메뉴 건너뛰기




Volumn 31, Issue 5, 1997, Pages 129-142

A Decentralized Model for Information Flow Control

Author keywords

[No Author keywords available]

Indexed keywords

BINARY CODES; DECENTRALIZED CONTROL; DISTRIBUTED DATABASE SYSTEMS; INFORMATION MANAGEMENT;

EID: 0031543270     PISSN: 01635980     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/269005.266669     Document Type: Article
Times cited : (387)

References (27)
  • 2
    • 0003400255 scopus 로고
    • Integrity considerations for secure computer systems
    • USAF Electronic Systems Division, Bedford, MA, April
    • K. J. Biba. Integrity considerations for secure computer systems. Technical Report ESD-TR-76-372, USAF Electronic Systems Division, Bedford, MA, April 1977.
    • (1977) Technical Report ESD-TR-76-372
    • Biba, K.J.1
  • 3
    • 0003400251 scopus 로고
    • Secure computer system: Unified exposition and Multics interpretation
    • MITRE Corp. MTR-2997, Bedford, MA, Available as NTIS AD-A023 588
    • D. E. Bell and L. J. LaPadula. Secure computer system: Unified exposition and Multics interpretation. Technical Report ESD-TR-75-306, MITRE Corp. MTR-2997, Bedford, MA, 1975. Available as NTIS AD-A023 588.
    • (1975) Technical Report ESD-TR-75-306
    • Bell, D.E.1    LaPadula, L.J.2
  • 6
    • 0017517624 scopus 로고
    • Certification of programs for secure information flow
    • Dorothy E. Denning and Peter J. Denning. Certification of programs for secure information flow. Comm. of the ACM, 20(7):504-513, 1977.
    • (1977) Comm. of the ACM , vol.20 , Issue.7 , pp. 504-513
    • Denning, D.E.1    Denning, P.J.2
  • 7
    • 0016949746 scopus 로고
    • A lattice model of secure information flow
    • Dorothy E. Denning. A lattice model of secure information flow. Comm. of the ACM, 19(5):236-243, 1976.
    • (1976) Comm. of the ACM , vol.19 , Issue.5 , pp. 236-243
    • Denning, D.E.1
  • 8
    • 0021509216 scopus 로고
    • Linear-time algorithms for testing the satisfiability of prepositional Horn formulæ
    • October
    • William F. Dowling and Jean H. Gallier. Linear-time algorithms for testing the satisfiability of prepositional Horn formulæ. Journal of Logic Programming, 1(3):267-284, October 1984.
    • (1984) Journal of Logic Programming , vol.1 , Issue.3 , pp. 267-284
    • Dowling, W.F.1    Gallier, J.H.2
  • 13
    • 0017971337 scopus 로고
    • A language extension for expressing constraints on data access
    • May
    • Anita K. Jones and Barbara Liskov. A language extension for expressing constraints on data access. Comm. of the ACM, 21(5):358-367, May 1978.
    • (1978) Comm. of the ACM , vol.21 , Issue.5 , pp. 358-367
    • Jones, A.K.1    Liskov, B.2
  • 15
    • 2742561997 scopus 로고
    • Also published as Springer-Verlag
    • Barbara Liskov, Russell Atkinson, Toby Bloom, J. Eliot Moss, J. Craig Schaffert, Robert Scheifler, and Alan Snyder. CLU Reference Manual. Springer-Verlag, 1984. Also published as Lecture Notes in Computer Science 114, G. Goos and J. Hartmanis, Eds., Springer-Verlag, 1981.
    • (1981) Lecture Notes in Computer Science , vol.114
    • Goos, G.1    Hartmanis, J.2
  • 17
    • 0039015629 scopus 로고    scopus 로고
    • Butler Lampson, Martin Abadi, Michael Burrows, and Edward Wobber. Authentication in distributed systems: Theory and practice. In Proc. 13th ACM Symp. on Operating System Principles (SOSP), pages 165-182, October 1991. Operating System Review, 253(5).
    • Operating System Review , vol.253 , Issue.5
  • 18
    • 0015672289 scopus 로고
    • A note on the confinement problem
    • Butler W. Lampson. A note on the confinement problem. Comm. of the ACM, 10:613-615, 1973.
    • (1973) Comm. of the ACM , vol.10 , pp. 613-615
    • Lampson, B.W.1
  • 21
    • 0026910016 scopus 로고
    • Multilevel security in the UNIX tradition
    • August
    • M. D. McIlroy and J. A. Reeds. Multilevel security in the UNIX tradition. Software - Practice and Experience, 22(8):673-694, August 1992.
    • (1992) Software - Practice and Experience , vol.22 , Issue.8 , pp. 673-694
    • McIlroy, M.D.1    Reeds, J.A.2
  • 23
    • 84955596529 scopus 로고
    • Trust in the λ-calculus
    • number 983 in Lecture Notes in Computer Science, Springer, September
    • Jens Palsberg and Peter Ørbæk. Trust in the λ-calculus. In Proc. 2nd International Symposium on Static Analysis, number 983 in Lecture Notes in Computer Science, pages 314-329. Springer, September 1995.
    • (1995) Proc. 2nd International Symposium on Static Analysis , pp. 314-329
    • Palsberg, J.1    Ørbæk, P.2
  • 24
    • 84957705773 scopus 로고    scopus 로고
    • Tractable constraints in finite semilattices
    • number 1145 in Lecture Notes in Computer Science, Springer-Verlag, September
    • Jakob Rehof and Torben Æ. Mogensen. Tractable constraints in finite semilattices. In Proc. 3rd International Symposium on Static Analysis, number 1145 in Lecture Notes in Computer Science, pages 285-300. Springer-Verlag, September 1996.
    • (1996) Proc. 3rd International Symposium on Static Analysis , pp. 285-300
    • Rehof, J.1    Mogensen, T.Æ.2
  • 26
    • 0345950227 scopus 로고    scopus 로고
    • Provably-secure programming languages for remote evaluation
    • January
    • Dennis Volpano. Provably-secure programming languages for remote evaluation. ACM SIGPLAN Notices, 32(1):117-119, January 1997.
    • (1997) ACM SIGPLAN Notices , vol.32 , Issue.1 , pp. 117-119
    • Volpano, D.1
  • 27
    • 0030370740 scopus 로고    scopus 로고
    • A sound type system for secure flow analysis
    • Dennis Volpano, Geoffrey Smith, and Cynthia Irvine. A sound type system for secure flow analysis. Journal of Computer Security, 4(3):167-187, 1996.
    • (1996) Journal of Computer Security , vol.4 , Issue.3 , pp. 167-187
    • Volpano, D.1    Smith, G.2    Irvine, C.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.