-
2
-
-
30244432907
-
-
Technical Report 404, Privacy and Security in Computer Systems, Nat'l Bureau of Standard Special Publication
-
H.W. Bingham, "Access Controls in Burroughs Large Systems," Technical Report 404, Privacy and Security in Computer Systems, Nat'l Bureau of Standard Special Publication, 1974.
-
(1974)
Access Controls in Burroughs Large Systems
-
-
Bingham, H.W.1
-
3
-
-
33748210906
-
A Partial Solution to the Discretionary Trojan Horse Problem
-
Gaithersburg, Md.
-
W.E. Boebert and C.T. Ferguson, "A Partial Solution to the Discretionary Trojan Horse Problem," Proc. Eighth Nat'l Computer Security Conf., pp. 141-144, Gaithersburg, Md., 1985.
-
(1985)
Proc. Eighth Nat'l Computer Security Conf.
, pp. 141-144
-
-
Boebert, W.E.1
Ferguson, C.T.2
-
4
-
-
0004190705
-
-
Addison-Wesley
-
S. Castano, M.G. Fugini, G. Martella, and P. Samarati, Database Security, Addison-Wesley, 1995.
-
(1995)
Database Security
-
-
Castano, S.1
Fugini, M.G.2
Martella, G.3
Samarati, P.4
-
6
-
-
0016949746
-
A Lattice Model of Secure Information Flow
-
May
-
D.E. Denning, "A Lattice Model of Secure Information Flow," Comm. ACM, pp. 236-243, May 1976.
-
(1976)
Comm. ACM
, pp. 236-243
-
-
Denning, D.E.1
-
7
-
-
1242349398
-
On the Need for a Third Form of Access Control
-
Gaithersburg, Md.
-
R. Graubart, "On the Need for a Third Form of Access Control," Proc. 12th Nat'l Computer Security Conf., pp. 296-303, Gaithersburg, Md., 1989.
-
(1989)
Proc. 12th Nat'l Computer Security Conf.
, pp. 296-303
-
-
Graubart, R.1
-
8
-
-
0025065897
-
Integrating an Object-Oriented Data Model with Multilevel Security
-
Oakland, Calif.
-
S. Jajodia and B. Kogan, "Integrating an Object-Oriented Data Model with Multilevel Security," Proc. IEEE Symp. Security and Privacy, pp. 76-85, Oakland, Calif., 1990.
-
(1990)
Proc. IEEE Symp. Security and Privacy
, pp. 76-85
-
-
Jajodia, S.1
Kogan, B.2
-
9
-
-
0027719713
-
A Pump for Rapid, Reliable, Secure Communication
-
Fairfax, Va.
-
M.H. Kang and I.S. Moskowitz, "A Pump for Rapid, Reliable, Secure Communication," Proc. ACM Conf. Computer and Comm. Security, pp. 119-129, Fairfax, Va., 1993.
-
(1993)
Proc. ACM Conf. Computer and Comm. Security
, pp. 119-129
-
-
Kang, M.H.1
Moskowitz, I.S.2
-
10
-
-
0023168930
-
Limiting the Damage Potential of Discretionary Trojan Horses
-
Oakland, Calif.
-
P.A. Karger, "Limiting the Damage Potential of Discretionary Trojan Horses," Proc. IEEE Symp. Security and Privacy, pp. 32-37, Oakland, Calif., 1987.
-
(1987)
Proc. IEEE Symp. Security and Privacy
, pp. 32-37
-
-
Karger, P.A.1
-
11
-
-
0026155431
-
Discretionary Access Controls in a High-Performance Object Management System
-
Oakland, Calif.
-
U. Kelter, "Discretionary Access Controls in a High-Performance Object Management System," Proc. IEEE Symp. Security and Privacy, pp. 288-299, Oakland, Calif., 1991.
-
(1991)
Proc. IEEE Symp. Security and Privacy
, pp. 288-299
-
-
Kelter, U.1
-
12
-
-
33748164892
-
A Comparison of Object Models in ODBMS-Related Standards
-
Dec.
-
F. Manola and G. Mitchell, "A Comparison of Object Models in ODBMS-Related Standards," IEEE Data Eng. Bull., vol. 17, pp. 27-35, Dec. 1994.
-
(1994)
IEEE Data Eng. Bull.
, vol.17
, pp. 27-35
-
-
Manola, F.1
Mitchell, G.2
-
13
-
-
0025022888
-
Beyond the Pale of MAC and DAC - Defining New Forms of Access Control
-
Oakland, Calif.
-
C.J. McCollum, J.R. Messing, and L. Notargiacomo, "Beyond the Pale of MAC and DAC - Defining New Forms of Access Control," Proc. IEEE Symp. Security and Privacy, pp. 190-200, Oakland, Calif., 1990.
-
(1990)
Proc. IEEE Symp. Security and Privacy
, pp. 190-200
-
-
McCollum, C.J.1
Messing, J.R.2
Notargiacomo, L.3
-
14
-
-
33748165340
-
Supporting Timing Channel Free Computations in Multilevel Secure Object-Oriented Databases
-
C.E. Landwehr and S. Jajodia, eds., North-Holland
-
R.S. Sandhu, R. Thomas, and S. Jajodia, "Supporting Timing Channel Free Computations in Multilevel Secure Object-Oriented Databases," C.E. Landwehr and S. Jajodia, eds., Database Security, V: Status and Prospects, pp. 297-314, North-Holland, 1992.
-
(1992)
Database Security, V: Status and Prospects
, pp. 297-314
-
-
Sandhu, R.S.1
Thomas, R.2
Jajodia, S.3
-
15
-
-
0019658399
-
Access Flow: A Protection Model which Integrates Access Control and Information Flow
-
Oakland, Calif.
-
A. Stoughton, "Access Flow: A Protection Model which Integrates Access Control and Information Flow," Proc. IEEE Symp. Security and Privacy, pp. 9-18, Oakland, Calif., 1981.
-
(1981)
Proc. IEEE Symp. Security and Privacy
, pp. 9-18
-
-
Stoughton, A.1
-
16
-
-
3943068905
-
-
Technical Report ESD-TR-4-117, Case Western Reserve Univ., Cleveland, Jan.
-
K.G. Walter, W.F. Ogden, W.C. Rounds, F.T. Bradshaw, S.R. Ames, and D.G. Sumaway, "Primitive Models for Computer Security, Technical Report ESD-TR-4-117, Case Western Reserve Univ., Cleveland, Jan. 1974.
-
(1974)
Primitive Models for Computer Security
-
-
Walter, K.G.1
Ogden, W.F.2
Rounds, W.C.3
Bradshaw, F.T.4
Ames, S.R.5
Sumaway, D.G.6
-
17
-
-
33748188187
-
A Penetration Analysis of a Burroughs Large System
-
Jan.
-
A.L. Wilkinson, D.H. Anderson, D.P. Chang, L.H. Hin, A.J. Mayo, IT. Viney, R. Williams, and W. Wright, "A Penetration Analysis of a Burroughs Large System," ACM SIGOPS Operation System Revs., vol. 15, no. 1, pp. 14-25, Jan. 1981.
-
(1981)
ACM SIGOPS Operation System Revs.
, vol.15
, Issue.1
, pp. 14-25
-
-
Wilkinson, A.L.1
Anderson, D.H.2
Chang, D.P.3
Hin, L.H.4
Mayo, A.J.5
Viney, I.T.6
Williams, R.7
Wright, W.8
|