipton, R. J., And Snyder, L. “A linear time algorithm for deciding subject security,” J ACM 24, 3 (July 1977), 455-464.
    • (1977) J ACM , vol.24 , Issue.3 , pp. 455-464
    • Lipton, R.J.1    Snyder, L.2
  • 50
    • 0018320025 scopus 로고
    • KSOS: The design of a secure operating system
    • AFIPS Press, Arlington, Va
    • Mccauley, E. J., And Drongowski, P.J. “KSOS: The design of a secure operating system,” in Proc. AFIPS Nat Computer Conf., vol 48, AFIPS Press, Arlington, Va., 1979, pp. 345-353.
    • (1979) Proc. AFIPS Nat Computer Conf. , vol.48 , pp. 345-353
    • Mccauley, E.J.1    Drongowski, P.J.2
  • 51
    • 0016951438 scopus 로고
    • Security kernel validation in practme
    • May
    • Millen, J. K. “Security kernel validation in practme,” Commun. ACM 19, 5 (May 1976), 243-250.
    • (1976) Commun. ACM , vol.19 , Issue.5 , pp. 243-250
    • Millen, J.K.1
  • 53
    • 84976688714 scopus 로고
    • Constramts and multilevel security
    • R A. DeMfllo, D. P. Dobkin, A. K. Jones, and R. J. Lipton (Eds.), Academic Press, New York
    • Millen, J.K. “Constramts and multilevel security,” In Foundatwns of Secure Computation, R A. DeMfllo, D. P. Dobkin, A. K. Jones, and R. J. Lipton (Eds.), Academic Press, New York, 1978, pp 205-222
    • (1978) Foundatwns of Secure Computation , pp. 205-222
    • Millen, J.K.1
  • 54
    • 84976672107 scopus 로고
    • Causal system security
    • ESD-TR-78-171, ESD/AFSC, Hanscom AFB, Bedford, Mass., Oct (MITRE MTR-3614)
    • Millen, J. K. “Causal system security,” ESD-TR-78-171, ESD/AFSC, Hanscom AFB, Bedford, Mass., Oct. 1978 (MITRE MTR-3614).
    • (1978)
    • Millen, J.K.1
  • 55
    • 0347229432 scopus 로고
    • A provably secure operating system. The system, its applications, and proofs
    • SRI International, Menlo Park, Calif., Feb
    • Neumann, P. G., Boyer, R. S., Feiertag, R. J., Levitt, K. N., And Robinson, L. “A provably secure operating system. The system, its applications, and proofs,” SRI International, Menlo Park, Calif., Feb. 1977.
    • (1977)
    • Neumann, P.G.1    Boyer, R.S.2    Feiertag, R.J.3    Levitt, K.N.4    Robinson, L.5
  • 56
    • 84976762601 scopus 로고
    • Opnavinst 5239.1, Department of the Navy
    • Op-942E, April
    • Opnavinst 5239.1, Department of the Navy, Chief of Naval Operations, Op-942E, April 2, 1979.
    • (1979) Chief of Naval Operations , vol.2
  • 58
    • 84976661859 scopus 로고
    • Using memory access control as the only protection mechanism
    • IRIA/LABORIA, Rocquencourt, France, Aug
    • Parnas D. L., And Price, W. R. “Using memory access control as the only protection mechanism,” in Proc. Int Workshop Protection in Operattng Systems, IRIA/LABORIA, Rocquencourt, France, Aug. 1974, 177-181.
    • (1974) Proc. Int Workshop Protection in Operattng Systems , pp. 177-181
    • Parnas, D.L.1    Price, W.R.2
  • 59
    • 84976725676 scopus 로고
    • Access control models
    • ESD-TR-73-106 ESD/AFSC, L. G Hanscom Field, Bedford, Mass, Feb (NTIS AD-761 807)
    • Popek, G.J. “Access control models,” ESD-TR-73-106 ESD/AFSC, L. G Hanscom Field, Bedford, Mass, Feb 1973 (NTIS AD-761 807).
    • (1973)
    • Popek, G.J.1
  • 61
    • 0018019384 scopus 로고
    • A model for verification of data security in operating systems
    • Sept
    • Popek, G. J., And Farber, D. A. “A model for verification of data security in operating systems,” Commun ACM 21, 9 (Sept. 1978), 737-749.
    • (1978) Commun ACM , vol.21 , Issue.9 , pp. 737-749
    • Popek, G.J.1    Farber, D.A.2
  • 62
    • 84976863146 scopus 로고
    • UCLA Secure Unix
    • UCLA Tech Rep. (Draft), Feb
    • Popek, G. J., Kline, C. S., And Walton, E. J. “UCLA Secure Unix,” UCLA Tech Rep. (Draft), Feb. 1978.
    • (1978)
    • Popek, G.J.1    Kline, C.S.2    Walton, E.J.3
  • 64
    • 84933366233 scopus 로고
    • Implications of a vtrtual memory mechanism for implementing protection in a family of operating systems
    • Ph.D. dissertation, Carnegie-Mellon University, Pittsburgh, Pa
    • Price, W.R. “Implications of a vtrtual memory mechanism for implementing protection in a family of operating systems,” Ph.D. dissertation, Carnegie-Mellon University, Pittsburgh, Pa, 1973.
    • (1973)
    • Price, W.R.1
  • 66
    • 84909476257 scopus 로고
    • Special reference manual
    • 3rd ed, SRI International, Menlo Park, Calif
    • Roubine, O., And Robinson, L. “Special reference manual,” 3rd ed, SRI International, Menlo Park, Calif., 1977.
    • (1977)
    • Roubine, O.1    Robinson, L.2
  • 67
    • 3042750861 scopus 로고
    • Preliminary notes on the design of secure military computer systems
    • MCI-73-1, ESD/AFSC, Hanscom AFB, Bedford, Mass., Jan
    • Schell, R. R., Downey, P. J., And Popek, G.J. “Preliminary notes on the design of secure military computer systems,” MCI-73-1, ESD/AFSC, Hanscom AFB, Bedford, Mass., Jan. 1973
    • (1973)
    • Schell, R.R.1    Downey, P.J.2    Popek, G.J.3
  • 68
    • 77952276178 scopus 로고
    • The design and specification of a security kernel for the PDP-11/45
    • ESD-TR-75-69, MITRE Corp., Bedford, Mass, March
    • Schiller, W. L. “The design and specification of a security kernel for the PDP-11/45,” ESD-TR-75-69, MITRE Corp., Bedford, Mass, March 1975.
    • (1975)
    • Schiller, W.L.1
  • 72
    • 84910507346 scopus 로고
    • Formal models of capability-based protection systems
    • Tech Rep 151, Dept. Computer Science, Yale Univ., New Haven, Conn, April
    • Snyder, L. “Formal models of capability-based protection systems,” Tech Rep 151, Dept. Computer Science, Yale Univ., New Haven, Conn, April 1979.
    • (1979)
    • Snyder, L.1
  • 73
    • 0018983212 scopus 로고
    • Specification and verification of the UCLA Unix security kernel
    • Feb
    • Walker, B J, Kemmerer, R A, And Popek, G.J. “Specification and verification of the UCLA Unix security kernel,” Commun. ACM 23, 2 (Feb. 1980), 118-131
    • (1980) Commun. ACM , vol.23 , Issue.2 , pp. 118-131
    • Walker, B.J.1    Kemmerer, R.A.2    Popek, G.J.3
  • 74
    • 3943068905 scopus 로고
    • Primitive models for computer security
    • ESDTR-4-117, AF/ESD, Hanscom AFB, Bedford, Mass., Jan (NTIS AD-778 467)
    • Walter, K. G., Ogden, W. F., Rounds, W. C., Bradshaw, F. T., Ames, S. R., And Shumway, D. G. “Primitive models for computer security,” ESDTR-4-117, AF/ESD, Hanscom AFB, Bedford, Mass., Jan., 1974 (NTIS AD-778 467).
    • (1974)
    • Walter, K.G.1    Ogden, W.F.2    Rounds, W.C.3    Bradshaw, F.T.4    Ames, S.R.5    Shumway, D.G.6
  • 76
    • 84961857319 scopus 로고
    • Initial Structured Specifications for an uncompromlsable computer security system
    • ESD-TR-75-82, ESD/AFSC, Hanscom AFB, Bedford, Mass., July (NTIS AD-A022 49O)
    • Walter, K. G., Ogden, W. F., Gilligan, J. M., Schaeffer, D. D., Schaen, S. I., And Shumway, D. G. “Initial Structured Specifications for an uncompromlsable computer security system,” ESD-TR-75-82, ESD/AFSC, Hanscom AFB, Bedford, Mass., July 1975 (NTIS AD-A022 49O).
    • (1975)
    • Walter, K.G.1    Ogden, W.F.2    Gilligan, J.M.3    Schaeffer, D.D.4    Schaen, S.I.5    Shumway, D.G.6
  • 77
    • 4544284713 scopus 로고    scopus 로고
    • Security controls in the ADEPT-50 time sharing system
    • AFIPS Press, Arlington, Va
    • Weissman, C. “Security controls in the ADEPT-50 time sharing system,” Proc. 1969 AFIPS Fall Jt Computer Conf., vol. 35, AFIPS Press, Arlington, Va., pp. 119-133.
    • Proc. 1969 AFIPS Fall Jt Computer Conf. , vol.35 , pp. 119-133
    • Weissman, C.1
  • 78
    • 84937350764 scopus 로고
    • Military message experiment quick look report
    • III NRL Memorandum Rep. 3992, Naval Research Lab., Washington, D.C., April
    • Wilson, S. H., Kallander, J. W., Thomas, N. M., III, Klitzkie, L. C., And Bunch, J. R., Jr. “Military message experiment quick look report,” NRL Memorandum Rep. 3992, Naval Research Lab., Washington, D.C., April 1979, p. 10.
    • (1979) , pp. 10
    • Wilson, S.H.1    Kallander, J.W.2    Thomas, N.M.3    Klitzkie, L.C.4    Bunch, J.R.5
  • 79
    • 84976652325 scopus 로고
    • The trusted function in secure decentralized processing
    • MITRE MTR-3892, MITRE Corp., Bedford, Mass, Sept
    • Withington, P.T. “The trusted function in secure decentralized processing,” MITRE MTR-3892, MITRE Corp., Bedford, Mass, Sept. 1979.
    • (1979)
    • Withington, P.T.1
  • 80
    • 84976839322 scopus 로고
    • The XIVUS environment XIVUS working paper no. 1
    • USC/Information Sciences Institute, Marina del Rey, Calif., April
    • Yonke, M. D. “The XIVUS environment XIVUS working paper no. 1,” USC/Information Sciences Institute, Marina del Rey, Calif., April 1976.
    • (1976)
    • Yonke, M.D.1
  • 81
    • 0004200684 scopus 로고
    • Computer security technology planning study
    • Tech. Rep ESD-TR-73-51 James P. Anderson and Co., Fort Washington, Pa., Oct
    • Anderson, J.P. “Computer security technology planning study,” Tech. Rep ESD-TR-73-51, vols. 1 and 2, James P. Anderson and Co., Fort Washington, Pa., Oct. 1972.
    • (1972) , vol.1-2
    • Anderson, J.P.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.