-
1
-
-
0029211469
-
Practical domain and type enforcement for UNIX
-
L. Badger, D.F. Sterne, D.L. Sherman, K.M. Walker and S.A. Haghighat, Practical domain and type enforcement for UNIX, in: 1995 IEEE Symposium on Security and Privacy, Oakland, CA, 1995, pp. 66-77. URL: http://www.tis.com/docs/research/secure/secure_dte_proj2.html.
-
1995 IEEE Symposium on Security and Privacy, Oakland, CA, 1995
, pp. 66-77
-
-
Badger, L.1
Sterne, D.F.2
Sherman, D.L.3
Walker, K.M.4
Haghighat, S.A.5
-
2
-
-
0003400251
-
Secure computer systems: Unified exposition and multics interpretation
-
Technical Report ESD-TR-75-306, The MITRE Corporation, HQ Electronic Systems Division, Hanscom AFB, MA, March
-
D.E. Bell and L.J. LaPadula, Secure Computer Systems: Unified Exposition and Multics Interpretation, Technical Report ESD-TR-75-306, The MITRE Corporation, HQ Electronic Systems Division, Hanscom AFB, MA, March 1976. URL: http://csrc.nist.gov/publications/history/bell76.pdf.
-
(1976)
-
-
Bell, D.E.1
Lapadula, L.J.2
-
3
-
-
0003400255
-
Integrity considerations for secure computer systems
-
Technical Report ESD-TR-76-372, The MITRE Corporation, HQ Electronic Systems Division, Hanscom AFB, MA, April
-
K.J. Biba, Integrity Considerations for Secure Computer Systems, Technical Report ESD-TR-76-372, The MITRE Corporation, HQ Electronic Systems Division, Hanscom AFB, MA, April 1977.
-
(1977)
-
-
Biba, K.J.1
-
4
-
-
0003282331
-
A practical alternative to hierarchical integrity policies
-
Gaithersburg, MD, National Computer Security Center and National Bureau of Standards, 1985
-
W.E. Boebert and R.Y. Kain, A practical alternative to hierarchical integrity policies, in: 8th National Computer Security Conf., Gaithersburg, MD, National Computer Security Center and National Bureau of Standards, 1985, pp. 18-27.
-
8th National Computer Security Conf.
, pp. 18-27
-
-
Boebert, W.E.1
Kain, R.Y.2
-
6
-
-
0011321748
-
VSE: Controlling the complexity in formal software developments
-
LNCS 1641
-
D. Hutter, H. Mantel, G. Rock, W. Stephan, A. Wolpers, M. Balser, W. Reif, G. Schellhorn and K. Stenzel, VSE: Controlling the complexity in formal software developments, in: Applied Formal Methods - FM-Trends 98, LNCS 1641, 1998.
-
(1998)
Applied Formal Methods - FM-Trends 98
-
-
Hutter, D.1
Mantel, H.2
Rock, G.3
Stephan, W.4
Wolpers, A.5
Balser, M.6
Reif, W.7
Schellhorn, G.8
Stenzel, K.9
-
7
-
-
0003765584
-
Identification cards-identification cards-interrelated circuit(s) cards with contacts-part 4: Inter industry commands for interchange
-
ISO/IEC 7816-4, International Standards Organization
-
Identification cards-identification cards-interrelated circuit(s) cards with contacts-part 4: Inter industry commands for interchange, ISO/IEC 7816-4, International Standards Organization, 1995.
-
(1995)
-
-
-
8
-
-
0011326587
-
Information technology-security techniques-evaluation criteria for IT security
-
ISO/IEC 15408, International Standards Organization
-
Information technology-security techniques-evaluation criteria for IT security, ISO/IEC 15408, International Standards Organization, 1999. URL: http://csrc.nist.gov/cc.
-
(1999)
-
-
-
9
-
-
0003765598
-
-
ITSEC; Office for Official Publications of the European Communities, Brussels, Belgium
-
ITSEC, Information Technology Security Evaluation Criteria, Version 1.2. Office for Official Publications of the European Communities, Brussels, Belgium, 1991.
-
(1991)
Information Technology Security Evaluation Criteria, Version 1.2
-
-
-
10
-
-
0011272226
-
A new mandatory security policy combining secrecy and integrity
-
RC 21717, IBM Resarch Division, T.J. Watson Research Center, Yorktown Heights, NY, 15 March
-
P.A. Karger, V. Austel and D. Toll, A new mandatory security policy combining secrecy and integrity, RC 21717, IBM Resarch Division, T.J. Watson Research Center, Yorktown Heights, NY, 15 March 2000. URL: http://domino.watson.ibm.com/library/CyberDig.nsf/home.
-
(2000)
-
-
Karger, P.A.1
Austel, V.2
Toll, D.3
-
11
-
-
33644484966
-
Using a mandatory secrecy and integrity policy on smart cards and mobile devices
-
RC 21736
-
P.A. Karger, V. Austel and D. Toll, Using a mandatory secrecy and integrity policy on smart cards and mobile devices, in: (EUROSMART) Security Conference, Marseille, France, 2000, pp. 134-148, RC 21736 available at http://domino.watson.ibm.com/library/CyberDig.nsf/home.
-
(EUROSMART) Security Conference, Marseille, France, 2000
, pp. 134-148
-
-
Karger, P.A.1
Austel, V.2
Toll, D.3
-
12
-
-
0011326590
-
A generic security model for multiapplicative smarts cards-final report of the SMaCOS project
-
Unpublished, available from the authors
-
F. Koob, M. Ullmann, S. Wittmann, G. Schellhorn, W. Reif, A. Schairer and W. Stephan, A generic security model for multiapplicative smarts cards-final report of the SMaCOS project, Unpublished, available from the authors.
-
-
-
Koob, F.1
Ullmann, M.2
Wittmann, S.3
Schellhorn, G.4
Reif, W.5
Schairer, A.6
Stephan, W.7
-
13
-
-
0011311076
-
-
Technical Report SRI-CSL-88-8, SRI International, Menlo Park, CA, August
-
T.F. Lunt, P.G. Neumann, D. Denning, R.R. Schell, M. Heckman and W.R. Shockley, Secure distributed data views - Vol. 1: Security policy and policy interpretation for a class A1 multilevel secure, Technical Report SRI-CSL-88-8, SRI International, Menlo Park, CA, August 1988.
-
(1988)
Secure Distributed Data Views - Vol. 1: Security Policy and Policy Interpretation for a Class A1 Multilevel Secure
-
-
Lunt, T.F.1
Neumann, P.G.2
Denning, D.3
Schell, R.R.4
Heckman, M.5
Shockley, W.R.6
-
14
-
-
84881123660
-
Information flow control and applications-bridging a gap
-
J.N. Olivera and P. Zave, eds, LNCS 2021, Berlin, Germany, Springer
-
H. Mantel, Information flow control and applications-bridging a gap, in: FME 2001: Formal Methods for Increasing Software Productivity, International Symposium of Formal Methods Europe, J.N. Olivera and P. Zave, eds, LNCS 2021, Berlin, Germany, Springer, 2001, pp. 153-172.
-
(2001)
FME 2001: Formal Methods for Increasing Software Productivity, International Symposium of Formal Methods Europe
, pp. 153-172
-
-
Mantel, H.1
-
15
-
-
0003307796
-
Security models
-
J. Marciniak, ed., Wiley & Sons
-
J. McLean, Security models, in: Encyclopedia of Software Engineering, J. Marciniak, ed., Wiley & Sons, 1994 URL: http://chacs.nrl.navy.mil/publications/CHACS.
-
(1994)
Encyclopedia of Software Engineering
-
-
McLean, J.1
-
17
-
-
0011355115
-
Philips semiconductors and IBM research to co-develop secure smart cards: Highly secure operating system and processor, suitable for multiple applications
-
Feb.
-
Philips semiconductors and IBM research to co-develop secure smart cards: Highly secure operating system and processor, suitable for multiple applications. URL: http://www.semiconductors.philips.com/news/content/file_384.html, Feb. 1999.
-
(1999)
-
-
-
19
-
-
0011272228
-
Structured specifications and interactive proofs with KIV
-
W. Bibel and P. Schmitt, eds, Kluwer Academic Publishers, Dordrecht
-
W. Reif, G. Schellhorn, K. Stenzel and M. Balser, Structured specifications and interactive proofs with KIV, in: Automated Deduction - A Basis for Applications, W. Bibel and P. Schmitt, eds, Kluwer Academic Publishers, Dordrecht, 1998.
-
(1998)
Automated Deduction - A Basis for Applications
-
-
Reif, W.1
Schellhorn, G.2
Stenzel, K.3
Balser, M.4
-
21
-
-
0003502331
-
Noninterference, transitivity, and channel-control security policies
-
Technical Report CSL-92-02, SRI International, Menlo Park, CA
-
J. Rushby, Noninterference, Transitivity, and Channel-Control Security Policies, Technical Report CSL-92-02, SRI International, Menlo Park, CA, 1992. URL: http;//www.csl.sri.com/~rushby/reports/csl-92-2.dvi.Z.
-
(1992)
-
-
Rushby, J.1
-
22
-
-
0002604871
-
A lattice interpretation of the chinese wall security policy
-
US Govt. Printing Office
-
R. Sandhu, A lattice interpretation of the chinese wall security policy, in: Proc. 15th NIST-NCSC National Computer Security Conference, US Govt. Printing Office, 1992, pp. 329-339.
-
(1992)
Proc. 15th NIST-NCSC National Computer Security Conference
, pp. 329-339
-
-
Sandhu, R.1
-
23
-
-
0027699087
-
Lattice based access control models
-
R. Sandhu, Lattice based access control models, IEEE Computer 26(11) (1993), 9-19.
-
(1993)
IEEE Computer
, vol.26
, Issue.11
, pp. 9-19
-
-
Sandhu, R.1
-
24
-
-
0011319414
-
Desingning the GEMSOS security kernel for security and performance
-
DoD Computer Security Center and National Bureau of Standards
-
R. Schell, T.F. Tao and M. Heckman, Desingning the GEMSOS security kernel for security and performance, in: 8th National Computer Security Conference, Gaithersburg, MD, DoD Computer Security Center and National Bureau of Standards, 1985, pp. 108-119.
-
(1985)
8th National Computer Security Conference, Gaithersburg, MD
, pp. 108-119
-
-
Schell, R.1
Tao, T.F.2
Heckman, M.3
-
25
-
-
84944051800
-
Verification of a formal security model for multiapplicative smart cards
-
LNCS 1895, Springer
-
G. Schellhorn, W. Reif, A. Schairer, P. Karger, V. Austel and D. Toll, Verification of a formal security model for multiapplicative smart cards, in: Proc. of the 6th European Symposium on Research in Computer Security (ESORICS), LNCS 1895, Springer, 2000.
-
(2000)
Proc. of the 6th European Symposium on Research in Computer Security (ESORICS)
-
-
Schellhorn, G.1
Reif, W.2
Schairer, A.3
Karger, P.4
Austel, V.5
Toll, D.6
-
26
-
-
0019670690
-
Mechanism sufficiency validation by assignment
-
IEEE Computer Society
-
L.J. Shirley and R.R. Schell, Mechanism sufficiency validation by assignment, in: 1981 Symposium on Security and Privacy, Oakland, CA, IEEE Computer Society, 1981, pp. 26-32.
-
(1981)
1981 Symposium on Security and Privacy, Oakland, CA
, pp. 26-32
-
-
Shirley, L.J.1
Schell, R.R.2
-
27
-
-
0011349857
-
The controlled application set paradigm for trusted systems
-
National Computer Security Center and National Institute of Standards and Technology
-
D.F. Sterne and G.S. Benson, The controlled application set paradigm for trusted systems, in: 1995 National Information Systems Security Conference, Baltimore, Maryland, National Computer Security Center and National Institute of Standards and Technology, 1995. URL: http://www.tis.com/docs/research/secure/secure_dte_proj2.html.
-
(1995)
1995 National Information Systems Security Conference, Baltimore, Maryland
-
-
Sterne, D.F.1
Benson, G.S.2
-
28
-
-
0011319906
-
Ein verifiziertes Sicherheitsmodell fuer multiapplikative Smartcards
-
Diplomarbeit, Fakultät für Informatik, Universität Ulm. Germany; (in German)
-
J. Ziegler, Ein verifiziertes Sicherheitsmodell für multiapplikative Smartcards, Diplomarbeit, Fakultät für Informatik, Universität Ulm. Germany, 2000 (in German).
-
(2000)
-
-
Ziegler, J.1
|