-
1
-
-
0027667638
-
A calculus for access control in distributed systems
-
ABADI, M., BURROWS, M., LAMPSON, B., AND PLOTKIN, G. 1993. A calculus for access control in distributed systems. ACM Trans. Program. Lang. Syst. 15, 4, 706-734.
-
(1993)
ACM Trans. Program. Lang. Syst.
, vol.15
, Issue.4
, pp. 706-734
-
-
Abadi, M.1
Burrows, M.2
Lampson, B.3
Plotkin, G.4
-
2
-
-
0003400251
-
-
MIRTRE Corp., Bedford, Mass. Also available as NTIS AD-A023588. National Technical Information Service, Springfield, Va.
-
BELL, D.E. AND LAPADULA, L. J. 1975. Secure computer system: Unified exposition and multics interpretation. MIRTRE Corp., Bedford, Mass. Also available as NTIS AD-A023588. National Technical Information Service, Springfield, Va. (1976).
-
(1975)
Secure Computer System: Unified Exposition and Multics Interpretation
-
-
Bell, D.E.1
Lapadula, L.J.2
-
3
-
-
84976697238
-
The GemStone object database management system
-
BUTTERWORTH, P., OTIS, A., AND STEIN, J. 1991. The GemStone object database management system. Commun. ACM 34, 10 (Oct.), 50-63.
-
(1991)
Commun. ACM
, vol.34
, Issue.10 OCT.
, pp. 50-63
-
-
Butterworth, P.1
Otis, A.2
Stein, J.3
-
4
-
-
0011588485
-
Trusted products evaluation
-
CHOKHANI, S. 1992. Trusted products evaluation. Commun. ACM 35, 7 (July), 64-76.
-
(1992)
Commun. ACM
, vol.35
, Issue.7 JULY
, pp. 64-76
-
-
Chokhani, S.1
-
6
-
-
84976862627
-
2 system
-
2 system. Commun. ACM 34, 10 (Oct.), 34-49.
-
(1991)
Commun. ACM
, vol.34
, Issue.10 OCT.
, pp. 34-49
-
-
Deux, O.1
-
7
-
-
0003969633
-
-
DOD 5200.28 STD, National Computer Security Center, U.S. Department of Defense, Washington, D.C.
-
DEPARTMENT OF DEFENSE. 1985. Trusted computer system evaluation criteria. DOD 5200.28 STD, National Computer Security Center, U.S. Department of Defense, Washington, D.C.
-
(1985)
Trusted Computer System Evaluation Criteria
-
-
-
9
-
-
0018008817
-
On an authorization mechanism
-
FAGIN, R. 1978. On an authorization mechanism. ACM Trans. Database Sys. 3, 3, 310-375.
-
(1978)
ACM Trans. Database Sys.
, vol.3
, Issue.3
, pp. 310-375
-
-
Fagin, R.1
-
10
-
-
18044368393
-
-
Springer-Verlag, Berlin
-
Fox, E. A., AKSCYN, R. M., FURUTA, R. K., AND LEGGETT, J. J., Eds. 1994. Proceedings of Digital Libraries '94. Springer-Verlag, Berlin.
-
(1994)
Proceedings of Digital Libraries '94
-
-
Fox, E.A.1
Akscyn, R.M.2
Furuta, R.K.3
Leggett, J.J.4
-
11
-
-
0029287799
-
Digital libraries
-
Fox, E. A., AKSCYN, R. M., FURUTA, R. K., AND LEGGETT, J. J. 1995. Digital libraries. Commun. ACM 38, 4 (Apr.), 22-28.
-
(1995)
Commun. ACM
, vol.38
, Issue.4 APR.
, pp. 22-28
-
-
Fox, E.A.1
Akscyn, R.M.2
Furuta, R.K.3
Leggett, J.J.4
-
12
-
-
0040272023
-
A flexible and efficient database authorization facility
-
IBM, San Jose, Calif.
-
GAGLIARDI, R., LAPIS, G., AND LINDSAY, B. G. 1989. A flexible and efficient database authorization facility. IBM Res. Rep. RJ 6826, IBM, San Jose, Calif.
-
(1989)
IBM Res. Rep. RJ 6826
-
-
Gagliardi, R.1
Lapis, G.2
Lindsay, B.G.3
-
13
-
-
0017918928
-
Administrative control of computing service
-
GLADNEY, H. M. 1978. Administrative control of computing service. IBM Syst. J. 17, 151.
-
(1978)
IBM Syst. J.
, vol.17
, pp. 151
-
-
Gladney, H.M.1
-
14
-
-
0027206975
-
A storage subsystem for image and records management
-
GLADNEY, H. M. 1993. A storage subsystem for image and records management. IBM Syst. J. 32, 3, 512-540.
-
(1993)
IBM Syst. J.
, vol.32
, Issue.3
, pp. 512-540
-
-
Gladney, H.M.1
-
15
-
-
18044386279
-
Condition tests in data server access control
-
IBM, San Jose, Calif.
-
GLADNEY, H. M. 1994. Condition tests in data server access control. IBM Res. Rep. RJ 9244, IBM, San Jose, Calif.
-
(1994)
IBM Res. Rep. RJ 9244
-
-
Gladney, H.M.1
-
16
-
-
0016452014
-
An access control mechanism for computer resources
-
GLADNEY, H. M., WORLEY, E. L., AND MYERS, J. J. 1975. An access control mechanism for computer resources. IBM Syst. J. 14, 212.
-
(1975)
IBM Syst. J.
, vol.14
, pp. 212
-
-
Gladney, H.M.1
Worley, E.L.2
Myers, J.J.3
-
18
-
-
84976657250
-
An authorization mechanism for a relational database system
-
GRIFFITHS, P. P. AND WADE, B. 1976. An authorization mechanism for a relational database system. ACM Trans. Database Syst. 1, 3, 242-255.
-
(1976)
ACM Trans. Database Syst.
, vol.1
, Issue.3
, pp. 242-255
-
-
Griffiths, P.P.1
Wade, B.2
-
19
-
-
18044373143
-
-
Elsevier Science, Amsterdam
-
HOFFMAN, L. J. AND MORAN, L. M. 1986. Societal Vulnerability to Computer System Failures. Vol. 5, Computers and Security. Elsevier Science, Amsterdam, 211-217.
-
(1986)
Societal Vulnerability to Computer System Failures. Vol. 5, Computers and Security
, vol.5
, pp. 211-217
-
-
Hoffman, L.J.1
Moran, L.M.2
-
24
-
-
18044384928
-
-
ISO/IEC JTC 1/SC 21/WG 1 N6947 Second CD 10181-3. International Standards Organization, Geneva, Switzerland
-
ISO. 1992. Information retrieval, transfer and management for OSI: Access control framework. ISO/IEC JTC 1/SC 21/WG 1 N6947 Second CD 10181-3. International Standards Organization, Geneva, Switzerland.
-
(1992)
Information Retrieval, Transfer and Management for OSI: Access Control Framework
-
-
-
25
-
-
18044392297
-
Security and management services in open networks and distributed systems
-
IBM, San Jose, Calif.
-
JANSON, P. 1992. Security and management services in open networks and distributed systems. IBM Res. Rep. RZ 2274, IBM, San Jose, Calif.
-
(1992)
IBM Res. Rep. RZ 2274
-
-
Janson, P.1
-
26
-
-
0022103668
-
Authentication and discretionary access control in computer networks
-
KARGER, P. A. 1985. Authentication and discretionary access control in computer networks. Comput. Networks ISDN Syst. 10, 1, 27-37.
-
(1985)
Comput. Networks ISDN Syst.
, vol.10
, Issue.1
, pp. 27-37
-
-
Karger, P.A.1
-
27
-
-
1642330512
-
The evolution of the Kerberos authentication service
-
IEEE Computer Society Press, Los Alamitos, Calif.
-
KOHL, J. T. 1991. The evolution of the Kerberos authentication service. In Proceedings of the EurOpen Conference, Unix Open Systems in Perspective. IEEE Computer Society Press, Los Alamitos, Calif., 295-313.
-
(1991)
Proceedings of the EurOpen Conference, Unix Open Systems in Perspective
, pp. 295-313
-
-
Kohl, J.T.1
-
28
-
-
18044368775
-
OSF's distributed computing environment
-
KUMAR, R. 1991. OSF's distributed computing environment. IBM AIXpert 2, 22-29.
-
(1991)
IBM AIXpert
, vol.2
, pp. 22-29
-
-
Kumar, R.1
-
29
-
-
84976841617
-
The ObjectStore database system
-
LAMB, C., LANDIS, G., ORENSTIEN, J., AND WEINREB, D. 1991. The ObjectStore database system. Commun. ACM 34, 10 (Oct.), 50-63.
-
(1991)
Commun. ACM
, vol.34
, Issue.10 OCT.
, pp. 50-63
-
-
Lamb, C.1
Landis, G.2
Orenstien, J.3
Weinreb, D.4
-
30
-
-
0039015629
-
Authentication in distributed systems: Theory and practice
-
LAMPSON, B., ABADI, M., BURROWS, M., AND WOBBER, W. E. 1991. Authentication in distributed systems: Theory and practice. Oper. Syst. Rev. 25, 5, 165-182.
-
(1991)
Oper. Syst. Rev.
, vol.25
, Issue.5
, pp. 165-182
-
-
Lampson, B.1
Abadi, M.2
Burrows, M.3
Wobber, W.E.4
-
31
-
-
84976834054
-
Authentication in distributed systems: Theory and practice
-
LAMPSON, B., ABADI, M., BURROWS, M., AND WOBBER, W. E. 1992. Authentication in distributed systems: Theory and practice. ACM Trans. Comput. Syst. 10, 4 (Nov.), 265-308.
-
(1992)
ACM Trans. Comput. Syst.
, vol.10
, Issue.4 NOV.
, pp. 265-308
-
-
Lampson, B.1
Abadi, M.2
Burrows, M.3
Wobber, W.E.4
-
32
-
-
18044366296
-
An overview of the OSF DCE distributed file system
-
LEBOWITZ, G. 1992. An overview of the OSF DCE distributed file system. IBM AIXpert 3, (Feb.), 55-64.
-
(1992)
IBM AIXpert
, vol.3
, Issue.FEB.
, pp. 55-64
-
-
Lebowitz, G.1
-
34
-
-
18044364929
-
Authorization systems with grantor-controlled propagation of privileges
-
IEEE Computer Society Press, Los Alamitos, Calif.
-
LEISS, E. 1983. Authorization systems with grantor-controlled propagation of privileges. In Proceedings of Spring COMPCON '83. IEEE Computer Society Press, Los Alamitos, Calif.
-
(1983)
Proceedings of Spring COMPCON '83
-
-
Leiss, E.1
-
36
-
-
84950950931
-
Extensions to Starburst: Objects, types, functions, and rules
-
LOHMAN, G. M., LINDSAY, B., PIRAHESH, H., AND SCHIEFER, K. B. 1991. Extensions to Starburst: Objects, types, functions, and rules. Commun. ACM 34, 10 (Oct.), 94-109.
-
(1991)
Commun. ACM
, vol.34
, Issue.10 OCT.
, pp. 94-109
-
-
Lohman, G.M.1
Lindsay, B.2
Pirahesh, H.3
Schiefer, K.B.4
-
37
-
-
0023965320
-
The source of authority for commercial access control
-
MOFFETT, J. D. AND SLOMAN, M. S. 1988. The source of authority for commercial access control. Computer 21, 2 (Feb.), 59-69.
-
(1988)
Computer
, vol.21
, Issue.2 FEB.
, pp. 59-69
-
-
Moffett, J.D.1
Sloman, M.S.2
-
39
-
-
0026119329
-
A model of authorization for next-generation database systems
-
RABITTI, F., BERTINO, B., KIM, K., AND WOELK, D. 1991. A model of authorization for next-generation database systems. ACM Trans. Database Syst. 16, 1, 88-131.
-
(1991)
ACM Trans. Database Syst.
, vol.16
, Issue.1
, pp. 88-131
-
-
Rabitti, F.1
Bertino, B.2
Kim, K.3
Woelk, D.4
-
40
-
-
18044397054
-
CACL: Efficient fine-grained protection for objects
-
IBM, San Jose, Calif.
-
RICHARDSON, J., SCHWARZ, P., AND CABRERA, L.-F. 1992. CACL: Efficient fine-grained protection for objects. IBM Res. Rep. RJ 8894, IBM, San Jose, Calif.
-
(1992)
IBM Res. Rep. RJ 8894
-
-
Richardson, J.1
Schwarz, P.2
Cabrera, L.-F.3
-
41
-
-
0016555241
-
The protection of information in computer systems
-
SALTZER, J. H. AND SCHROEDER, M. D. 1975. The protection of information in computer systems. Proc. IEEE 63, 9, 1278-1308.
-
(1975)
Proc. IEEE
, vol.63
, Issue.9
, pp. 1278-1308
-
-
Saltzer, J.H.1
Schroeder, M.D.2
-
42
-
-
84976790810
-
Database systems: Achievements and opportunities
-
SILBERSCHAT, A., STONEBRAKER, M., AND ULLMAN, M., Eds. 1991. Database systems: Achievements and opportunities. Commun. ACM 34, 10 (Oct.), 110-120.
-
(1991)
Commun. ACM
, vol.34
, Issue.10 OCT.
, pp. 110-120
-
-
Silberschat, A.1
Stonebraker, M.2
Ullman, M.3
-
43
-
-
84976723207
-
The PostGres next generation database management system
-
STONEBRAKER, M. AND KEMNITZ, G. 1991. The PostGres next generation database management system. Commun. ACM 34, 10 (Oct.), 78-92.
-
(1991)
Commun. ACM
, vol.34
, Issue.10 OCT.
, pp. 78-92
-
-
Stonebraker, M.1
Kemnitz, G.2
-
44
-
-
0026156775
-
An analysis of the proxy problem in distributed systems
-
IEEE, New York
-
VARADHARAJAN, V., ALLEN, P., AND BLACK, S. 1991. An analysis of the proxy problem in distributed systems. In Proceedings of the 1991 IEEE Symposium on Research in Security and Privacy. IEEE, New York, 255-275.
-
(1991)
Proceedings of the 1991 IEEE Symposium on Research in Security and Privacy
, pp. 255-275
-
-
Varadharajan, V.1
Allen, P.2
Black, S.3
|